From the Internet's perspective, your computer was never on the Internet at
all. If someone traces the connections back, the packets will all look like
they came from the hijacked connection. This is especially useful when
dealing with monitored conversations (see Echelon, Carnivore, the
ultra-secret level-3 DeadMan monitoring stations that pepper the globe like
icepick wounds in Trotsky's skull).
Note that I'm talking about taking over lower-level connections, *not*
impersonating users to make it look like they sent an email or a Usenet
post. That sort of stuff is relatively trivial. I'm talking about physical
and data-link OSI-level takeover. I was going to use this very technique to
send this post, but it takes finding a physical close computer that is
running Win9x or “Win2K”, and the scanning program to find such a computer
has not been ported to Windows 2000 (which is the program I am using to
compose this article).)
Uh, yea. Right.
You have my permission to link freely to any entry here. Go
ahead, I won't bite. I promise.
The dates are the permanent links to that day's entries (or
entry, if there is only one entry). The titles are the permanent
links to that entry only. The format for the links are
simple: Start with the base link for this site: http://boston.conman.org/, then add the date you are
interested in, say 2000/08/01,
so that would make the final URL:
You can also specify the entire month by leaving off the day
portion. You can even select an arbitrary portion of time.
You may also note subtle shading of the links and that's
intentional: the “closer” the link is (relative to the
page) the “brighter” it appears. It's an experiment in
using color shading to denote the distance a link is from here. If
you don't notice it, don't worry; it's not all that
It is assumed that every brand name, slogan, corporate name,
symbol, design element, et cetera mentioned in these pages is a
protected and/or trademarked entity, the sole property of its
owner(s), and acknowledgement of this status is implied.