Freedom4um

Status: Not Logged In; Sign In

Miscellaneous
See other Miscellaneous Articles

Title: FBI created fake Seattle Times Web page to nab bomb-threat suspect
Source: Seattle Times
URL Source: http://seattletimes.com/html/localn ... 24888170_fbinewspaper1xml.html
Published: Oct 29, 2014
Author: Mike Carter - Seattle Times staff report
Post Date: 2014-10-29 15:38:00 by purplerose
Keywords: FBI fake news, Copyright infringement
Views: 74
Comments: 5

The FBI in Seattle created a fake news story on a bogus Seattle Times web page to plant software in the computer of a suspect in a series of bomb threats to Lacey’s Timberline High School in 2007, according to documents obtained by the Electronic Frontier Foundation (EFF) in San Francisco.

The deception was publicized Monday when Christopher Soghoian, the principal technologist for the American Civil Liberties Union in Washington, D.C., revealed it on Twitter.

In an interview, Soghoian called the incident “outrageous” and said the practice could result in “significant collateral damage to the public trust” if law enforcement begins co-opting the media for its purposes. The EFF documents reveal that the FBI dummied up a story with an Associated Press byline about the Thurston County bomb threats with an email link “in the style of The Seattle Times,” including details about subscriber and advertiser information.

The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents. A juvenile suspect was identified and arrested June 14.

The revelation brought a sharp response from the newspaper. “We are outraged that the FBI, with the apparent assistance of the U.S. Attorney’s Office, misappropriated the name of The Seattle Times to secretly install spyware on the computer of a crime suspect,” said Seattle Times Editor Kathy Best. “Not only does that cross a line, it erases it,” she said. “Our reputation and our ability to do our job as a government watchdog are based on trust. Nothing is more fundamental to that trust than our independence — from law enforcement, from government, from corporations and from all other special interests,” Best said. “The FBI’s actions, taken without our knowledge, traded on our reputation and put it at peril.” An AP spokesman also criticized the tactic. “We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP,” Paul Colford, director of AP media relations. “This ploy violated AP’s name and undermined AP’s credibility.” Frank Montoya Jr., the special agent in charge of the FBI in Seattle, defended the investigation and the technique, which court records show led to the arrest and conviction of a 15-year-old student.

“Every effort we made in this investigation had the goal of preventing a tragic event like what happened at Marysville and Seattle Pacific University,” Montoya said. “We identified a specific subject of an investigation and used a technique that we deemed would be effective in preventing a possible act of violence in a school setting.

“Use of that type of technique happens in very rare circumstances and only when there is sufficient reason to believe it could be successful in resolving a threat,” he said.

Ayn Dietrich-Williams, the spokeswoman for the FBI-Seattle, pointed out that the bureau did not use a “real Seattle Times article, but material generated by the FBI in styles common in reporting and online media.” Assistant U.S. Attorney Tessa Gorman, chief of the office’s criminal division, was reviewing the EFF documents provided to her by The Times and had no immediate comment. Kathryn Warma, the prosecutor who oversaw the case, has since retired.

The EFF posted 172 pages of documents concerning the FBI’s use of a software tool called a “Computer and Internet Protocol Address Verifier” (CIPAV) in two cases — one involving the Timberline High School bomb threats and the other involving an extortion attempt against a cruise line in Florida. More than half of the documents relate to the Seattle case. According to the documents, CIPAV lets the FBI “geophysically” locate a computer and its Internet Protocol address.

Soghoian said the software is activated when someone clicks on the bogus link. The technique apparently exploits the same computer-security vulnerabilities used by hackers.

Police in Lacey, Thurston County, contacted the Northwest Cyber-Crime Task Force after the school began receiving a series of bomb threats beginning in late May 2007 and continuing into early June. The school was forced to evacuate students at least twice, and police were unable to identify a suspect. The documents indicate the FBI in Seattle obtained a search warrant to “deploy” the CIPAV software after the task force, which is run by the FBI, received a public tip about a suspect. Special Agent Norman Sanders, in seeking the warrant, said the bureau would send a “communication” to the suspect’s computer that would make the computer identify itself for the agent.

The case was taken up by the U.S. Attorney’s Office, which helped draft and approve the warrant. The warrant does not say that “communication” would be a bogus news story that appeared to be published online by The Seattle Times. Mike Carter: mcarter@seattletimes.com or 206-464-3706

Originally published October 27, 2014 at 7:43 PM | Page modified October 29, 2014 at 9:55 AM


Indeed, this is old news but it was brought up on FNC this afternoon.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: purplerose (#0)

The documents indicate the FBI in Seattle obtained a search warrant to “deploy” the CIPAV software after the task force, which is run by the FBI, received a public tip about a suspect. Special Agent Norman Sanders, in seeking the warrant, said the bureau would send a “communication” to the suspect’s computer that would make the computer identify itself for the agent.

Not true.

From the fourth paragraph of this poorly written article:

"The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents."

