NSA Interception In Action? Tor Developer's Computer Gets Mysteriously Re-Routed To Virginia

from the a-slight-detour dept

So this one is odd. A core Tor developer, Andrea Shepard, recently ordered a computer from Amazon.com to her home in Seattle. Yet, as she tweeted last night, something odd happened on the way to delivering that package to her house:

If you can’t see the image, here’s a larger version:
Also, some more details from PrivacySOS. As you can see, rather than go from the Amazon warehouse in Santa Ana, California up the coast to Seattle, instead the package went across the country to Dulles, Virginia to Alexandria (right outside of DC) and was “delivered” there. Upon seeing this, my initial reaction was that it might not be a big deal. With shipping logistics these days, it’s not uncommon to see a sort of hub system, where packages travel across the country from one warehouse to a shipping hub, only to be shipped back across the country for actual delivery.

But that does not appear to be what happened here at all. As Kade from PrivacySOS pointed out, the final Alexandria address is the final delivery location, rather than the sign of something in process. Also, the fact that it bounced around and then went “out for delivery” to that address shows that it wasn’t just popping in and out of a hub for delivery to Seattle.

There are some possible other explanations, including just a general screw-up on the part of Amazon. But given the revelations of how the NSA’s TAO group does very targeted spying, that often involves getting access to computers being shipped to targets, combined with the fact that the NSA has made it clear that breaking Tor is a priority that has mostly stymied them, this certainly should raise multiple eyebrows.

Filed Under: , , , , , ,
Companies: amazon

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “NSA Interception In Action? Tor Developer's Computer Gets Mysteriously Re-Routed To Virginia”

Subscribe: RSS Leave a comment
out_of_the_blue says:

PFFFT! That's nothing! Check out THIS oddity:

“Large chunk of Chinese internet traffic redirected to small Wyoming building”


Reality versus Mike: Technorati ranks Techdirt below 5000.
So why does Mike claim “a consistent Technorati Technology Top 100 rating”?

Just look at the sites Techdirt actually ranks with! What a hoot! :

5433. Free Samples and Coupons by Free ?
Recent: Free Dove Men Body Wash at Rite Aid ?


Anonymous Coward says:

Re: PFFFT! That's nothing! Check out THIS oddity:

“Large chunk of Chinese internet traffic redirected to small Wyoming building”

Debunked: http://www.theatlantic.com/technology/archive/2014/01/this-little-house-in-wyoming-didnt-just-get-flooded-with-web-traffic-from-china/283249/

Oh look, for all his talk about calling every story out here, it’s OOTB who falls for bullshit stories.

vancedecker (profile) says:

Re: Re: Not Domestic




If these two articles don’t prove to whatever dumb ass is still left posting to skeptic blogs about how ‘smart people believe weird conspiracies’ then that person is either a fucking retard or intentionally and solidly in denial.

….and these don’t even mention what probably has been going on for years. The NSA’s OWN “internal investigations” unit, which is designed as a Lysol Air Freshener to cover up the smell of bullshit. Anyway, in their own report was one incident where on their first day an NSA staffer looked up his ex girlfriend and proceeded to stalk her.

vancedecker (profile) says:

Re: Re: Re:

Look, here’s the thing. When google spies, it’s so that they can show gay guys shirtless underwear ads and straight people whatever cheap tack stuff they buy.

When the NSA does it, it’s so that they can destroy you. Did you not read about the people who were stalked and harassed by BP for posting negative comments about the oil spill?

Who do you think provided that private investigator the private info? Parallel Construction baby, it’s a bitch!

Anonymous Coward says:

Solution: Burn the computer and get another from a safe vendor

The solution to this seems obvious, Amazon can’t be trusted. If she ever gets her hand on the computer, she should basically burn it and buy it from a more trustworthy vendor. There’s no telling what hidden software the NSA might sneak onto the computer to make it less secure if it ever gets back to her.

Obviously you can’t trust Amazon not to cooperate with unconstitutional searches and seizures.

I’m very glad now that my new computer I got for Christmas is from NewEgg instead of Amazon.

