Without Warning, FBI Halts Intel Sharing

User avatar
Posts: 4007
Joined: Wed Feb 16, 2011 8:03 pm

PostSat Apr 21, 2012 1:52 pm » by Rydher

Hmm, I would agree with you Spock. Here is another update:

On a conference call this afternoon, the FBI announced a reversal of its decision to cut off the intelligence sharing of information from the Terrorist Screening Center (TSC). The FBI shut down reporting to the 77 fusion centers on March 1, and PJM reported on the shutdown yesterday.

The FBI had announced that that it would be resuming the TSC reporting this coming Monday, but without the Personal Information Intelligence (PII) that fusion centers had previously had access to (as I updated on the article yesterday afternoon). Fusion center officials had said yesterday that resuming the TSC reports without the PII would be “effectively useless.”

As recently as Wednesday, FBI officials were telling fusion centers and congressional staffers that PII would not be included in the resumed reporting. Two days and one PJ Media exclusive report later, and the FBI had completely changed course. It remains to be seen if the reporting is as the FBI represented it will be when it resumes on Monday.

Mike Sena, president of the National Fusion Center Association, was on the conference call this afternoon along with representatives of the fusion centers and state and local law enforcement, and confirmed the FBI’s policy reversal.

According to Sena, the TSC will be establishing a coordinating council to help improve relations between the FBI and the fusion centers, and to possibly plan even more enhanced intelligence sharing.

When an encounter with someone on the terror watch list occurs, the fusion center will not only be notified, but the fusion center will be able to pull the data up themselves, according to Sena. One additional change will be that when someone on the terror watch list is pulled over in another state, the state in which the suspect resides will also be notified — a change from previous policy.

One fusion center official I spoke with this afternoon following the conference call said, “This is a stunning reversal. It’s doubtful we would have gotten a 180 degree reversal from the FBI in less than 48 hours without the exposure from PJ Media.”

The FBI deserves recognition for doing the right thing when it came down to crunch time. Thanks go as well to the congressional staffers I spoke with who began making inquiries with the FBI earlier this week, and the many fusion center and law enforcement officials who complained to the FBI about the intel sharing shut down.

We expect a press release from the National Fusion Center Association and we will post it here as an update when it is available.

Here’s the relevant portion of the press release from the National Fusion Center Association about today’s FBI conference call:
During the call, Director Healy stated that he has been working with his staff over the past few months to resolve program policy issues that stopped them from providing immediate TSC hit reporting to fusion centers. Director Healy reported that this week the TSC has started immediate encounter notifications to fusion centers that contain a reference number to the TSC encounter, but that do not contain personal identifying information. He stated that the TSC will provide immediate access information to the TSC encounter data that is located on the secure systems provided by DHS and the FBI at fusion centers. I will send the access instructions in a separate message.

User avatar
Posts: 237
Joined: Thu Apr 12, 2012 6:46 pm

PostSat Apr 21, 2012 11:21 pm » by Haansolo

Hundreds of thousands may lose access to the internet by July as a result of hackers' advertising scam

" International hackers took control of at least 550,000 computers
FBI takes unusual step of setting up a safety net to prevent internet disruptions
Most victims are unaware they have been affected after using rogue servers"

Now, the FBI is encouraging users to visit a website run by its security partner that will inform them whether they're infected and explain how to fix the problem. After July 9, infected users won't be able to connect to the Internet.

Read more: http://www.dailymail.co.uk/news/article ... z1siSlRztT

In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down. It comes after the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.

Most victims don't even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.

Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.

Tom Grasso, an FBI supervisory special agent, said: 'We started to realise that we might have a little bit of a problem on our hands because ... if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service.

'The average user would open up Internet Explorer and get `page not found' and think the Internet is broken.'

On the night of the arrests, the agency brought in Paul Vixie, chairman and founder of Internet Systems Consortium, to install two Internet servers to take the place of the truckload of impounded rogue servers that infected computers were using.

Federal officials planned to keep their servers online until March, giving everyone opportunity to clean their computers. But it wasn't enough time. A federal judge in New York extended the deadline until July.

Grasso added: 'The full court press is on to get people to address this problem.'

Hackers infected a network of probably more than 570,000 computers worldwide.

The number of victims is hard to pinpoint, but the FBI believes that on the day of the arrests, at least 568,000 unique Internet addresses were using the rogue servers.

Five months later, FBI estimates that the number is down to at least 360,000.

The U.S. has the most, about 85,000, federal authorities said.

Other countries with more than 20,000 each include Italy, India, England and Germany. Smaller numbers are online in Spain, France, Canada, China and Mexico.

Vixie said most of the victims are probably individual home users, rather than corporations that have technology staffs who routinely check the computers.

They took advantage of vulnerabilities in the Microsoft Windows operating system to install malicious software on the victim computers. This turned off antivirus updates and changed the way the computers reconcile website addresses behind the scenes on the Internet's domain name system.

The DNS system is a network of servers that translates a web address - such as www.ap.org - into the numerical addresses that computers use. Victim computers were reprogrammed to use rogue DNS servers owned by the attackers. This allowed the attackers to redirect computers to fraudulent versions of any website.

The hackers earned profits from advertisements that appeared on websites that victims were tricked into visiting.

The scam netted the hackers at least $14 million, according to the FBI. It also made thousands of computers reliant on the rogue servers for their Internet browsing.

When the FBI and others arrested six Estonians last November, the agency replaced the rogue servers with Vixie's clean ones. Installing and running the two substitute servers for eight months is costing the federal government about $87,000.

FBI officials said they had taken the unusual step of organising a system to avoid any appearance of government intrusion into the Internet or private computers. And while this is the first time the FBI used it, it won't be the last.

Eric Strom, the FBI's Cyber Division unit chief, said: 'This is the future of what we will be doing.

'Until there is a change in legal system, both inside and outside the United States, to get up to speed with the cyber problem, we will have to go down these paths, trail-blazing if you will, on these types of investigations.'

Now, he said, every time the agency gets near the end of a cyber case, 'we get to the point where we say, how are we going to do this, how are we going to clean the system' without creating a bigger mess than before.

Read more: http://www.dailymail.co.uk/news/article ... z1siSw941W
"Traveling through hyperspace ain't like dusting crops, boy!

User avatar
Posts: 237
Joined: Thu Apr 12, 2012 6:46 pm

PostSun Apr 22, 2012 10:36 am » by Haansolo

Want to Know if the FBI Is Tracking You? Look for One of These

Want to know if the government is really tracking you? If you find one of these tucked underneath your car, you can start freaking out.

A routine visit to the mechanic by a Redditor and his friend turned up this ominous looking device nestled right next to the exhaust on his friend's car.

After promptly ruling out a bomb, other Redditors helped correctly identify the black device as a Guardian ST820—a GPS tracking unit made by Cobham and used exclusively by the army and law enforcement. According the poster, the friend's (now dead) father had ties to the Muslim religious community, and was the subject of quite a bit of FBI interest. That interest also extended to the son, who has supposedly been on an FBI watch list since last year.

"Why my friend is being tracked is anyone's guess, but the only thing I think it could be is his connection to his father," he says. "The FBI tried to get in touch with my friend a few months ago and he referred them to his lawyer and hasn't heard from them since." Redditors have thus far suggested sending the unit to France, Uganda, Cambodia, Kazakhstan, Yemen, Oceana, United Kingdom, Fiji, Estonia, Denmark, and Somalia (in that order), the Chilean mine, and Ron Paul's car.
According to the poster, his friend's car was also impounded three months, which is when he believes the tracking unit was first placed on the car.

Sadly, such a move isn't without legal precendent. This past August, the U.S. Court of Appeals for the Ninth Circuit ruled that placing tracking devices underneath cars isn't actually a breach of the Fourth Amendment, so long as law enforcement official think someone is a criminal. Furthermore, this can be done even if your car is parked in your own driveway—a location that does not hold the same reasonable expectation of privacy as, say, a garage. Currently, California and eight other Western states recognize this ruling, according to Adam Cohen, a lawyer and reporter for Time.
Thankfully, the U.S. Court of Appeals for the District of Columbia Circuit seems to disagree with this insanity. In a ruling last August, the latter court said that tracking anyone for an extended period of time with GPS does in fact consitute an invasion of privacy and should require a warrant. Yeah, we'll go out on a limb and agree.

Stay tuned for the inevitable Supreme Court decision. And in the mean time, we'd suggest parking in your garage…if you have one.
"Traveling through hyperspace ain't like dusting crops, boy!

User avatar
Posts: 237
Joined: Thu Apr 12, 2012 6:46 pm

PostSun Apr 22, 2012 11:17 am » by Haansolo

FBI is Spying on Preppers

Well its official, the FBI is now spying on prepper websites. It was recently found out that the FBI was caught placing tracking cookies on IP addresses that vistited Survivalblog.com between Aug. 2011 and Nov. 2011.

Out of the 35,494 visitors in that time period, 4,906 had tracking cookies places on their computers by the FBI. Thst over 10% of the traffic. The reasons given by the FBI for this were that they were tracking people who visited known copyright theft websites like MegaUpload and others and then some of thos people simply went to survivalblog.com after the tracking cookies were downloaded. This however was proven incorrect as SurvivalBlog performed its own analysis with “sniffer software” that proved that people were having tracking cookies downloaded when only visiting survivalblog.com.

So what does this tell us? Well I think it tells us that we all, preppers, gun owners, political activists, or even patriots, need to be careful as “Big Brother” is in fact watching. If this was done on one website you can be sure it’s happening on many others as well, and more than likely not just perpper websites.

With today’s technology this kind of thing is very easy to do and will become more and more common. So be carefull out there guys, watch what you search for and what you say ….. you never know who could be watching.
http://www.google.co.uk/url?sa=t&rct=j& ... TA&cad=rja
"Traveling through hyperspace ain't like dusting crops, boy!

User avatar
Posts: 237
Joined: Thu Apr 12, 2012 6:46 pm

PostSun Apr 22, 2012 11:44 am » by Haansolo

"Traveling through hyperspace ain't like dusting crops, boy!


  • Related topics
    Last post