[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.54888263 [View]
File: 80 KB, 1024x572, DPR.jpg [View same] [iqdb] [saucenao] [google]
54888263

Who - Is this case pertaining to an administrator/vendor/buyer/hacker/activist?
What - What was the reason for arrest? (drugs, fraud, activism etc)
Where - Was the person located in the same geographical area as the attacker?
When - When did it go wrong, and how long did it take to compromise the users opsec and how long after compromise was it actioned?
How - What was the mistake made that caused the initial opsec breech?

*Note: 9/10 times, opsec is broken by a breakdown in our procedure, not some very advanced, expensive NSA tier hack, opsec has to be maintained 100% of the time to remain secure, an attacker only needs to be lucky once.

>Case files

All that is left is to get to the reading, i tried to get a variety of cases representing different scenarios from DNM vendors to MFH honeypots. If you don't feel like reading DOJ filings, you can also head over to darknetlive where they give synopsis of all the current cases, unfortunately 4chins throws a spam filter to the site so i cannot link the interesting ones here directly. Take them with a grain of salt as many don't include the reference material, but it still makes for interesting reading.

>Links

https://www.justice.gov/media/1116921/dl?inline= cyber task force
https://www.justice.gov/opa/press-release/file/982821/download alphabay
https://www.justice.gov/usao-sdny/press-release/file/1549821/download silk road
https://storage.courtlistener.com/recap/gov.uscourts.waed.95157/gov.uscourts.waed.95157.1.0.pdf
Ronald Craig Ilg (honeypot)
https://www.courtlistener.com/docket/65017549/united-states-v-trainor/

Navigation
View posts[+24][+48][+96]