Jessie (profile) says:

Re: Solution: Burn the computer and get another from a safe vendor

Is it amazon that is the problem, or was it diverted by USPS after leaving Amazon. Amazon may not have had anything to do with it. Perhaps packages being sent to her are being inspected waiting on a computer to be ordered and a chance for this to happen. The last time I ordered a computer by mail it came in a box that indicated that it was from a computer company (basically the box the computer was packed in with a shipping label on it). It wouldn’t be hard to notice those and divert the shipment.

Anonymous Coward says:

Re: Re: Solution: Burn the computer and get another from a safe vendor

My ONLY source of computers is my work shop. I build my own, from known, clean, tested components. I have never, and never will, purchase a computer-as-appliance. Don’t trust manufacturers, don’t trust distributors, don’t trust delivery services. If I need a laptop for some unforeseen reason, I have an old one (2008) that I have rebuilt many times and know what’s in it.

allengarvin (profile) says:

Re: Solution: Burn the computer and get another from a safe vendor

“The solution to this seems obvious, Amazon can’t be trusted.”

And you trust that employees of Newegg will risk charges of criminal contempt under 18 USC 402 by disobeying such orders? That they’ll go to jail rather than compromise your privacy?

You do know private citizens don’t get to decide what’s constitutional or not, right?

bone breaker says:

Re: Re: Solution: Burn the computer and get another from a safe vendor

Neither does the NSA. Only congress can decide the wording of law and only the judicial branch can interpret those laws. Therefore with NSA lying in congressional hearings, they are breaking the law. We need to keep these discussions going until congress performs it’s mandated job. Create laws that have teeth. Don’t accept the contempt and treason being committed. Pass laws that allow the incarceration and even capital punishment for treasonous acts. Hold agency executives accountable. Don’t let them resign or shuffle the personal to avoid accountability.

Anonymous Coward says:

Re: Solution: Burn the computer and get another from a safe vendor

it was a keyboard. usually reading entire articles helps one thinks clearly and not like an idiot. “There?s no telling what hidden software the NSA might sneak onto the COMPUTER” lol… please before you go into paranoid tin-foil hat mode and go on about the “there?s no telling” oohhh :O the NSA!!!! And this and that. Again, many of the commenters are either crazy or, like you sir with respect, (“burn the computer” LOLZ!!!!) not the public you would expect from techdirt which is known for this shitty idiot “news”. The woman, again, shows no x-ray or whatever the fuck “may be” on his keyboard and again what sense would it make for the NSA to intercept a keyboard being sent from AMAZON? LMAO. PLUS= IDIOTS PLEASE PLEASE, PLEASE READ SNOWDEN DONT just put a thumbs up on facebook dimwits, the whole case was that there was not a lot of “sneaking” but a lot of SPENDING BIG BUCKS paying providers to release info. Missing the point, and again, lol please, “burn your computer” lmao… well shes a dev maybe she can fin another way to “clean it” from the ultrasupersecret-area51stuff the NSA uses. In most ppl dreams as I see and it saddens me such a high lvl of ignorance, come on try to use some commom sense. It helps. It?s a keyboard. One out of the many rational questions one may ask is why would the NSA “intercept” a keyboard. For surveillance? LMAO. Of what? To “bug” it? LMAO… yeah yeah they put a nanorobot they got from martians that hides on the “tab” key and sends info directly via infrawaves to secret nsa cells located in the stratosphere

Christopher Best (profile) says:

Re: Re: Solution: Burn the computer and get another from a safe vendor

Actually, yes. They have bugs for USB cables, RJ-45 ports, keyboards, etc. They didn’t get them from martians, they buy them from contractors. For someone saying “read snowden” you don’t seem to have actually bothered keeping up with what’s been published.

mudlock (profile) says:

Re: Re: Solution: Burn the computer and get another from a safe vendor

Good point! No one would ever hide a keylogger in a keyboard!

And clearly this isn’t real: http://www.eweek.com/security/nsa-can-hack-you-even-if-you-arent-connected-to-the-internet.html

“The target machines first are compromised by way of a USB stick or tiny circuit board that broadcasts the information. … The geniuses at the NSA with the remote radio access technology have extended the range to a staggering 8 miles.”

So I’m sure it’s perfectly safe.

