Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

With cyber crime on the rise, Portland couple make a device to detect digital break-ins
The Oregonian ^ | 12/13/2012 | Eric Mortenson

Posted on 12/14/2012 1:45:27 PM PST by aimhigh

IPCopper . . . makes devices with the forensic firepower to detect, track and ultimately prosecute cybercrooks, hackers or spies. The company's device captures all Internet activity without alerting hackers, or internal thieves, to its presence.

Housed in tamper-proof aluminum boxes, the devices have full "packet capture" or "sniffing" capability. Placed in line between a company's Internet connection and the computers that access it, the appliances record every email, website visit or Voice Over Internet Protocol conversation in complete detail.

(Excerpt) Read more at oregonlive.com ...


TOPICS: Miscellaneous; Technical; US: Oregon
KEYWORDS: cybercrime; internet
I'm curious how hard it would be for the average person to detect an incoming threat. Catching an after-the-fact crime that originates in Russia won't help much.
1 posted on 12/14/2012 1:45:40 PM PST by aimhigh
[ Post Reply | Private Reply | View Replies]

To: aimhigh
Portland couple make a device to detect digital break-ins

And they paint a bird on it!!


2 posted on 12/14/2012 1:48:28 PM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: aimhigh

I gotta call BS on this one - bump


3 posted on 12/14/2012 1:49:30 PM PST by WorkerbeeCitizen (we are so screwed - really)
[ Post Reply | Private Reply | To 1 | View Replies]

To: aimhigh

Yeah but it won’t do anything about the viruses that come in through the power supply.


4 posted on 12/14/2012 1:59:18 PM PST by bkepley
[ Post Reply | Private Reply | To 1 | View Replies]

To: aimhigh

I'll wait for techies to rip it apart"

5 posted on 12/14/2012 2:02:43 PM PST by Doogle (USAF.68-73..8th TFW Ubon Thailand..never store a threat you should have eliminated))
[ Post Reply | Private Reply | To 1 | View Replies]

To: aimhigh
the appliances record every email, website visit or Voice Over Internet Protocol conversation in complete detail.

And transmits the data to whom?

6 posted on 12/14/2012 2:04:57 PM PST by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: WorkerbeeCitizen

“I gotta call BS on this one - bump”

I don’t think its BS. A device like this makes a raw copy of the packet, stores it, and simultaneously forwards it. You can easily do that with a cheap FPGA. You can compress the packet in realtime prior to storage too.

Of course, you need a *lot* of storage to make it useful :-). But mirroring packets as they come off the wire and pass through a MAC is not that difficult in programmable logic.


7 posted on 12/14/2012 2:04:59 PM PST by edh (I need a better tagline)
[ Post Reply | Private Reply | To 3 | View Replies]

To: WorkerbeeCitizen

Citing privacy and security concerns, Ash, 34, and Mouraveiko, 37, decline to provide detailed information of sales, names of customer firms or examples of how their products are used. They also shy away from describing how they entered the field. They say only that unnamed clients — whether corporate, defense or intelligence, they won’t say-


I agree with you. This secret, top secret, top...top...top...secret “device” is so secret that when you buy it you can’t open the sealed container to see what it has inside...too secret. As a matter of fact it is so secret that even the customer does not know what it does or where he bought it.

It is so secret that if you buy within the next few minutes they will ship you another FREE! Just pay additional postage and handling (that’s where the get you.)

The location of their business is so secret that if you need to return it for any reason, you can’t find their address.

Man! This secret + top secret + amazing secret “device” must be really good.

By the way, what ever happened to the perpetual motion machine everyone was discussing last year? I haven’t seen any on the market yet.


8 posted on 12/14/2012 2:10:25 PM PST by DH (Once the tainted finger of government touches anything the rot begins)
[ Post Reply | Private Reply | To 3 | View Replies]

To: DH

“As a matter of fact it is so secret that even the customer does not know what it does or where he bought it.”

That’s sorta like how Pelosi pitched Obamacare. Pass it, then we’ll see what’s in it.


