
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Son of top DHS border cop busted for running cocaine
Bitcoin Foundation Plays Down Silk Road Connection at Senate Hearing
Police Arrest Gas Buyer In New York
Three Strikes and You're Out: After 20 Years, Is the Law Working?
Trump Wants a New Afghan Surge. That’s a Terrible Idea.
Give a Drunk (or Anyone) a Free Ride Home, Face $500 Fine
Boston Marathon Witness Interview: Police Told Us Bomb Drill Was 'Training Exercise'
Chinese Hotel: 6 Days to Build
California: Laws That Are 'Impossible' to Follow Can Still Be Constitutional
Police Crackdown at Burning Man Alarms the Community
Russia urges Syria hand over chemical weapons to int'l control
How the NSA Converts Spoken Words Into Searchable Text
Don't Agree with the Mayor's Politics? No Permits for You!
NSA; The Not Secure Agency
Polish Finance Official: Bitcoin is Not Illegal