Anonymous Coward says:

Re: Re: Re:3 Solution: Burn the computer and get another from a safe vendor

The very technology you pointed to consists of compromising, with radio waves, computers that aren’t connected to the internet. The solution to that is electromagnetic shielding, but…

“TOR developers kinda use the internet.”

Yeah, let me know when you’re tired of riding a waffle.

Dan (user link) says:

Re: Re: Solution: Burn the computer and get another from a safe vendor

Your comment was hard to read but it’s clear you have no idea of the bounds of technology in use. Read up on Stuxnet as a predictable example, that was made possible in part due to a compromised print spool driver – where from? The US Government. Oh yeah and just because she is a software developer, does not automatically mean she can rip apart and recognize a foreign object in a keyboard. It would probably be rewritten firmware anyway.

Your post shows how much knowledge you have on the subject, which is next to none so why not just stop trying to bitch at people and move on.

Phill says:

Re: Solution: Burn the computer and get another from a safe vendor

She should NOT burn it, this computer may be valuable intelligence for everyone else.
She should disassemble the computer and take photos, post them online with the specs and ask people to do a once over on it.

If anyone finds any additional components it should then be offered up to a reputable security researcher so they can investigate exactly how it works.
Heck I’d offer it up to a researcher regardless so they could do a once over anyway in case any firmware is compromised.

Robert says:

Re: Solution: Burn the computer and get another from a safe vendor

More realistically, her internet connection can not be trusted. Any and all online orders can be intercepted and the typically illegal security letter issued and the purchase intercepted.
The track record is likely a simple mix of indifferent arrogance, laziness and cheapness. Obviously the risk of a key logger is pretty high, with a trigger dump, either by direct physical contact or via remote contact on the already compromised internet connection.
However a background investigation must still be in action, it would be interesting to see what they are accusing her of to enable the false investigation.
Likely emigration will be the only escape as they work up to aiding terrorism charges so they can force compliance.

Anonymous Coward says:

Re: Solution: Burn the computer and get another from a safe vendor

Dont burn it, store it, away from any sensitive systems, wait to see if more news of the methods and technology comes to light, so that one can open and positively identify the parts…….bam, substantial evidence……..makes me wonder why these organisations put these things out there…….is it so well hidden, or do they retrieve it?

Anonymous Coward says:

Re: Re: Re: Buy in person, pay in cash

First of all I presume physical plants like these require warrents and even though their oversight is for craps, I doubt they want to use their snoopers to hit random targets (price is a factor).

Second of all, how do you know they do not do the exact same crap on store bought computers? If they were randomly adding spying hardware, you wouldn’t be any safer when you buy from stores.

John Fenderson (profile) says:

Re: Re: Re:2 Buy in person, pay in cash

First of all I presume physical plants like these require warrents

What physical plants? The hardware is diverted after it leaves the plant. It arrives at a spy shop where the modification is made, then sent out again.

The only point where a legal requirement comes into play is in the diversion — and I’m not sure a warrant is needed there.

how do you know they do not do the exact same crap on store bought computers?

because these are, by their very nature, targeted operations. This sort of thing isn’t done to every piece of hardware (that would have to be done at the manufacturing plant). This is done against particular people. They would have to know precisely which piece of hardware you’d be getting, in advance, to alter the sight one on the store shelf. Except maybe in very special circumstances, this isn’t possible.

Chronno S. Trigger (profile) says:

Re: Re: Buy in person, pay in cash

I was thinking the same exact thing as Applesauce was. If you really want to make sure that they can’t do this, you have to buy from a brick and mortar store. Some place that the NSA wouldn’t expect, or at least won’t have the budget to cover. Too bad you can’t get a replacement laptop keyboard from Best Buy.

Arthur Moore (profile) says:

Re: Re:

It’s actually worse than that.

The NSA can replace the network jack on your computer with one that looks identical, but has an extra chip in it that talks to their servers.

It’s impossible to find without careful X-Raying or destructive testing, and I doubt that this is the only component they can do that to.