9 posted on 12/14/2012 2:28:29 PM PST by Stormdog (A rifle transforms one from subject to Citizen)
[ Post Reply | Private Reply | To 8 | View Replies]

To: aimhigh

When I enabled sshd on its standard port, on my home machine, I was getting about 30,000 failed login-attempts per day.


10 posted on 12/14/2012 2:46:45 PM PST by jdege
[ Post Reply | Private Reply | To 1 | View Replies]

To: Stormdog

“Pass it, then we’ll see what’s in it.”

Just like a stool sample!


11 posted on 12/14/2012 2:54:02 PM PST by Dr. Bogus Pachysandra ( Ya can't pick up a turd by the clean end!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: aimhigh

Sounds like something Ironport already handles.


12 posted on 12/14/2012 3:01:18 PM PST by miliantnutcase
[ Post Reply | Private Reply | To 1 | View Replies]

To: aimhigh

This is nothing really new, Unified threat management (UTM’s) have been around in the business field for a while now. Actually a few of them offer a free version that you can load onto a low end PC with two ethernet ports that will do pretty much the same thing. Untangle and Astaro (now called Sophos) are two examples that I have experience with. The freebees are pretty capable and if you have an old PC laying around it’s a good way to put it to use. Can’t say how good this box is but I have my doubts if they are being so cagey about the details.


13 posted on 12/14/2012 3:16:43 PM PST by trapped_in_LA
[ Post Reply | Private Reply | To 1 | View Replies]

To: WorkerbeeCitizen

Why BS?
It’s just a sniffer program running on a standalone box.
You can do the same thing if you have a hub and download Wireshark.
The hub will repeat all traffic sent through it to every device connected to the hub.
Wireshark will show you what’s happening. I’ve used it to trouble shoot problems in the past.
The most sophisticated criminal networks are already using encryption to conceal what is in their traffic, and proxy networks like Tor to conceal their location. This won’t do anything about that.


14 posted on 12/14/2012 3:17:51 PM PST by Gunslingr3
[ Post Reply | Private Reply | To 3 | View Replies]

To: Dr. Bogus Pachysandra

“Just like a stool sample!”

Very clever!


15 posted on 12/14/2012 3:35:08 PM PST by Stormdog (A rifle transforms one from subject to Citizen)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Gunslingr3

I just think the claim is somewhat exaggerated.

It is one thing to monitor traffic and detect a hack but quite another to track him down to his home and prosecute him/them/her.

as you pointed out, most hacks use proxies and encryption so even if you detect him that’s about all you can do unless he is just being sloppy


16 posted on 12/14/2012 4:04:13 PM PST by WorkerbeeCitizen (we are so screwed - really)
[ Post Reply | Private Reply | To 14 | View Replies]

To: WorkerbeeCitizen

Even if you know that it was ali okpong in indonesia connecting through a proxy and an abandoned ip block in the USC school system...who is going to prosecute it?

How are you going to explain to the police in Indonesia that someone is trying to find the credit card information on your computer?


17 posted on 12/15/2012 7:17:20 AM PST by willyd (Don't shoot, we're Republicans!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: aimhigh

Anyone can run a packet sniffer a lot of free ones are available some firewalls already have the capability the real challenge is having someone who can decipher it all even hard for someone who understands it!
I use IP Tables for a firewall any traffic that is not asked for by my computer is blocked period all those blinking ads and popups are blocked any third party traffic is blocked and yes sometimes i have to loosen the rules to get webpages to load but it is worth that trouble!!!!


18 posted on 12/15/2012 7:48:45 AM PST by Lees Swrd ("Arms discourage and keep the invader and plunderer in awe and preserve order in the world as well")
[ Post Reply | Private Reply | To 1 | View Replies]

To: willyd

exactly


19 posted on 12/15/2012 1:36:10 PM PST by WorkerbeeCitizen (we are so screwed - really)
[ Post Reply | Private Reply | To 17 | View Replies]

To: DH
By the way, what ever happened to the perpetual motion machine everyone was discussing last year? I haven’t seen any on the market yet.

Sure it has; it's called, in the vernacular, "the debt ceiling."

20 posted on 12/16/2012 12:09:27 PM PST by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson