Digging Into Your Twitter, Facebook and other Social Media

Discussion in 'General Discussion' started by Yard Dart, Apr 19, 2013.

  1. Yard Dart

    Yard Dart Vigilant Monkey Moderator

    I was listening to a report tonight on the Boston bombing investigation and one thing stood out to me in the interview with the fed that was talking. One of the areas they were reviewing was the 24-hour period before and after the bombing took place- with all twitter, facebook and other social media sites to see if there were any communications or other related items that would lead them to the bomber. The first thing that jumped out to me was the rights of the innocent folks with all their messages being reviewed within the area of Boston. Is this the government of our day, when they can seize any source of media and review what we say as a private conversation- I say yes it is. Many of us know exactly what can be intercepted (everything) and ran thru either a digital or human filter for further analysis. There is no right to privacy in your online communications- remember that. Everything you say is being stored, monitored and dissected for consumption by law enforcement at all levels.... just as your friendly reminder. ;)

    Investigators pursue digital clues in Boston bombings - Yahoo! News Philippines
    Motomom34, Beano, tulianr and 3 others like this.
  2. Mountainman

    Mountainman Großes Mitglied Site Supporter+++

    Good post. That is exactly why I do not use any of those sites.
    kellory and Mindgrinder like this.
  3. Mindgrinder

    Mindgrinder Karma Pirate Ninja|RIP 12-25-2017

    It's for the children....
    All your packets are belong to US.
  4. kellory

    kellory An unemployed Jester, is nobody's fool. Banned

    Yet you use this one, which can also be searched at will. I know, I landed here from a Google hit.
    CRC, Motomom34 and tulianr like this.
  5. tulianr

    tulianr Don Quixote de la Monkey

    Yeah, I've seen several fellow monkeys refer to "social media" sites as if they were some sort of devil-spawned evil, but see their activity on this site as something different. Sorry, but I've done communications traffic analysis on IP addresses of individuals who thought they were stealthily threading their way through the internet. Meanwhile, some bozo like myself was tracking them to every place they visited. It all depends on how much attention one attracts, and how interested the government is in turning your life inside out. Once you attract the wrong kind of attention, you're a bug in a petri dish, whether or not you have ever posted on facebook.
    kellory, Yard Dart and Silversnake like this.
  6. Beano

    Beano Monkey

    True story, YD. Your last two sentences resonate loudly, and it is now something which I fully believe.
  7. Mountainman

    Mountainman Großes Mitglied Site Supporter+++

    You are right and I'm sure everyone of us have posted things that should not be on here. I check out all kinds of sites, but only post on 3 of them. The Monkey is where I read and post the most. The other 2 sites that I rarely post on are a gun site and a rock band site.

    By saying "those sites" I meant the ones where most people have their real name on it, post pictures of themselves, friends and locations, and put out way to much personal info. A few people on here know my real name, but I would never post it or put pictures of myself on any site.
    kellory likes this.
  8. VHestin

    VHestin Farm Chick

    I make sure pictures I post...well recent ones, ones from 20years+ ago out of state I don't think matter, anyways I always edit pictures first before I post them to cut out stuff that I don't want known, like reflections in windows, etc.
  9. Tracy

    Tracy Insatiably Curious Moderator Founding Member

    IIRC, all tweets are being archived at the Library of Congress
  10. kellory

    kellory An unemployed Jester, is nobody's fool. Banned

    There are no pics of me, that I have put into cyberspace, but an investigator could pull up my DMV pic after he ran my email, and HTTP, land-line access, cable bills, mortgage details. And, be archiving they could then run every contact I ever made, for the length of the records they hold. and every secondary contact, and every contact they ever made, and on from there. Even if the email were a dummy email, with no personal info of any kind, they could still keep records of every address that accesses that account. You can shield from amateurs, but not from someone who already has your info recorded.
    I was receiving threats from a Craig's Lister once, who felt safe making statements that would get his butt kicked in person. I called him on it, and he replied he was untouchable, so my counter-threat of legal action was to be ignored, until I told him, "I now have your email account, and that means I could find you." "No way, says he. don't be spouten crap" I told him "that email has an address that must be tied to a phone line, cable line, or sat line, and there will be both a brick and mortar address for it, and a billing name. They can trace the entire history of that email address, and know every time it has ever been accessed, and from where. if you have ever logged in from your home, that address will be noted, and I can find you. Do I need to call in a favor and have that email address checked? or can you behave like an adult?" I never heard from him again.
    Even though, my email was set up on a library computer with unused time, that i did not buy, I know i could be tracked by a pro, who simply ran the contacts for anyone who accessed that email account. (providing, someone felt the need to find me).
    Because those contacts must exist, there can be no true privacy in cyberspace.
    Yard Dart, tulianr and Mountainman like this.
  11. Quigley_Sharps

    Quigley_Sharps The Badministrator Administrator Founding Member

    Wanna Have some fun? take a day and tag everyone in all of your FB photos as "Prophet Mohammed."
  12. Mindgrinder

    Mindgrinder Karma Pirate Ninja|RIP 12-25-2017

    That's so....uh....brilliant yet dirty and somehow memetically obscure that it both entertains and disgusts me at the same time.

    *tap tap* Beer to monitor.
    VisuTrac and Quigley_Sharps like this.
  13. Motomom34

    Motomom34 Monkey+++

    That is creepy what you wrote. I am not a computer guru but I know people can track your ISP. Did you track people for fun or get paid to do it?
    Mindgrinder likes this.
  14. Mindgrinder

    Mindgrinder Karma Pirate Ninja|RIP 12-25-2017

    I'm pretty handy with this stuff...having someones "IP" is the prime number in monitoring what they are doing online but it's not the "has-all-be-all" that it's cracked up to be. Spoofing an IP is fairly trivial but I will agree that "fully covering your tracks" requires more than a casual knowledge of proxy/spoof/redirect/crypt. To the point of being paranoid and frankly, the depths to which you have to go to do it arouse enough suspicion to get you flagged anyway. The pirates who use proxy or SSL while generating huge traffic on their ISP set off flags BECAUSE they try to hide so while the packets are only vulnerable to deep packet inspection, the VOLUME of SSL is what sets off the trigger.
    More than 50% of "Anonymous" are secret service agents, script kiddies who got busted and agreed to be "informants" when needed or are outright "bot-netters for profit" and the rest are pawns.
    I could go on and on at length aboot this but it aint worth it.
    Feel free to correct me if you think i'm wrong tulianr.

    Live free.
    Be fearless.
    Don't attack - defend.
    If you get busted for copyright, claim it's against your religion.
    Nuf said.
  15. CRC

    CRC Survivor of Tidal Waves | RIP 7-24-2015 Moderator Emeritus Founding Member

    Every single one. Yep. And I do facebook...but I'm not stupid.
  16. Mindgrinder

    Mindgrinder Karma Pirate Ninja|RIP 12-25-2017

    Side note - the only people who see your IP on this forum are mods.
    I "assume" they would not give it out to anyone without a court order or warrant. I "assume" they do not resell your registration data (email addy, IP, demographics etc) to companies that are selling "prepper goods".
    But they could if it was all aboot profit.
  17. VHestin

    VHestin Farm Chick

    HA! [winkthumb]
    Mindgrinder likes this.
  18. VHestin

    VHestin Farm Chick

    I do Facebook, and I know my stuff ain't private, which is why I'm careful. And I don't try and add my neighbors to my friends list. Can't talk about them then! :cool:
    Mindgrinder likes this.
  19. Mindgrinder

    Mindgrinder Karma Pirate Ninja|RIP 12-25-2017

    Missionary Church of Kopimism - Wikipedia, the free encyclopedia

    In my pathetic "Politically Correct" country....
    Sihks can carry daggers to court....
    Ceremonial Sikh daggers to be allowed in B.C. courts, with sheriff approval

    And their kids can carry daggers in school...
    Ban on Sikh kirpan overturned by Supreme Court - Canada - CBC News

    Opps....I guess they can in California too...
    Sikhs allowed to carry daggers at Calif. school - San Jose Mercury News

    Does that mean as a Native American Indian I can carry a bow?

    It's all PC BS.

    Jesus never said a song was worth a penny....so I figure I'm ok to download the entire internet....and if I had the hard drive space...I would. For "backup" purposes of coarse.

    Last edited by a moderator: Jan 25, 2015
  20. tulianr

    tulianr Don Quixote de la Monkey

    I got paid to do it, for twenty three years. I worked at the National Security Agency (NSA) and NSA field sites, as a member a military cryptologic service element, through the Central Security Service. The Central Security Service is a largely unknown agency that provides military manpower to NSA, which is also a Department of Defense activity. Each branch of the armed forces maintains a Cryptologic Service Element (CSE). Soldiers, Sailors, Airmen, and Marines assigned to a CSE are paid by their respective military branches, and are generally administratively controlled by their military branch; but are often trained by, and assigned to, NSA activities. The degree of cooperation provides for a near seamless organization - NSA/CSS.

    Funds from the budgets of the NSA and the CSEs are shifted around to the point that sorting out those funds would be a herculean task. A Marine, paid by the Marine Corps, may be serving on a Navy ship, paid for by the Department of the Navy, operating in a Navy Ships Signals Exploitation Space, intercepting communications via equipment developed and installed by the NSA. The tasking for the collection might be coming from NSA, even though the ship is sailing as part of a Navy task group, satisfying a Navy operational requirement. The Marine would have been jointly trained by his CSE and NSA. He might serve his first posting in a tactical Electronic Warfare unit at a Marine Corps base; his second posting at Headquarters NSA - Fort Meade, MD; his third posting at an NSA field site overseas, his forth posting at a training command or back at a tactical Electronic Warfare unit, and so forth. He would move back and forth, in uniform and out, between NSA activities and tactical activities.

    In this way, the military CSEs receive and maintain extremely well trained and experienced Electronic Warfare Operators, and NSA receives virtually unlimited manpower reserves and the ability to extend its collections capabilities to every point on the globe, and beyond. Anywhere that an Air Force or Army aircraft (or drone) flies, or a Navy ship sails, NSA can potentially utilize that platform as a collections asset. Its a very cozy relationship.

    Similar relationships exist to a lesser extent between Military Imagery Intelligence Analysts, and Counter Intelligence Specialists, and the Defense Intelligence Agency (DIA) and the CIA. I spent some time ostensibly assigned to a Marine Corps Company level organization in Washington D.C. that, in reality, consisted entirely of administrative personnel. Their sole purpose was to maintain the administrative records of several hundred Marines who were on loan to the NSA, CIA, DEA, and DIA. I checked in to that unit, handed them my record book, and peeled off my uniform; until the end of my posting, when I got a hair cut, put a uniform back on, and collected my record book.

    CSEs provide their service members with a "military experience" unknown to members of more traditional military job fields. It's often a whole different world.
    Mindgrinder and Yard Dart like this.
survivalmonkey SSL seal        survivalmonkey.com warrant canary