<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Gottfrid Svartholm Trial: IT Experts Give Evidence</title>
	<atom:link href="http://torrentfreak.com/gottfrid-svartholm-trial-it-experts-give-evidence-140927/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/gottfrid-svartholm-trial-it-experts-give-evidence-140927/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 15:45:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Wormlore</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240591</link>
		<dc:creator><![CDATA[Wormlore]]></dc:creator>
		<pubDate>Mon, 29 Sep 2014 17:59:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240591</guid>
		<description><![CDATA[Let&#039;s review this:
- IP addresses are not enough as they are easy to spoof. Or you can directly control someone&#039;s computer to do your job.
- On the same length, finding no trace of remote control in a computer doesn&#039;t mean it hasn&#039;t been remoted at some point.
- An emulator for the &quot;victim&#039;s&quot; system is not a proof either since there are multiple legitimate uses for such a software.
- The log chat is suspicious and wouldn&#039;t prove much by itself either.

At the same time:
- The IP address was assigned to the computer of a convicted hacker.
- He does have an emulator for the targeted system.
- There is no proof of a hacking of his computer.
- There are files from the hacking in a folder with the results of the previous hacking (for which he was tried and condemned).

No direct proof, but converging material pointing at him. Weak: that&#039;s well enough to start an investigation, though not enough to end one and start a trial in my opinion.]]></description>
		<content:encoded><![CDATA[<p>Let&#8217;s review this:<br />
- IP addresses are not enough as they are easy to spoof. Or you can directly control someone&#8217;s computer to do your job.<br />
- On the same length, finding no trace of remote control in a computer doesn&#8217;t mean it hasn&#8217;t been remoted at some point.<br />
- An emulator for the &#8220;victim&#8217;s&#8221; system is not a proof either since there are multiple legitimate uses for such a software.<br />
- The log chat is suspicious and wouldn&#8217;t prove much by itself either.</p>
<p>At the same time:<br />
- The IP address was assigned to the computer of a convicted hacker.<br />
- He does have an emulator for the targeted system.<br />
- There is no proof of a hacking of his computer.<br />
- There are files from the hacking in a folder with the results of the previous hacking (for which he was tried and condemned).</p>
<p>No direct proof, but converging material pointing at him. Weak: that&#8217;s well enough to start an investigation, though not enough to end one and start a trial in my opinion.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: You Fail Again</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240517</link>
		<dc:creator><![CDATA[You Fail Again]]></dc:creator>
		<pubDate>Mon, 29 Sep 2014 09:27:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240517</guid>
		<description><![CDATA[Yes, that&#039;s it!
Thank you!

The thing which jumps out at me is that they characterized it as &quot;hacking attempts on their machines.&quot;

How do we know that Gottfrid&#039;s computer was not compromised by Swedish police?

Shouldn&#039;t this be considered in the current trial as a potential source of what could be &quot;planted&quot; evidence?

Hacking Swedish police?

I would not put it past them to do such a thing to Gottfrid if they had the capability.]]></description>
		<content:encoded><![CDATA[<p>Yes, that&#8217;s it!<br />
Thank you!</p>
<p>The thing which jumps out at me is that they characterized it as &#8220;hacking attempts on their machines.&#8221;</p>
<p>How do we know that Gottfrid&#8217;s computer was not compromised by Swedish police?</p>
<p>Shouldn&#8217;t this be considered in the current trial as a potential source of what could be &#8220;planted&#8221; evidence?</p>
<p>Hacking Swedish police?</p>
<p>I would not put it past them to do such a thing to Gottfrid if they had the capability.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: disqus_cIgNIuQ6fh</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240512</link>
		<dc:creator><![CDATA[disqus_cIgNIuQ6fh]]></dc:creator>
		<pubDate>Mon, 29 Sep 2014 08:42:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240512</guid>
		<description><![CDATA[This?

&quot;A few individuals living in Sweden have been visited by Swedish Police agents and had equipment seized and forced to sit in hearings with IT forensics staff simply for having online contact with suspects in the case. Several friends who had IRC contact with Gottfrid have noticed hacking attempts on their machines that were traced back to Swedish police agencies. It appears safe to claim that the current police tactic is to throw rocks in the water to observe which rings form.&quot;

http://qnrq.se/everything-important-to-sweden-is-hacked/]]></description>
		<content:encoded><![CDATA[<p>This?</p>
<p>&#8220;A few individuals living in Sweden have been visited by Swedish Police agents and had equipment seized and forced to sit in hearings with IT forensics staff simply for having online contact with suspects in the case. Several friends who had IRC contact with Gottfrid have noticed hacking attempts on their machines that were traced back to Swedish police agencies. It appears safe to claim that the current police tactic is to throw rocks in the water to observe which rings form.&#8221;</p>
<p><a href="http://qnrq.se/everything-important-to-sweden-is-hacked/" rel="nofollow">http://qnrq.se/everything-important-to-sweden-is-hacked/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jay</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240334</link>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 13:18:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240334</guid>
		<description><![CDATA[I wonder how you feel about the moon landing and JFK&#039;s death.]]></description>
		<content:encoded><![CDATA[<p>I wonder how you feel about the moon landing and JFK&#8217;s death.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jay</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240333</link>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 13:13:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240333</guid>
		<description><![CDATA[Is there any difference between this case and other hacking cases?  I mean, in other cases do they usually find all the evidence, plain-as-day, on the computers they confiscate?  



It just seems like there&#039;s no real hard evidence in this case, just an IP address.  Almost like he was set up just so they could confiscate his computer and maybe catch him with incriminating evidence.  Like Kim Dotcom.  They just seized all his assets on the assumption that they could find the evidence they need once they&#039;ve had a chance to root around in his computers.]]></description>
		<content:encoded><![CDATA[<p>Is there any difference between this case and other hacking cases?  I mean, in other cases do they usually find all the evidence, plain-as-day, on the computers they confiscate?  </p>
<p>It just seems like there&#8217;s no real hard evidence in this case, just an IP address.  Almost like he was set up just so they could confiscate his computer and maybe catch him with incriminating evidence.  Like Kim Dotcom.  They just seized all his assets on the assumption that they could find the evidence they need once they&#8217;ve had a chance to root around in his computers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 1dollarwonder</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240280</link>
		<dc:creator><![CDATA[1dollarwonder]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 07:46:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240280</guid>
		<description><![CDATA[We will no doubt all see soon enough, but by then you will have no doubt forgotten my post, but i&#039;ll remind you nonetheless]]></description>
		<content:encoded><![CDATA[<p>We will no doubt all see soon enough, but by then you will have no doubt forgotten my post, but i&#8217;ll remind you nonetheless</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Techanon</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240279</link>
		<dc:creator><![CDATA[Techanon]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 07:37:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240279</guid>
		<description><![CDATA[&lt;blockquote&gt; “There are two characteristics we always look for when we try to 
discover remote control features. The first is one that starts 
automatically when you turn on your computer since the attacker will 
always try to maintain their footing on the computer. The second is one 
that ‘phones home’ to indicate that it is ready to receive commands,” 
Krismar said. &lt;/blockquote&gt;


1. Not true if the attacker has a reliable method of regaining control that doesn&#039;t require a backdoor or troyan horse to be active on the computer.
2. That&#039;s only true for &quot;botnet zombies&quot; because the attacker usually doesn&#039;t know their ip addresses.]]></description>
		<content:encoded><![CDATA[<blockquote><p> “There are two characteristics we always look for when we try to<br />
discover remote control features. The first is one that starts<br />
automatically when you turn on your computer since the attacker will<br />
always try to maintain their footing on the computer. The second is one<br />
that ‘phones home’ to indicate that it is ready to receive commands,”<br />
Krismar said. </p></blockquote>
<p>1. Not true if the attacker has a reliable method of regaining control that doesn&#8217;t require a backdoor or troyan horse to be active on the computer.<br />
2. That&#8217;s only true for &#8220;botnet zombies&#8221; because the attacker usually doesn&#8217;t know their ip addresses.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: The Pirate Bay Founder Gottfrid Svartholm Trial: Gottfrid Continues To Blame &#8230; &#8211; International Business Times AU &#124; We R Pirates</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240269</link>
		<dc:creator><![CDATA[The Pirate Bay Founder Gottfrid Svartholm Trial: Gottfrid Continues To Blame &#8230; &#8211; International Business Times AU &#124; We R Pirates]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 07:03:59 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240269</guid>
		<description><![CDATA[[&#8230;] The Pirate Bay Founder Gottfrid Svartholm Trial: Gottfrid Continues To Blame &#8230;International Business Times AUGottfrid Svartholm and his said accomplice, a 21-year-old Danish man&#039;s trial continues in Denmark. The IT experts are presenting the evidences. While The Pirate Bay founder Svartholm is insisting that the hacking attacks took place after someone &#8230;Gottfrid Svartholm Trial: IT Experts Give EvidenceTorrentFreak [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] The Pirate Bay Founder Gottfrid Svartholm Trial: Gottfrid Continues To Blame &#8230;International Business Times AUGottfrid Svartholm and his said accomplice, a 21-year-old Danish man&#039;s trial continues in Denmark. The IT experts are presenting the evidences. While The Pirate Bay founder Svartholm is insisting that the hacking attacks took place after someone &#8230;Gottfrid Svartholm Trial: IT Experts Give EvidenceTorrentFreak [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: You Fail Again</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240253</link>
		<dc:creator><![CDATA[You Fail Again]]></dc:creator>
		<pubDate>Sat, 27 Sep 2014 23:49:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240253</guid>
		<description><![CDATA[Here is a link to a blog article regarding a possibility of 100 different ways to remotely control a computer without leaving traces:


&lt;strong&gt;Anakata&#039;s Uncontrollable Computer&lt;/strong&gt;
Archive for September, 2013
http://qnrq.se/anakatas-uncontrollable-computer/


There was also (once upon a time) another blog entry somewhere there which I cannot now find, which detailed how Anakata&#039;s computer as well as others in his circle were probed repeatedly by remote IPs. As it turned out, these IPs were the Swedish police (or perhaps even the Danish police). Memory farts.



I seem to recall the phrase &quot;tossing stones to create ripples&quot; or some such in the discussion about it. If that blog entry is no longer there, it may have been removed for legal reasons. I don&#039;t know.


I had passed this information along to others here on TorrentFreak back at the time during which Gottfrid had been kidnapped from Cambodia and the ongoing investigation into the hacking of Logica and CSC,


Perhaps they may be able to find it, or recall it and confirm that I am not making it up.]]></description>
		<content:encoded><![CDATA[<p>Here is a link to a blog article regarding a possibility of 100 different ways to remotely control a computer without leaving traces:</p>
<p><strong>Anakata&#8217;s Uncontrollable Computer</strong><br />
Archive for September, 2013<br />
<a href="http://qnrq.se/anakatas-uncontrollable-computer/" rel="nofollow">http://qnrq.se/anakatas-uncontrollable-computer/</a></p>
<p>There was also (once upon a time) another blog entry somewhere there which I cannot now find, which detailed how Anakata&#8217;s computer as well as others in his circle were probed repeatedly by remote IPs. As it turned out, these IPs were the Swedish police (or perhaps even the Danish police). Memory farts.</p>
<p>I seem to recall the phrase &#8220;tossing stones to create ripples&#8221; or some such in the discussion about it. If that blog entry is no longer there, it may have been removed for legal reasons. I don&#8217;t know.</p>
<p>I had passed this information along to others here on TorrentFreak back at the time during which Gottfrid had been kidnapped from Cambodia and the ongoing investigation into the hacking of Logica and CSC,</p>
<p>Perhaps they may be able to find it, or recall it and confirm that I am not making it up.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: You Fail Again</title>
		<link>/gottfrid-svartholm-trial-it-experts-give-evidence-140927/#comment-1240245</link>
		<dc:creator><![CDATA[You Fail Again]]></dc:creator>
		<pubDate>Sat, 27 Sep 2014 21:17:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=94409#comment-1240245</guid>
		<description><![CDATA[I don&#039;t know what OS was on Gottfrid&#039;s computer, but for some reason I keep thinking about the old, &quot;Back Orifice&quot; remote system administration tool (yeah, that was it&#039;s purpose, right?) for Windows from &quot;cDc.&quot;

Hackers are far more sophisticated today than when BO was out (or maybe it still is) and I can imagine something like that being used.

Or I could be completely wrong.

There are just too many ways for a system to be taken over remotely these days which wouldn&#039;t leave any apparent signs like BO.

There are &#039;root kits&#039; and &#039;boot kits&#039; -- each of which could have implemented some one-time download of code to put in some other area -- and then delete itself. Could that have happened to Gottfrid? I don&#039;t know, but, today anything is pretty much possible for hackers if they are &lt;i&gt;given the chance.&lt;/i&gt;

Krismar and his associates know this, but they are for the prosecution so they won&#039;t acknowledge such things.

http://www.cultdeadcow.com/oldskool/skulls.gif]]></description>
		<content:encoded><![CDATA[<p>I don&#8217;t know what OS was on Gottfrid&#8217;s computer, but for some reason I keep thinking about the old, &#8220;Back Orifice&#8221; remote system administration tool (yeah, that was it&#8217;s purpose, right?) for Windows from &#8220;cDc.&#8221;</p>
<p>Hackers are far more sophisticated today than when BO was out (or maybe it still is) and I can imagine something like that being used.</p>
<p>Or I could be completely wrong.</p>
<p>There are just too many ways for a system to be taken over remotely these days which wouldn&#8217;t leave any apparent signs like BO.</p>
<p>There are &#8216;root kits&#8217; and &#8216;boot kits&#8217; &#8212; each of which could have implemented some one-time download of code to put in some other area &#8212; and then delete itself. Could that have happened to Gottfrid? I don&#8217;t know, but, today anything is pretty much possible for hackers if they are <i>given the chance.</i></p>
<p>Krismar and his associates know this, but they are for the prosecution so they won&#8217;t acknowledge such things.</p>
<p><a href="http://www.cultdeadcow.com/oldskool/skulls.gif" rel="nofollow">http://www.cultdeadcow.com/oldskool/skulls.gif</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
