Stop The Spying – Key Logger Detection

National Security companies use key loggers to spy on suspects the same way parents use key loggers to monitor their children’s Internet activity. Key loggers secretly record all PC key strokes and automatically send them to a remote location.

Thanks to Black Ops emails from HBGary  which were leaked by Anonymous, we know the details of how the most sophisticated rootkit key loggers being developed for the U.S. Government work.

Key loggers are intentionally designed to be very hard to detect (if antivirus software found them, they could be deleted)  but all key loggers have to call home using standard protocols to work.

This is a key logger’s most vulnerable point, when they call home, where they can be detected, identified and tracked.

If enough prominent people find unauthorized key loggers spying on their PCs, their outrage would pressure the media and law enforcement to investigate and stop this spying.

Project Goal: Produce simple, reliable means to detect when key loggers call home and identify where and when they are sending data in a form that can be easily shared widely with activists.

Concept #1: Use Linux firewalls to monitor all outgoing traffic to prove key loggers are present and to identify where the information is being sent.

The system should be designed to be as simple and inexpensive as possible and to minimize the possibility of hacks and back doors being installed to defeat them.

Develop simple step by step procedures for setting up inexpensive Linux firewalls to do this.

Invite hackers to make suggestions as to how it could be defeated and improved.  Solicit better ideas from the hacking community. Review and improve the approach and instructions.

Once the design is finalized, share the instructions widely publicly in different languages.

Key logger sweeps could be a money making opportunity for people who have the interest, equipment and skills to do it.

Note:  Norton and other major security software vendors specifically exempt certain key logger detection functions to protect law enforcement activities. The solution MUST be able to catch these protected exemptions.

Even the simple recording of outgoing addresses that could be easily imported into an Excel spreadsheet might be of value.

Questions:

Is this the best approach? Has it already been done and documented? What is the best way to proceed?

I don’t have the expertise or skills to develop this myself, but I can certainly help test, polish and promote it.

Please Support This Effort & Stop the National Security State

Advertisements

Tags: , , , , ,

8 Responses to “Stop The Spying – Key Logger Detection”

  1. Stop The Spying – Key Logger Detection « -= Jarvis =- Says:

    […] Source Link […]

  2. Prof. Byron Brainard Says:

    I’ve been using a tool called Wireshark for network sniffing to try an capture packets but it is very difficult. they basically have the ability to TURN OFF any sniffing at the NIC level so you would need to monitor from outside your network. The best way I could help is I need a BUNCH of examples of keyloggers and rootkits so I can play around in a virtual environment with some of this stuff. Get as many of these as possible and send them to me.

    • happinesshacker Says:

      Many thanks for your reply. I just (7-3-2011) updated this: Looks like Wireshark on a separate device is the way to go. Took me a while, I don’t have expertise in this area. Google wireshark key logger for good references.

      There are lots of key loggers floating around on hacker sites.

  3. Easy Complex Passwords « Happiness Hacker Says:

    […] If a key logger is on your PC, all your passwords are easily read by the owner of the key […]

  4. Catching Keylogger Communications – 2 « Happiness Hacker Says:

    […] is a 7/3/2011 update of my Stop The Spying – Keylogger Detection post […]

  5. Catching Keylogger Communications – 2https://happinesshacker.wordpress.com/wp-admin/post.php?post=348&action=edit&message=6 « Happiness Hacker Says:

    […] Hacker Expose Corrupt National Security Contactors « Stop The Spying – Key Logger Detection Stalking and Smearing Made Easy […]

  6. key loger Says:

    I was extremely pleased to find this great site. I wanted to thank you for ones time just for this fantastic read!! I definitely liked every part of it and I have you book marked to look at new information in your website.

  7. JT Says:

    You have alot of options. Look at this guide. It is realy good.

    http://cognitiveanomalies.com/simple-ways-in-detecting-key-loggers/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: