Originally posted by XXXN3O
...especially given the timeline. If this was any other government and they thought you had evidence of them sabotaging classified documents I dont
think they would really give two hoots about if you read it or not.
I think I understand what you mean...
When Law Enforcement wants to track the flow of drugs to find the peddlers and who supplies them, and who the manufacturers are, and who the runners
of the raw materials are, they tag someone and watch how it passes hands until they've figured out all the players and who the big fish are.
When the CIA has 50 Stinger Missile Launchers go missing they release 100 Stinger Missiles into the wild and track them, watching the food-chain to
see who sells them to whom and where they flow until they end up in the hands of the end-user terrorist. Then, they know who is in bed with whom and
how those Stinger Missiles got into the hands of terrorists to begin with, as well as having cataloged where those 50 missing Launchers went.
Maybe Defense Contractors do the same thing with Industrial Espionage. You let a foreign agency walk off with some Classified Documents that are
tagged and watch where they go. Who does that agency share that information with? Who do they in turn share that information with? Ultimately, who
ends up with those documents?
In a 68-180MB PDF file, would someone notice 282kb of padding? The moment the file is opened that 282kb script registers a hook in an existing service
running on the computer. It then opens a port on the internet and sends a predesignated address at G.E. your IP Address and a Serial Number of the
file. From that point onward, that service is listening passively on a port. Periodically, G.E. calls the file to audit if the file has been active.
After so many years in the wild, if it ends up in a dead-end, a kill command is sent that uninstalls the hook in the background service, and deletes
the file so that it can't be recovered, and no evidence exists of espionage.
So, my daughter downloads the file and opens it, installing their hook in a background service. After discovering the files I delete them, removing
any way the script would have of reinstalling itself. Then, in a fit of paranoia, I wipe my computer and do a clean install. I no longer have anything
listening passively to respond to G.E. when they check up on the status of the Classified Document. However, by the time I deleted everything it was
too late as it already contacted G.E. with my IP Address the moment the file was opened. In the beginning I probably didn't notice one attempt a
month or one attempt a week to connect. However, as more time went by without bi-communication, G.E. tried with more and more frequently to connect to
the service on my end to send the kill command to the file.
Okay, that all sounds plausible to me. Nothing personal between G.E. and I, it's just that they knew I had something at some point that I shouldn't
have and they are trying to automatically do what I already did for them.