{"id":248,"date":"2011-03-28T21:34:53","date_gmt":"2011-03-29T04:34:53","guid":{"rendered":"http:\/\/www.analogrithems.com\/rant\/?p=248"},"modified":"2011-04-28T13:43:37","modified_gmt":"2011-04-28T20:43:37","slug":"creating-plausible-deniability","status":"publish","type":"post","link":"https:\/\/www.analogrithems.com\/rant\/creating-plausible-deniability\/","title":{"rendered":"Creating Plausible Deniability"},"content":{"rendered":"<p>This topic seems confusing to most, but it will very easily save you when you need it. \u00c2\u00a0I need to start right off by stating I don&#8217;t encourage anyone to break any laws. \u00c2\u00a0This information is for educational purposes only. \u00c2\u00a0I am not a lawyer and do not pretend to be one. \u00c2\u00a0This information is a result of lectures and talks with industry professionals.<\/p>\n<p>In the US constitution the burdon of proof is on the accuser and the accused is innocent until proven guilty. \u00c2\u00a0 As part of this processes it is up to the prosecutor to prove that there is\u00c2\u00a0no <a href=\"http:\/\/en.wikipedia.org\/wiki\/Reasonable_doubt\">reasonable doubt<\/a>. \u00c2\u00a0 In a crime the prosecutor would have to prove that you where the one committing the crime. \u00c2\u00a0 When computers are involved this isn&#8217;t always an easy task because usually the only witnesses are other computers. \u00c2\u00a0So things like access logs and IP addresses are then used as proof. \u00c2\u00a0To a degree this makes sense since if the attack came from the IP address that your ISP assigned to you then you are responsible right? \u00c2\u00a0Computer don&#8217;t lie and their is no reason to doubt this proof right? \u00c2\u00a0Well actually there is, what people often fail to take into account is what if your computer was hacked. \u00c2\u00a0If a criminal installs a Trojan and uses your computer then it wasn&#8217;t you who committed the crime. \u00c2\u00a0Also what if one of your neighbors is using your wifi and downloading music illegally is this your fault? \u00c2\u00a0Well according to the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Digital_Millennium_Copyright_Act\">DMCA of \u00c2\u00a02000<\/a> Title II creates a safe harbor for Internet providers. \u00c2\u00a0It basically says that Internet providers are not responsible for the content and actions of the users.<\/p>\n<p>So in the end it all really comes down to is their any reason to doubt your are the one responsible for committing the crime? \u00c2\u00a0In the computer world creating reasonable doubt is actually an easy thing to do. \u00c2\u00a0I&#8217;ve explained a few simple scenarios below that could create reasonable doubt.<\/p>\n<p>&nbsp;<\/p>\n<h2>Scenario 1<\/h2>\n<p>Currently hacker groups use army&#8217;s of zombie computers when they want to create a DDOS (Distributed Denial of Service) attack on their victims. \u00c2\u00a0They do this by installing a Trojan Virus on someones computer that will then use the computers power\/resources when they conduct their attack. \u00c2\u00a0Viruses can be stealthy and often times you may not even know you&#8217;ve been infected. \u00c2\u00a0Once you have been infected though, their is no way to say what actions where yours and what actions where the result of the virus.<\/p>\n<p>The problem is you never know what could happen to your private data if it was ever infected with a virus. \u00c2\u00a0So to make sure your computer isn&#8217;t at any real risk you could easily just download a virus kit, copy to a few different directories on our computer and delete parts of it. \u00c2\u00a0You only need to leave enough evidence to create plausible deniability. \u00c2\u00a0To make the evidence better after you download (don&#8217;t actually install or run the virus ever that would be very bad!) the virus, use an anti-virus tool to remove it. \u00c2\u00a0Pretty much every anti-virus program I&#8217;ve ever seen doesn&#8217;t know the difference between a live virus or a safely constrained copy. \u00c2\u00a0With this you have actual logs to show that you where infected with a virus.<\/p>\n<p>A few things you need to understand about this defense. \u00c2\u00a0On most computer systems when you delete a file you don&#8217;t really delete anything. \u00c2\u00a0You just removed the pointer to it. \u00c2\u00a0A data recovery specialist or forensic analyst would be able to detect the data that was previously on the drive. \u00c2\u00a0It&#8217;s a scary thought I know, but in this scenario it works in our favor. \u00c2\u00a0Since the anti-virus logs combined with the deep inspection of the drive both show remnants of a virus being on your computer you can easily show one form of plausible deniability.<\/p>\n<p>&nbsp;<\/p>\n<h2>Scenario 2<\/h2>\n<p>Another attack that has become increasingly common is people stealing Internet access from unsecured wifi (and in some cases even secured wifi). \u00c2\u00a0 If your home wifi is open to the public then their is an 80%-90% chance that someone has already used your wifi without your consent. \u00c2\u00a0I know this sounds scary, but cellphones, laptops, tablets, they are constantly scanning for wifi and many devices will automatically connect to the first open network they see. \u00c2\u00a0Newer vendors like Cisco and Linksys now provide wifi routers that create too networks, one for your guest (that is wide open) and one for your personal use that is secured. \u00c2\u00a0This now means you have two wireless networks that could potentially be abused. \u00c2\u00a0Also since both wireless networks will have the same IP once they go to the Internet their is no telling which network the abuse originated from. \u00c2\u00a0As stated above if you are providing Internet access to someone (whether with or without permission) you are not responsible what they do with that Internet access while they are on it. \u00c2\u00a0In fact if you were to sniff the traffic that is going through your network you could be accused of invading some one&#8217;s privacy.<\/p>\n<p>So what is to stop you from just opening your network wide open and allowing anyone to use your connection? \u00c2\u00a0For that matter who&#8217;s to say that your wifi wasn&#8217;t unsecured when the attack happened and then secured after the attack.\u00c2\u00a0 The EFF has actually recommended that a new movement starts to encourage people to open their wifi networks see <a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/04\/open-wireless-movement\">https:\/\/www.eff.org\/deeplinks\/2011\/04\/open-wireless-movement<\/a> All these variables come into play when it comes litigation.<\/p>\n<p>&nbsp;<\/p>\n<h1>Summary<\/h1>\n<p>&nbsp;<\/p>\n<p>As I stated before I&#8217;m not a lawyer, this information is the result of years of personal research and talks with several other industry professionals. \u00c2\u00a0The only perfect legal advice I feel that I can ever really give anyone is if you EVER get arrested\/charged\/accused of anything. \u00c2\u00a0Do NOT talk to anyone until you have a lawyer present.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This topic seems confusing to most, but it will very easily save you when you need it. \u00c2\u00a0I need to start right off by stating I don&#8217;t encourage anyone to break any laws. \u00c2\u00a0This information is for educational purposes only. \u00c2\u00a0I am not a lawyer and do not pretend to be one. \u00c2\u00a0This information is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,31,30],"tags":[],"class_list":["post-248","post","type-post","status-publish","format-standard","hentry","category-hacking","category-protesting-freedom","category-revolution"],"_links":{"self":[{"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":5,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/posts\/248\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.analogrithems.com\/rant\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}