[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Methylene Blue Benefits

Another Mossad War Crime

80 served arrest warrants at 'cartel afterparty' in South Carolina

When Ideas Become Too Dangerous To Platform

The silent bloodbath that's tearing through the middle-class

Kiev Postponed Exchange With Russia, Leaves Bodies Of 6,000 Slain Ukrainian Troops In Trucks

Iranian Intelligence Stole Trove Of Sensitive Israeli Nuclear Files

In the USA, the identity of Musk's abuser, who gave him a black eye, was revealed

Return of 6,000 Soldiers' Bodies Will Cost Ukraine Extra $2.1Bln

Palantir's Secret War: Inside the Plot to Cripple WikiLeaks

Digital Prison in the Making?

In France we're horrified by spending money on Ukraine

Russia has patented technology for launching drones from the space station

Kill ICE: Foreign Flags And Fires Sweep LA

6,000-year-old skeletons with never-before-seen DNA rewrites human history

First Close Look at China’s Ultra-Long Range Sixth Generation J-36Jet

I'm Caitlin Clark, and I refuse to return to the WNBA

Border Czar Tom Homan: “We Are Going to Bring National Guard in Tonight” to Los Angeles

These Are The U.S. States With The Most Drug Use

Chabria: ICE arrested a California union leader. Does Trump understand what that means?Anita Chabria

White House Staffer Responsible for ‘Fanning Flames’ Between Trump and Musk ID’d

Texas Yanks Major Perk From Illegal Aliens - After Pioneering It 24 Years Ago

Dozens detained during Los Angeles ICE raids

Russian army suffers massive losses as Kremlin feigns interest in peace talks — ISW

Russia’s Defense Collapse Exposed by Ukraine Strike

I heard libs might block some streets. 🤣

Jimmy Dore: What’s Being Said On Israeli TV Will BLOW YOUR MIND!

Tucker Carlson: Douglas Macgregor- Elites will be overthrown

🎵Breakin' rocks in the hot sun!🎵

Musk & Andreessen Predict A Robot Revolution


Miscellaneous
See other Miscellaneous Articles

Title: FBI created fake Seattle Times Web page to nab bomb-threat suspect
Source: Seattle Times
URL Source: http://seattletimes.com/html/localn ... 24888170_fbinewspaper1xml.html
Published: Oct 29, 2014
Author: Mike Carter - Seattle Times staff report
Post Date: 2014-10-29 15:38:00 by purplerose
Keywords: FBI fake news, Copyright infringement
Views: 215
Comments: 5

The FBI in Seattle created a fake news story on a bogus Seattle Times web page to plant software in the computer of a suspect in a series of bomb threats to Lacey’s Timberline High School in 2007, according to documents obtained by the Electronic Frontier Foundation (EFF) in San Francisco.

The deception was publicized Monday when Christopher Soghoian, the principal technologist for the American Civil Liberties Union in Washington, D.C., revealed it on Twitter.

In an interview, Soghoian called the incident “outrageous” and said the practice could result in “significant collateral damage to the public trust” if law enforcement begins co-opting the media for its purposes. The EFF documents reveal that the FBI dummied up a story with an Associated Press byline about the Thurston County bomb threats with an email link “in the style of The Seattle Times,” including details about subscriber and advertiser information.

The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents. A juvenile suspect was identified and arrested June 14.

The revelation brought a sharp response from the newspaper. “We are outraged that the FBI, with the apparent assistance of the U.S. Attorney’s Office, misappropriated the name of The Seattle Times to secretly install spyware on the computer of a crime suspect,” said Seattle Times Editor Kathy Best. “Not only does that cross a line, it erases it,” she said. “Our reputation and our ability to do our job as a government watchdog are based on trust. Nothing is more fundamental to that trust than our independence — from law enforcement, from government, from corporations and from all other special interests,” Best said. “The FBI’s actions, taken without our knowledge, traded on our reputation and put it at peril.” An AP spokesman also criticized the tactic. “We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP,” Paul Colford, director of AP media relations. “This ploy violated AP’s name and undermined AP’s credibility.” Frank Montoya Jr., the special agent in charge of the FBI in Seattle, defended the investigation and the technique, which court records show led to the arrest and conviction of a 15-year-old student.

“Every effort we made in this investigation had the goal of preventing a tragic event like what happened at Marysville and Seattle Pacific University,” Montoya said. “We identified a specific subject of an investigation and used a technique that we deemed would be effective in preventing a possible act of violence in a school setting.

“Use of that type of technique happens in very rare circumstances and only when there is sufficient reason to believe it could be successful in resolving a threat,” he said.

Ayn Dietrich-Williams, the spokeswoman for the FBI-Seattle, pointed out that the bureau did not use a “real Seattle Times article, but material generated by the FBI in styles common in reporting and online media.” Assistant U.S. Attorney Tessa Gorman, chief of the office’s criminal division, was reviewing the EFF documents provided to her by The Times and had no immediate comment. Kathryn Warma, the prosecutor who oversaw the case, has since retired.

The EFF posted 172 pages of documents concerning the FBI’s use of a software tool called a “Computer and Internet Protocol Address Verifier” (CIPAV) in two cases — one involving the Timberline High School bomb threats and the other involving an extortion attempt against a cruise line in Florida. More than half of the documents relate to the Seattle case. According to the documents, CIPAV lets the FBI “geophysically” locate a computer and its Internet Protocol address.

Soghoian said the software is activated when someone clicks on the bogus link. The technique apparently exploits the same computer-security vulnerabilities used by hackers.

Police in Lacey, Thurston County, contacted the Northwest Cyber-Crime Task Force after the school began receiving a series of bomb threats beginning in late May 2007 and continuing into early June. The school was forced to evacuate students at least twice, and police were unable to identify a suspect. The documents indicate the FBI in Seattle obtained a search warrant to “deploy” the CIPAV software after the task force, which is run by the FBI, received a public tip about a suspect. Special Agent Norman Sanders, in seeking the warrant, said the bureau would send a “communication” to the suspect’s computer that would make the computer identify itself for the agent.

The case was taken up by the U.S. Attorney’s Office, which helped draft and approve the warrant. The warrant does not say that “communication” would be a bogus news story that appeared to be published online by The Seattle Times. Mike Carter: mcarter@seattletimes.com or 206-464-3706

Originally published October 27, 2014 at 7:43 PM | Page modified October 29, 2014 at 9:55 AM


Indeed, this is old news but it was brought up on FNC this afternoon.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 4.

#1. To: purplerose (#0)

The documents indicate the FBI in Seattle obtained a search warrant to “deploy” the CIPAV software after the task force, which is run by the FBI, received a public tip about a suspect. Special Agent Norman Sanders, in seeking the warrant, said the bureau would send a “communication” to the suspect’s computer that would make the computer identify itself for the agent.

Not true.

From the fourth paragraph of this poorly written article:

"The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents."

This would be one of the least egregious uses of the internet by the feebs that I've read about; it was specific, there was a warrant issued, and then an apprehension of the suspect.

Lod  posted on  2014-10-29   16:17:21 ET  Reply   Untrace   Trace   Private Reply  


#4. To: Lod (#1)

If feds wanted to nab their suspect why did they have to impersonate Associated Press? This puts the AP in a false light as well as misuse of their trademark name to create a false story.

purplerose  posted on  2014-10-29   23:57:49 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 4.

        There are no replies to Comment # 4.


End Trace Mode for Comment # 4.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]