1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Cool Job! Be A Snitch For The FBI!

Discussion in 'BlackHat Lounge' started by The Scarlet Pimp, Nov 11, 2010.

  1. The Scarlet Pimp

    The Scarlet Pimp Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 2, 2008
    Messages:
    788
    Likes Received:
    3,120
    Occupation:
    Chair moistener.
    Location:
    Cyberspace
  2. paincake

    paincake Power Member

    Joined:
    Aug 18, 2010
    Messages:
    716
    Likes Received:
    3,099
    Home Page:
    What makes you think there aren't a few of them here already?
     
  3. haverox

    haverox Regular Member

    Joined:
    Oct 6, 2009
    Messages:
    270
    Likes Received:
    144
    Occupation:
    Internet marketer/entrepenuer
    Location:
    The US Federal Reserve
    couldnt open the link on my phone but will check it out when i get to a real computer
    Posted via Mobile Device
     
  4. OG310

    OG310 Junior Member

    Joined:
    Oct 2, 2010
    Messages:
    105
    Likes Received:
    10
    Home Page:
    this is hilarious :lame:
     
  5. thomansfel

    thomansfel Jr. VIP Jr. VIP

    Joined:
    Dec 11, 2009
    Messages:
    535
    Likes Received:
    162
    Occupation:
    working for myself
    Location:
    in a cave with WiFi
    I don't like snitches, check my signature, and being a snitch its not cool at all, its lack of character
     
  6. wrangler

    wrangler Regular Member

    Joined:
    Jun 14, 2010
    Messages:
    487
    Likes Received:
    599
    Same could be said for quite a lot of activity that's promoted here, you know. Betrayal of trust, gaining personal advantage at somebody else's cost - strikingly similar description, don't you think? Oh, the irony.
     
  7. paincake

    paincake Power Member

    Joined:
    Aug 18, 2010
    Messages:
    716
    Likes Received:
    3,099
    Home Page:
    That's not irony, that's just criminal mentality. The things you listed are considered acceptable among criminals, but snitching isn't.
     
  8. liquid5170

    liquid5170 Junior Member

    Joined:
    May 5, 2010
    Messages:
    160
    Likes Received:
    46
    Occupation:
    ScrapeboxService.com
    Location:
    ScrapeboxService.com | ScrapeboardForum.com
    c'mon, lets look at the pros of this!

    this might be a good idea if you have a chapter close to where you live. You can meet the agents and figure out what they're looking for in particular and if you're in the field, you can quickly get out. :) otherwise, you'll make some great connections while watching your own back.
     
  9. chrisis4ever

    chrisis4ever Regular Member

    Joined:
    Jul 10, 2008
    Messages:
    240
    Likes Received:
    73
    Occupation:
    Musician/Marketer/Graphic Designer
    Location:
    Shaker Heights Ohio
    wtf? If you are black hat I wouldn't even click the link. If you get in YOU WILL NEVER GET OUT !!!!!! AS SOON AS YOU SIGN UP THEY WILL PULL INFO OF YOUR FAMILY AND FRIENDS 3 GENERATIONS. THEY WILL RUN KEYWORD SOFTWARE ON ALL OF YOUR PHONE CONTACTS AND RATE AND SCORE CRIMINAL PHONE CONVERSATIONS. SO YOU WERE IN FOR A WHILE NOW YOU THINK YOU ARE OUT .... HA HA HA :rolleyes: YOU ARE JUST WORKING FOR FREE BECAUSE THEY WON'T STOP WATCHING YOU SINCE EVERY PIECE ON INTEL IS WORTH MONEY TO THEM. SO IF YOU WANT TO MAKE A DEAL WITH THE DEVIL GO AHEAD.
    Now all you white hatters this would be great. Black hatters who are black hat to the soul in the usa can find work with the cia. They have some SUPER CRIMINAL OPERATIONS.(all legal) Sex, dugs, guns, murder ....
    I am a power addict so I would work for either one. I think I would be good at both.
     
  10. jcentglobal

    jcentglobal Newbie

    Joined:
    Feb 8, 2010
    Messages:
    23
    Likes Received:
    5
    Soliciting the recruitment of Federal Agents or services is in fact violation of the Jerry Hunan act of 2005, a recently updated law passed in December of 2005.

    All Federal Agencies have the right to top secret documentation, recruitment tactics, and omissions of undercover agents in the field. Any request, propaganda, or research done on behalf of the FBI without written authorization is a crime punishable by DEATH.

    I suggest the OP remove this thread, get a new social security number, birth certificate, and surname before it's too late and task force agents are knocking down your door with a battle axe.
     
  11. xxf8xx

    xxf8xx Supreme Member

    Joined:
    Nov 30, 2009
    Messages:
    1,321
    Likes Received:
    596
    Occupation:
    IM
    lol you think they're going to go after him over one silly thread? They have much better things to do...
     
  12. The Scarlet Pimp

    The Scarlet Pimp Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 2, 2008
    Messages:
    788
    Likes Received:
    3,120
    Occupation:
    Chair moistener.
    Location:
    Cyberspace
    anyone who thinks they're not being monitored is clueless.
    i first read this intel 9+ years back.

    TEMPEST & Emanation Monitoring

    Tempest was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommunications devices to emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data.

    Tempest's name is believed to have been a code name used during development by the U. S. government in the late 1960s, but at a somewhat later stage, it became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions.

    Today, in military circles, the term has been officially supplanted by Emsec (for Emissions Security); however, the term Tempest is still widely used in the civilian arena.

    Exactly when it was first noticed that certain devices can emanate decipherable data is unclear. (The practice of monitoring and capturing such data is known as van Eck phreaking after the author of a formal paper on the subject.)

    Today, cathode ray tube (CRT) and to a lesser extent liquid crystal display (LCD) monitors, microchips, and composite devices such as printers and PCs all emit EMR into space or into some conductive medium (such as power lines, communications wires, or even water piping).

    The EMR that is emitted contains, to varying degrees, the information that the device is displaying, creating, storing, or transmitting. With the correct equipment and techniques, it is possible to reconstruct all or a substantial portion of that data.

    Some equipment is far more susceptible than others. For example, some US Robotics data/fax modems generate incredibly strong EMR when active, which can be read even by comparatively crude equipment. Wireless handsets and office speaker-phones are other devices that generate extremely strong EMR signals.

    The range in which an eavesdropper can monitor emanations varies tremendously according to conditions. In most cases, the emanations can be picked up with proper equipment from a distance of around 200-300 meters.

    However, in some cases where a signal has been captured by a conductive medium (such as a power line), monitoring can occur over a distance of many kilometers.

    Monitoring devices include various kinds of sensitive receivers, which can monitor a wide range of frequencies, and a combination of hardware and software that is capable of processing the received signals into the original data.

    The data that is picked up is often corrupted by such things as external EMR interference, signal weakness over distances, and partial transmission. Advanced algorithms can help provide a more complete picture of the original information.

    Shielding of devices from EMR is achieved by a number of methods. The most sophisticated devices use advanced micro-components that have been designed from scratch to minimize Tempest emanations. Generally, shielding involves encompassing the device in a Faraday cage that does not permit stray emanations, along with special modifications to the power source.

    This usually involves a heavy metal case around an object. Tempest shielding also involves such issues as the design of a room and placement of equipment within it, to ensure that no information can escape.

    For individuals who wish to be more secure against Van Eck phreaking but cannot invest in this level of equipment, some software products recommend special displays that limit the effectiveness of monitoring of emanations from a CRT monitor. National Communications Security Committee Directive 4 sets U.S. Tempest (shielding) standards.

    The requirements are set out in document NACSIM 5100A, which is classified. Tempest certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved Tempest-shielded devices are classed into 3 categories.

    Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use.

    In the private arena, there are few individuals who are competent in Tempest technology. With only a handful of exceptions, the only qualifications of significance come from individuals who have served in either the military or intelligence communities and who have attended courses run and approved by the NSA, namely the ones held at Lackland Air Force Base, just outside San Antonio, Texas or at National Cryptologic School at Linthicum, Maryland.

    As a note of warning, there is nothing illegal in the U.S. in attempting to procure equipment that is Tempest-shielded, though some devices are classified and only obtainable to authorized entities. You are free (subject to patent law and FCC guidelines for spurious admissions) to make any modifications to equipment to shield them from attack.

    However, securing or attempting to secure surveillance devices is illegal and can subject all individuals involved to severe penalties. Even "scam" technology that is completely ineffective will get individuals into trouble, as the law relates also to intention. Full details are available at US Code / Title 18 - Crimes and Criminal Procedures / Part 1 - Crimes / Chapter 119, 2510 to 2521). The only exceptions to this are related to the military, intelligence agencies, and law enforcement bodies with court orders.

    http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci522583,00.html
     
    • Thanks Thanks x 2
  13. yagrooza

    yagrooza Junior Member

    Joined:
    Feb 23, 2010
    Messages:
    120
    Likes Received:
    9
    they don't...