Anonymous Coward says:

Re: Re: Re:

“it?s actually worse than that”. Not only what your stating is quite idiotic, shows no careful examination of many of Snowdens? statements but LMAO… YEAH I WOULD TAKE ADVICE FROM ARTHUR MOORE A PERSON WHO READS AN ARTICLE ABOUT A KEYBOARD AND READS “COMPUTER”, THEN SPEAKS OF “X-RAYING OR DESTRUCTIVE TESTING” – as some more informed say LMAO yeah there are other methods as the one stated – come on man takes your meds please, it?s for the best of everyone. Tin Foil hats are good so you should keep yours on, no doubt about it, it?s actually worst than anything you can imagine, they can replace your nipples with a nanochip that speaks to your tv that then sends your personal info -the NSA is very interested on Arthur Moore?s doings- to a central HQ where 3 million ppl work with aliens to examine your thoughts and how to manipulate them. Oh boy grats tech dirt: well played…make a shit article, then cash out 800.000 hits out of crazy comments lol.. the level of paranoia is amazing, and PLEASE…. lol… again reading before commenting is a good thing… “hacked firmware” lmao…ppl please you know shit about what you are talking about with all due respect get informed, information is power so you don?t go into crazy mode as this gentleman and 800.000 more, spreading disinfo… hacked firmware lmao… yeah 😛 sent to a dev related to TOR … FOR REAL?! ROTFL ppl wikipedia TOR lmao yeah yeah “hack this chick keyboard she won?t notice” said the NSA super spies lmao…

Anonymous Coward says:

Re: Re:

easy, USB keyboard and put in a small hub with spyhardware. Could be a USB storage item with a trojan and autorun for example. Then once the trojan gets installed, hide the anomalous hub and storage. Depends on autorun being enabled, but, you know, people are generally stupid.

I wouldn’t be surprised if there is more elaborate stuff that uses undocumented features and backdoors though.

Chronno S. Trigger (profile) says:

Re: Re: Re:

Windows will not run autorun from a USB drive since Windows XP (and I think one of the XP updates disabled that).

If it’s anything, it’s probably a small chip that sits between the keyboard itself and the USB output. It then installs itself like a keyboard and uses some glitch (or possibly a back door) in the keyboard driver.

czxc says:

Re: Re: Re: Re:

trigger you seem like a logical person. you are kidding right? have you read any of Snowdens? statements? They got no techies or superhackers at the NSA, they just pulled out a suitcase full of dollars and all info was being handed to them no questions asked. Ppl go easy on the paranoia and get well informed, plus someone mentioned the ockham razor well this is the case ITS A FUCKING KEYBOARD. Apart from all the “yeah they put malware in the keyboard” -shows no indepth reading of snowdens? statements, that there was no hardcore intel or epic hacker work there but LOADS OF MONEY TO PAY COMPANIES TO RELEASE THE DATA. Keep watching 24 and thinking the CIA is made of super spies, or watch Argo yeah the NSA and the CIA are top-notch secret service agents -they are indeed in spreading disinfo and messing foreign policies but no epic “spies” there… again, all the stupid nonsense stuff coments directly disregard most of snowdens?s statements, its crazy, all experts on snowden and intelligence lol but you all seem to have read NONE of what he stated… 😛 and yes again, get some logic… in the imaginary world were the NSA is super hi tech and has super spies like the one on comics and shit … they would “bug” a KEYBOARD LMAO being sent to that particular person? LMAO… google social engineering cause that was mostly the “hacking” being done by the NSA, not to be rude but the ignorance is high on some ppl here

John Fenderson (profile) says:

Re: Re: Re:2 Re:

in the imaginary world were the NSA is super hi tech and has super spies like the one on comics and shit … they would “bug” a KEYBOARD LMAO being sent to that particular person?

You haven’t been keeping up. It has been recently confirmed that the NSA does precisely this, by the NSA itself. They do say they don’t do this domestically, but at this point, who would be foolish enough to take them at their word?