This would be one of the least egregious uses of the internet by the feebs that I've read about; it was specific, there was a warrant issued, and then an apprehension of the suspect.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2014-10-29   16:17:21 ET  Reply   Trace   Private Reply  


#2. To: Lod (#1)

FBI confirms it used fake story, denies bogus Times Web link

se attletimes.com/html/loc...4799_fbifakestoryxml.html

Easy enough to spot a ruse. ;)

"When bad men combine, the good must associate; else they will fall, one by one." Edmund Burke

BTP Holdings  posted on  2014-10-29   17:56:14 ET  Reply   Trace   Private Reply  


#3. To: purplerose (#0)

Best said. “The FBI’s actions, taken without our knowledge, traded on our reputation and put it at peril.”

LOL

Yeah, and we haven't had any trust issues with the government 'til now.

Katniss  posted on  2014-10-29   18:27:46 ET  Reply   Trace   Private Reply  


#4. To: Lod (#1)

If feds wanted to nab their suspect why did they have to impersonate Associated Press? This puts the AP in a false light as well as misuse of their trademark name to create a false story.

purplerose  posted on  2014-10-29   23:57:49 ET  Reply   Trace   Private Reply  


#5. To: purplerose (#0) (Edited)

Condensed version:

The FBI in Seattle created a fake news story on a bogus Seattle Times web page to plant software in the computer of a suspect in a series of bomb threats to Lacey’s Timberline High School in 2007,

The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents. A juvenile suspect was identified and arrested June 14.

Frank Montoya Jr., the special agent in charge of the FBI in Seattle, defended the investigation and the technique, which court records show led to the arrest and conviction of a 15-year-old student.

Montoya said. “We identified a specific subject of an investigation and used a technique that we deemed would be effective

The EFF posted 172 pages of documents concerning the FBI’s use of a software tool called a “Computer and Internet Protocol Address Verifier” (CIPAV) in two cases — one involving the Timberline High School bomb threats and the other involving an extortion attempt against a cruise line in Florida. More than half of the documents relate to the Seattle case. According to the documents, CIPAV lets the FBI “geophysically” locate a computer and its Internet Protocol address.

Soghoian said the software is activated when someone clicks on the bogus link. The technique apparently exploits the same computer-security vulnerabilities used by hackers.

Police in Lacey, Thurston County, contacted the Northwest Cyber-Crime Task Force after the school began receiving a series of bomb threats beginning in late May 2007 and continuing into early June.

The EFF posted 172 pages of documents concerning the FBI’s use of a software tool called a “Computer and Internet Protocol Address Verifier” (CIPAV) in two cases — one involving the Timberline High School bomb threats and the other involving an extortion attempt against a cruise line in Florida. More than half of the documents relate to the Seattle case. According to the documents, CIPAV lets the FBI “geophysically” locate a computer and its Internet Protocol address.

Soghoian said the software is activated when someone clicks on the bogus link. The technique apparently exploits the same computer-security vulnerabilities used by hackers.

Police in Lacey, Thurston County, contacted the Northwest Cyber-Crime Task Force after the school began receiving a series of bomb threats beginning in late May 2007 and continuing into early June. The school was forced to evacuate students at least twice, and police were unable to identify a suspect. The documents indicate the FBI in Seattle obtained a search warrant to “deploy” the CIPAV software after the task force, which is run by the FBI, received a public tip about a suspect. Special Agent Norman Sanders, in seeking the warrant, said the bureau would send a “communication” to the suspect’s computer that would make the computer identify itself for the agent.

This is like a logic puzzle in a crossword/game book so, to more readily spot the flaws that indicate this story about a fake FBI story is probably itself the reprehensible fake one, it is assistive to reduce the superfluous "noise" in it as much as we can but still have it be comprehensible. That being done, am cross-referencing a short excerpt from 4um Title: Does the CIA want Republicans to win the midterms? for contrast:

the clock continues to tick on what remains of the statute of limitations for anyone at the CIA to be held legally accountable for systematically torturing dozens of suspects, let along habitually lying about it it to the public and other branches of government.

The 15-year old suspect would have been about 8 years old at the time of the alleged threat but he probably wasn't a CIA agent, so no statute of limitations clock ticking down in that child prankster?'s juvenile case of such delayed hot pursuit antics by the suddenly hyperintensive FBI. The local Police probably could have located him easier by inquiring at the district School Board as to the address of his residence on file there and at the Post Office for any parental/guardian change of address info if they still couldn't find him. But no. The busy FBI, that knew exactly who he was and where he was on MySpace, didn't want to go that route and have any co-nabbing credit go to the Cops, nor did they strongarm MySpace to hand over to them any geophysical location info it might have about that, as might be expected these days. They thought it best to concoct a fake news story on the off-chances that a teenager would be interested someday soon in reading a news article at all enough to click on the link and would also click on the link from his own computer rather than someone else's that he might be using or a Library computer. None of that makes much sense but the AP and other orgs mentioned posture anyway as if it must be the truth. If it is a fake story, as I suspect, what could be the motive(s) for the FBI and others involved to spook and intimidate the public so? I can only guess that they'd like people to decide that they should read their e-mail on a Library computer instead of their own, where they are sure to be tracked as they do by their card info [Edit to add: unless naybe they're using someone else's card].

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2014-11-07   4:48:40 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest