User Panel
|
Quoted:
Three generations of copies, then a B&W scan or fax. Edit: I was doing call center tech support for printers and copiers back in 2001, and this had already been around for a while on color copiers and printers. I wouldn't expect someone who didn't understand the concept of logging print jobs on a server to understand this, but I would question how the hell she got a security clearance. http://i0.kym-cdn.com/entries/icons/original/000/001/461/Good_Luck_I_m_Behind_7_Proxies.jpg View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
So if I print anything that is restricted, I should make a photocopy and throw the original away. 10-4 Edit: I was doing call center tech support for printers and copiers back in 2001, and this had already been around for a while on color copiers and printers. I wouldn't expect someone who didn't understand the concept of logging print jobs on a server to understand this, but I would question how the hell she got a security clearance. http://i0.kym-cdn.com/entries/icons/original/000/001/461/Good_Luck_I_m_Behind_7_Proxies.jpg |
|
Quoted:
How is this a secret feature I've know about it for over a decade. View Quote Could have just printed it and then OCR'd it and avoided any chance of this. Then print on inkjet or put it on a USB stick they paid with cash. Handing over a hard copy of any document that was laser printed is a douchebag newbie mistake. |
|
Quoted:
Odds are the technology is in that one as well. This was part of how they tracked down the Citizens' Commission to Investigate the FBI back in 1971 View Quote View All Quotes View All Quotes Quoted:
Quoted:
lpt monochrome laser from 1994 ftw! This was part of how they tracked down the Citizens' Commission to Investigate the FBI back in 1971 Mike |
|
Quoted:
Steps for success: Purchase throw-away digital camera with cash from a store. Smuggle in. Pull up document on computer. Take pictures of document. Use public computer in a library or something to access a throwaway email account through a public proxy server. Scrub EXIF data from pictures, send to reporter. Destroy camera. Destroy memory card. View Quote |
|
|
Just because you didn't know something exists doesn't make it a secret, it just makes you ignorant.
|
|
|
Quoted:
That's cool other than the possible cameras at the library, View Quote View All Quotes View All Quotes The majority of which do not work. I can tell you stories for days. But that is the point of using a public proxy...even if they can see you went to the library on a camera system, tracking an email to the workstation you used is difficult. Public libraries often have a hear no evil, see no evil approach to what is going on in their facility. They often actively destroy useful data simply because they do not wish to be involved in any investigations. access logging on documents That's the biggest problem right there. Access document with credentials and there should be a damn good reason for it. If not, you are immediately under suspicion. It would be difficult to actually prove a criminal charge just based on having accessed the document. email tracking logging If one was intelligent enough to use a burner email account created from aforementioned workstation using a proxy it would be quite difficult to pin down who the email belonged to. Many of these public workstations also use either software that completely erases all user-made changes with every restart, or that will essentially use a differencing VHD that gets re-created with every restart. Meaning the data of what happened on a particular session on a workstation is eliminated from the workstation completely. and every camera on a gas station, bank, and random house between the workplace and the library. It would also be wise to not actually use any credit cards or even have your cell phone when on these little journeys to the library, as that would be a big arrow pointing at you. Once again, not enough for a criminal conviction but enough to point them further in your direction. Assuming, of course, they could identify which workstation the communication came from in the first place. Accessing a controlled document with one's own credentials from one's own workstation is the riskiest part of the chain. That and perhaps smuggling in a camera if they are routinely being searched in and out. (Folded paper makes me think they aren't) It's even less risky if you can get someone else's credentials and use someone else's machine to access the data. Given how many people have a post-it note with their password on it somewhere in their office even that isn't all that difficult. This person is in the papers because she's low hanging fruit. She was dumb and she's going to get hammered hard because she made it easy and they have a need to put some fear in other leakers who aren't as stupid. |
|
In this thread Ive learned that people think they are smart if they state that theyve known about printer dots for like, ever.
|
|
Quoted:
Steps for success: Purchase throw-away digital camera with cash from a store. Smuggle in. Pull up document on computer. Take pictures of document. Use public computer in a library or something to access a throwaway email account through a public proxy server. Scrub EXIF data from pictures, send to reporter. Destroy camera. Destroy memory card. View Quote |
|
lol at "secret". It's only a secret to anyone not in the computer, printer or cyber security business.
I can think of a lot of things in my business that someone not in that business won't know, none of them are secrets. Well, except for the special mod to Google Glass that let's us see through women's clothing, now that's a real secret. Wait...I didn't just say that....I did NOT say that! |
|
|
|
|
Quoted:
There's a few problems with that plan. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Steps for success: Purchase throw-away digital camera with cash from a store. Smuggle in. Pull up document on computer. Take pictures of document. Use public computer in a library or something to access a throwaway email account through a public proxy server. Scrub EXIF data from pictures, send to reporter. Destroy camera. Destroy memory card. |
|
Quoted:
Steps for success: Purchase throw-away digital camera with cash from a store. Smuggle in. Pull up document on computer. Take pictures of document. Use public computer in a library or something to access a throwaway email account through a public proxy server. Scrub EXIF data from pictures, send to reporter. Destroy camera. Destroy memory card. View Quote |
|
Quoted:
I can tell you that a lot of public libraries do not have security cameras at all, or if they do have security cameras they do not work properly. View Quote View All Quotes View All Quotes Quoted:
Quoted:
No security cameras at any of those places. Nope, none at all. Only at the most highly trusted levels would names be mentioned, and then only as necessary. |
|
Quoted:
I prefer to have a zero tolerance for things that could get me fingered if I'm a source. View Quote ...then you wouldn't be leaking in the first place. There is some risk involved in the decision to break the law in the first place. Had she followed the steps I outlined, it is highly unlikely she'd be facing criminal charges ATM. She'd be under some level of suspicion, but so would the other 6 who accessed the document. Re-tracing the steps of all those people would have been difficult and time consuming. Luckily she made it stupid easy...which is why she was in cuffs mere hours after the story went live. |
|
Quoted:
That's just one of any number of ways to track someone who printed a document. She fucked herself completely. If you're going to try and smuggle secrets, you should probably have some understanding of how technology works. She could have gotten away with this in any number of ways. This is a recurring theme with the libtards. Hillary's servers and the DNC got hacked because apparently nobody in her circle of power had any fucking idea how computers work. View Quote QFT!! "But, but, if the Russians weren't colluding with the RNC, there would be tons of RNC hacks too!" I'm sure it has nothing to do with the fact that A- the RNC is smart enough to hire good IT people and B- if they are/were doing illegal/immoral shit, they are smart enough to not do it via gmail and on their intranet |
|
Quoted:
...then you wouldn't be leaking in the first place. There is some risk involved in the decision to break the law in the first place. Had she followed the steps I outlined, it is highly unlikely she'd be facing criminal charges ATM. She'd be under some level of suspicion, but so would the other 6 who accessed the document. Re-tracing the steps of all those people would have been difficult and time consuming. Luckily she made it stupid easy...which is why she was in cuffs mere hours after the story went live. View Quote |
|
|
|
View Quote |
|
Quoted:
When the Democrats want to prosecute a Republican for leaking information........ View Quote Dude didn't even leak classified info. He got hammered for "lying to the FBI" in a non-scandal that turned out to not really involve him at all. Didn't stop the dems from screeching because they wanted Cheney's head. |
|
Yeah, I knew about that!! That's why counterfeiters seek out and buy those older printers!
|
|
|
Who didn't know that laser printers have this security feature?
|
|
|
You mean to tell me the NSA has better resolution on our printers than I'm able to access as the buyer/owner of the printer?
Seriously, some of the dog shit I've seen HP printers put out over the years, I'm shocked anyone can decipher anything. |
|
That's been known for years. Other folks have been busted the same way.
iirc that is how they found that bomber who blew up a judge. |
|
Quoted:
Secrets are everywhere.. Usually hidden in books and technical specs. View Quote View All Quotes View All Quotes |
|
Quoted:
That's just one of any number of ways to track someone who printed a document. She fucked herself completely. If you're going to try and smuggle secrets, you should probably have some understanding of how technology works. She could have gotten away with this in any number of ways. This is a recurring theme with the libtards. Hillary's servers and the DNC got hacked because apparently nobody in her circle of power had any fucking idea how View Quote Because in order to be the "supreme being" in that group of morons, you only have to reach the level known as "potato". |
|
|
|
Quoted:
The majority of which do not work. I can tell you stories for days. But that is the point of using a public proxy...even if they can see you went to the library on a camera system, tracking an email to the workstation you used is difficult. Public libraries often have a hear no evil, see no evil approach to what is going on in their facility. They often actively destroy useful data simply because they do not wish to be involved in any investigations. That's the biggest problem right there. Access document with credentials and there should be a damn good reason for it. If not, you are immediately under suspicion. It would be difficult to actually prove a criminal charge just based on having accessed SNIP View Quote |
|
This Spy Lasted Years--No Printing, No Removal From Workplace
She kept it in her head and then went home and wrote it down. Some years later, she bought a word processor or laptop.That nailed her as she submitted it as an expense to the Cubans. A CIA mole in the DGI told them " the mole bought a laptop in this part of Virginia on this date". Credit card record search . |
|
Quoted:
This particular tech has been in widespread use for as long as I can remember and it isn't a secret .... at all. View Quote View All Quotes View All Quotes |
|
|
What I don't get is that without the NSA having received the document to backtrack the printer stuff how would she have been caught?
|
|
Mailing it from the town she lives in helped too. Besides being stupid, she was really stupid.
|
|
|
Quoted:
This Spy Lasted Years--No Printing, No Removal From Workplace She kept it in her head and then went home and wrote it down. Some years later, she bought a word processor or laptop.That nailed her as she submitted it as an expense to the Cubans. A CIA mole in the DGI told them " the mole bought a laptop in this part of Virginia on this date". Credit card record search . View Quote |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.