John ur an idiot says:

Re: Re: Re:

Not even remotely the point. The subject matter is the NSA and their workings right? Or have I missed the subject? Please do an effort to think clearly, read some Snowden as it was CASH that did the work and no, they didn?t bugged this womans? keyboard, sorry, she rushed to tweet sadly. As a) as some other person says, it?s AMAZON, expect screw ups her relation to TOR does not make her immune to human idiocy. b) no even REMOTELY basic analysis of her keyboard was made… a check for nothing unless proven wrong -which she didn?t at the time- but hey let just jump into conclusions real quick!!! it makes good articles! PARANOIA SELLS!!! … not even a photo the keyboard even ripped apart. If she did it as some sort of decoy as to check if the NSA was checking her online transactions, then again, where is the FUCKING KEYBOARD SNAPSHOT?! Could waited two days or half a day at least and get anyone to crack open the keyboard… she prolly didn?t meant all the fuss but this kinda shit SELLS and thats media be it tech dirt or whatever, note is a joke but a hook that gets 800 comments based on a snapshot and a tweet…great journalism

John Fenderson (profile) says:

Re: Re: Re: Re:

Settle down, Beavis.

I was answering a specific question about malware vectors. I was not talking about what may or may not have been done in this particular case. I am certainly not jumping to any conclusions.

The rest of your comment is hysterical, in both senses of the word. Snapshot of the keyboard? Why? It would reveal absolutely nothing, even if it had been compromised.

Anonymous Coward says:

Re: NSA Liars

it?s not. it?s the media cashing out on a person?s tweet about her being a bit restless about the delivery of the keyboard. It SELLS. Period. TechDirt is mainstream media too or so it seems as this is a REAL joke of an article and again, she probably didn?t tweeted for attention, the media including this one is making this idiot story about super “malware”-“viruses” (its virii actually but hey go ahead) or some of the crazy stuff being written. yeah yeah the CIA and the NSA has been known not only for sticking “malware” on keyboards, printers and even mouses but here comes the worst part: EVEN YOUR MICROWAVE OVEN CAN BE WIRED! FACT! And beware of your toaster its tracking your bread eating habits

Anonymous Coward says:

If this is true then it’s troubling on several levels. One is they are actively and in real time monitoring people here, they can hack, re-route or intercept packages and/or Amazon is willingly complying with the NSA to re-route packages.

If any of this is remotely true it’ll make me hesitant to buy anything electronic online, like my next computer. Back to buying parts and building my own after inspecting the components for odd looking bits hot glued to them.

Eponymous Coward says:

A Contrarian View...

I actually think for this group this is a very good thing, not that they are targeted in this way by the NSA mind you (if that is what’s going on), but that they are seeing the process unfold first hand. If I were a hacker heavily interested in the NSA’s tactics and tech I would look upon this as a late X-mas gift! An above reply said they would burn this computer which I think is idiotic for I would tear this computer apart to find what they altered and assess its capabilities. Meanwhile I would document this whole ordeal to use for a future expose, or lecture at a havking convention. I almost wonder if this could be honeypot situation where they were ordering from Amazon in the hopes that this would happen. You’d think that since they are aware of such issues as NSA interdiction a person connected to the organization would be apprehensive to order online for this very reason, but that’s a lot of conjecture on my part. In the end though I think they’ll have some fun with this and we’ll be hearing more about it later.

Anonymous Coward says:

Re: Re: Re:

UPS and FEDEX have partnered up with USPS under a program called “SmartPost” where the package is handed off to the USPS for final delivery. The premise here is that it saves customers and the aforementioned carriers a few cents. The reality is it briefly puts a package in the hands of the feds that otherwise would be much harder to inspect and/or compromise in the hands of a 3rd party private courier.

ST (profile) says:


Wow! This gal (and a lot of people commenting) need to get out and check the real world every once in a while. It is a very straightforward delivery screw-up. I’m not sure how you reconcile the “NSA-know-it-all-nefarious-out-to-get-you-very-powerful-very-sneaky” type you all talk about with what would clearly be the dumbest way of intercepting a package. Have you guys heard of Occam’s Razor? How about a package being sent to the wrong destination by a not-very-competent service?

I’ve had a coffee machine that was supposed to be delivered from the west coast to the east one, reach Newark, cross the Atlantic and hit Paris and then piruet, go to Memphis and then merrily reach the East Coast. I thought it was a simple routing mistake and I still do. However, I would like to know how many of you think the French DGSE put some chip on it to check on my coffee-drinking habits.

Chronno S. Trigger (profile) says:

Re: Wow!

