“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Judge, Jury, and Executioner: Questions on the Legality of Executive Assassination
The “I Thought Bonds Were Safe” Fallacy…
You may already be a winner in NSA’s “three-degrees” surveillance sweepstakes!
Blackwater's Erik Prince: Blackwater Was 'Virtual Extension' Of The CIA
Who's 'the Harvey Weinstein of' Sex Work? The Police
Et Tu, Brute? (How Empires Die)
After U.S. Troops Leave, Armed Drones Will Patrol Afghanistan’s Skies
Police Officers Took 1,196 American Lives in 2015
With Scandals Raging At Home, Obama Discovers Chemical Weapons Use in Syria
CA “Heroes” Beat Motorist Over Tinted Windows, “Missing” Front Plate
DOJ Suspends $1.2 Billion Asset Forfeiture 'Equitable Sharing' Program
Cop Fired for Speaking Out Against Ticket and Arrest Quotas
Companies Tell Employees to Find Their Own Health Insurance Policies
MSNBC Blames Boston Bombing on “Deeply Racist” Alex Jones
Online Retail Giant Newegg Now Accepts Bitcoin