Everything posted here is just hypothesis. The idea that it was a shipping mix-up has already been postulated in the article and by Andrea herself. That is, as you say, the simplest possibility and has already been hashed out as far as possible. The other possibilities are just more interesting.

No one here is saying with 100% certainty that the US government is behind it. We’re just it’s vary possible and this is how they might have done it.

John Fenderson (profile) says:

Re: Wow!

Actually, Occam’s razor doesn’t help much in this case. It’s not just that the package was diverted. It’s that it was diverted to Dulles, VA. That’s very suspicious. Also, the person involved works with software the spies hate. Two points in favor.

On the other hand, you’d think that they wouldn’t be so careless that the diversion would show up in the package tracking.

So, looking at it from an Occam point of view, it’s pretty 50-50.

Anonymous Coward says:

Re: Re: Wow!

“On the other hand, you’d think that they wouldn’t be so careless that the diversion would show up in the package tracking.”

Exactly Johnny. That is unless they want this knowledge publicized – again – promoting fear and paranoia about the very technology they once thought they dominated, but instead has been the primary source of their proverbial undoing when utilized by the common man.

OldMugwump (profile) says:

Let's all calm down a little

All we have is a misrouted ThinkPad keyboard.

Yes, it was misrouted to Alexandria, and a keyboard is an ideal place for a keylogger/keysniffer.

But there are plenty of legitimate (I mean non-government-connected) businesses and people there.

Most likely, this is nothing but a shipping mistake.

We shouldn’t jump to conclusions on such thin evidence.

That said – it’s worth further investigation. By all means, talk to Amazon and USPS and see what they say. And examine the keyboard carefully – looking for mechanical, electrical and RF anomalies. (Best to get an identical keyboard from another source for comparison.)

Probably you’ll find nothing. If and only if you find evidence of tampering, THEN you have a smoking gun.

ArkieGuy (profile) says:

Hanlon's Razor

Never attribute to malice that which is adequately explained by stupidity.

Keep in mind folks, this is the USPS (you know, the guys that go “postal” all the time) – chances are someone simply screwed up and delivered to the wrong address.

With that said, anyone interested in 40 acres of ocean front property I have in Arkansas?

Anonymous Coward says:

I’ve actually met Andrea in person (she graciously agreed to sign my PGP key), and there’s a couple things that seem to make an NSA interdiction more probable, in my mind.

First, unsurprisingly, Andrea uses Linux. But that’s not the point I want to make, in of itself. She’s also a developer, familiar with tweaking source code, recompiling it, and using it in her daily activities.

Further, she also uses a metal attache case to transport her laptop, specifically because it acts as an excellent Faraday cage. (I don’t know if she was just joking when she gave that as her reason for using the case, but she sounded quite serious!)

It wouldn’t surprise me if somebody decided that it was too risky to try a software penetration (she alerted to the fact that my anti-virus falsely triggered on one of her emails, until I was able to demonstrate that it was normal activity), and somewhat difficult to remotely compromise one of her machines. They wouldn’t even be sure that whatever bugs or backdoors they’re using still exist, because she modifies and recompiles her own software on a regular basis. Conversely, a new hardware order would provide an excellent way to get access.

Is it possible that it’s just a shipping shenanigan? Yes, of course. But it would not surprise me if somebody felt they had to go hardware to try and compromise Andrea’s systems, that’s all I’m saying.

OldMugwump (profile) says:

Re: We need a revolution.

We may need one, but at this point the revolution would LOSE.

This is still more-or-less a democracy – people elect the criminals who authorize and defend this stuff.

As long as that continues to be the case, any revolution will fail. And if/when the electorate wakes up or finds their moral compass, then a revolution won’t be necessary.

Revolutions tend to be bloody, killing a lot of innocents. Let’s try to avoid it if we can. Especially so if the result is going to strengthen the state rather than weaken it.

Matthew A. Sawtell (profile) says:

Re: To paraphrase a quote the movie, "The Guard"

Think about it, Bezos and Crew have been slapped with probably another set of orders that they cannot directly divulge – but attempted at least one ‘slight warning’. Question is, can this be done again, or with the folks in the Beltway cover this ‘loophole’ on the next set of orders.

Anonymous Coward says:

As great an opportunity as finding a tracking device to tear apart.

This is a great opportunity to tear it down in both hardware and software and report some type of definition that the rest of us could look for in our search for this stuff on our own equipment.

Congrats on winning the lottery, I look forward to my own “special software” on my next purchase.

Anonymous Coward says:

Check the DNS

My internet got reaaaaaal slow after I posted here on Techdirt. Pages would often timeout.

It’s a pattern I’ve seen before, commented on NSA articles here on Techdirt, DSL got real slow. ISP couldn’t fix it, next doors DSL was fine, changed the router, DSL back to normal speed. Comment again on Techdirt, DSL suddenly real slow again.

A tracert doesn’t show any extra hops, but there is a huge gap in the routing delay, its very easy to hide extra hops so you cannot rely on tracert.

Switched to fibre, real fast, comment on techdirt, real slow again.

This time I tried messing with the DNS, switching to Google DNS and Open DNS etc. makes it real quick again.

IMHO, maybe the attacks are done via the DNS, returning new IP addresses for existing sites, then man in the middle that traffic.

How would it work with https traffic? I don’t yet know, but https traffic suffered exactly the same.

Just Sayin' says:

looks more like

It looks more like a bit of a setup. It could also be a transposition error on the zip code (dyslexia does exist), or for that matter that a large shipment was going there, and her package got “wrapped” onto a pallet.

My guess is more along the lines of someone trying to stoke the fire against NSA by setting things up. I suspect that the full order from Amazon includes a gift address that isn’t showing.

Jim says:

Similar Experience

I bought a Google Chromecast device through Amazon. The order was placed on 12/26/2013. The estimated delivery date was 1/3/2014. THe device was finally delivered to my home in Phoenix on 1/14/2014. The Fedex Tracking had the package start in Reno, NV. From there it went to (in order):
Sacramento, CA
Los Angeles, CA
Atlanta, GA
Dallas, TX
Phoenix, AZ

You can call this crazy Fedex distribution routing, but I have NEVER seen anything remotely like this. I kept the product and will be having it analyzed.

diane says:

And why is Andrea an Amazon supporter/customer?

It?s hard to have any sympathy whatsoever for someone who orders through Amazon. What? She doesn?t know about Amazon?s horrid warehouses? Amazon?s cloud servicing the CIA? Bezos? disdain and contempt for the average human? I suppose she also has a gmail account and a facebook page?

She?s clearly one of the many who have made Amazon, et al, relevant and dragged the rest of us, who?ve watched in horror for at least a decade now, into a world where Amazon, Google, Apple, PayPal, eBay, Facebook, Twitter, et al, violate, hand in hand with the Fascist (for lack of a more horrific and current adjective) U$ Government, with impunity.

It?s also truly sickening to see so many of those Blawwgers!!! – who fervently aided in making Sly Con Valley the monster that it is ? finally, way too late, talking against it with no apology, or recognition, that they trashed others as Luddites, Trolls? even, for at least a decade, whenever those Luddites expressed concerns re Amazon, Google, Apple, PayPal, eBay, Facebook, Twitter, et al, and the swift trajectory where someone like the sociopath Kurzweil (who has been connected with the Defense Industry for decades, to my understanding) is rapidly approaching his, Go Daddy!, 100% Mechanized World run and imagined by Thought Leader ! …? Papas [only!], wet dream.

Post Script: And about kade? kade is well past the time in which he should explain why the ACLU has a Face Fiend page.

Mike Gale (profile) says:

Mistrust of the Government

The thing that strikes me here is the mistrust and paranoia (justified) that I see.

A few people (in the law, elected reps, management of the securocracy) have started the rot that is progressively destroying faith in government and business.

A slogan of the US, is mutating into something like:

Government of the sheople, by the devil, for the psychopaths.

Sad. I believe that the majority in the occupations that are starting to stink are decent people. The organisations that made this happen, are, in their present states, not fit for purpose in the current age.

Peter Gerdes (profile) says:

This is totally ridiculous.

First, the NSA would only want to intercept a keyboard to do data interception. But there is no reason for them to intercept the data of a tor developer, THE SOURCE CODE IS PUBLIC ALREADY. Unless they think the developer is themselves a terrorist they could care less what they type.

A keyboard would be useless for planting bugs in software. Even if they had the whole computer it would be extremely difficult to leverage that control to force the insertion of backdoors into the code (it would be much easier to hack into github or wherever the `canonical’ version of the tor source is held and insert bugs there…even if there is no defacto canonical repository it would be extremely difficult to hide the introduced bugs from the developer while not disrupting the normal diff/compile/run development process).

If the NSA was sophisticated enough to implement this kind of extensive system compromise (all the tools used by the developer must appear to work normally EXCEPT the hash of any commit needs to include the modified source AND any commit needs to include the modifications BUT somehow when the developer turns the commit into a patch and examines it in ANY text editor it must not appear) they surely wouldn’t screw up at the step where they divert the package.

tbg (profile) says:

They will go after anyone

It happened to my computer as well
Don’t let them get by with the line “

We only go after legitimate targets

I am a teacher and they went after me

I helped a friend write a complaint to a Judicial Ethics Commission pointing out
blatant fraud, and unethical conduct by a Judge and Amicus Attorney.

Approximately 4 days before the complaint was to be filed, I had 3 windows based computers on my home network rendered to Digit zeros with with evidence documents and other exhibits for the complaint destroyed.

At the time, I didn’t really know what happened and just assumed it was a virus that hit my network and all I needed to do was to do were reinstalls of the computer operating systems and all would be well. I was wrong. Even to this day, I continue to have network and computer problems.

After the network attack, the windows computers were rendered as junk. I ordered a new Macbook Pro thinking that a new computer would solve the network problems. The network problems continued. Shortly after the new Macbook Pro was delivered to my home from the Apple online store, I discovered that the EFI Firmware Password had been set before it was delivered. Somebody had tampered with this computer before it arrived at my home. Apple stated that they did not know how this would have happened and they agreed to replace the computer with the one that I
am now using.

I continued to have problems.The recent NSA leaks confirmed my suspicions that I was targeted, but I still have a hard time believing that the government would do such a thing.

After the Snowden revelations, I was determined that I was going to find out for sure and press the issue with Apple. I could never get Apple to do any followup calls to address my issues. Before this
ordeal, I knew very little about computers, but I have educated myself to an extent and Apple cannot or will not answer my questions. When no Sr. Apple Technician in the United States will return my calls, it seems that all my calls to Applecare are routed to Applecare in Canada.

Recently a Sr. Level Apple Advisor in Canada stated to me that when Apple initially replaced the computer which had the firmware tampered with, they replaced it with a computer that did not have the standard operating system that it should have had. The replacement computer had a modified operating system installed.

Why would Apple do this? This is the question that I asked the Sr. Level Apple Advisor and he said he did not know why this was done nor did he know why or how the firmware was tampered with.
This has to stop

nasch (profile) says:

Re: They will go after anyone

I am a teacher and they went after me

What a bizarre story. What sort of teacher are you? That’s a lot of effort to go to if it really was someone behind the scenes (either NSA or someone else, would be impossible to tell) targeting you.

I helped a friend write a complaint to a Judicial Ethics Commission pointing out
blatant fraud, and unethical conduct by a Judge and Amicus Attorney.

Approximately 4 days before the complaint was to be filed, I had 3 windows based computers on my home network rendered to Digit zeros with with evidence documents and other exhibits for the complaint destroyed.

Sounds much more likely to be someone involved with the court system, I don’t see why the NSA would get involved with a case like that. Then again, we still don’t know nearly everything about how they operate.

Thomas says:

Everybody knows..

Seriously, this would never normally show in tracking if it was being diverted by the government. Normally, packages diverted by the government for intervention will show departing the orginating center then simply disappear from network/tracking for 1 Week (often times exactly one week). The next update will be at the local processing center by destination city. The one week timeframe is estimated by them that an individual will accept that their package has been delayed somewhere and look past it without suspicion. Yes, the government uses this domestically all the time. They intercept, inspect, record and of course load malware onto anything and everything you can imagine…

Add Your Comment

Your email address will not be published.

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...