3
   

Hypothetical computer hacking question

 
 
Reply Sun 15 Jul, 2012 11:08 am
I wondering if this would be at all possible....

Suppose someone wanted to plant internet searches onto another person's computer. Could they do this remotely, without it being traceable, or would they have to actually do the searches on the person's computer?
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Question • Score: 3 • Views: 2,559 • Replies: 15
No top replies

 
Ragman
 
  2  
Reply Sun 15 Jul, 2012 11:16 am
@boomerang,
To my knowledge such an intrusion is traceable. However, once someone has access to a computer remote or otherwise, the browser history might appear to show a local search.

Back to traceability, it's my understanding, under normal circusmtances, the history of this intrusion is traceable through computer security application (either OS or 3rd party).

Do you think that such a thing has happened to you?
boomerang
 
  1  
Reply Sun 15 Jul, 2012 11:21 am
@Ragman,
Oh no! I didn't happen to me.

Mr. B and I were speculating on this over breakfast today because of an article in our paper.

We started talking about something like the Casey Anthony case -- would it ever be possible for someone to remotely plant internet searches on someone's computer to make it look like they were looking for information about a particular topic, even though they weren't.
contrex
 
  2  
Reply Sun 15 Jul, 2012 11:28 am
Depends on how you searched, I guess. Google keep a log of everything you have searched for, and surfed to from a Google search, but it's not on your computer, it's on theirs. If you have a Google account, you can access a setting that appears to "disable" it, but in fact Google still gather this information. If you made the searches from a shared computer, e.g. in a school or library, as well as at home, and you forgot to sign out, then other people's searches could get mixed with yours.

Also your browser keeps a history on your computer of sites you have visited and what you typed into text boxes on those sites, and I believe it is possible for hackers running malicious websites to steal that history.

As for altering it, I am not so sure.
0 Replies
 
DrewDad
 
  1  
Reply Sun 15 Jul, 2012 11:38 am
@boomerang,
Internet search history is just a bunch of files, so if the machine has been compromised it would be fairly easy to edit the files to falsify the search history.
0 Replies
 
Ragman
 
  1  
Reply Sun 15 Jul, 2012 11:50 am
@boomerang,
In the case of a legal case such as this, the police through a forensic computer examination, could detect the intrusion and it would be traceable. They might not be able to prove who did it.
DrewDad
 
  1  
Reply Sun 15 Jul, 2012 12:00 pm
@Ragman,
It's entirely possible to clean up in such a way that it is not detectable.
Ragman
 
  1  
Reply Sun 15 Jul, 2012 12:26 pm
@DrewDad,
Oh, OK.
0 Replies
 
boomerang
 
  2  
Reply Sun 15 Jul, 2012 03:53 pm
@DrewDad,
Wow!

So if you wanted to frame someone for a crime you could plant some Google searches and some page hits on their computer, then clean up your tracks so that it would look like they made the searches?

What if you wanted it to look like someone was trying to frame you for something? You sneak into your own computer and leave a small trail that leads to someone else so they take the fall for the crime?

I just keep noticing that computers are searched in a wide variety of crimes now -- things that don't really have anything to do with computers. It all makes me wonder how easy it might be to set someone up.
0 Replies
 
ehBeth
 
  2  
Reply Sun 15 Jul, 2012 05:22 pm
@DrewDad,
I work with forensics people in some parts of my work. They claim that everything involving computer/internet interaction can be traced because of the number of points of contact. The computer can be cleaned, but the trail remains (something like 15 - 200 points of contact in an email from one office to another).
DrewDad
 
  2  
Reply Sun 15 Jul, 2012 05:30 pm
@ehBeth,
That's true for something like an E-mail, where every server that forwards the message writes to the message header.

It's also much easier to perform forensics on corporate systems, since most corporate environments will keep activity logs.

On a home system, with just a wireless router that doesn't keep any logs, it's much more difficult to trace what happens.

If search history were modified (including the file creation and modification dates), and the remote access program were deleted (and random data written over the file location), it would be difficult to show that any manipulation took place.
ehBeth
 
  1  
Reply Sun 15 Jul, 2012 05:33 pm
@DrewDad,
DrewDad wrote:
it would be difficult to show that any manipulation took place.


that's why they get paid the big $$$, to make the difficult more possible
0 Replies
 
boomerang
 
  1  
Reply Sun 15 Jul, 2012 05:44 pm
I wonder if the police would bother to check this stuff.

Maybe they'd just say "S/He has child porn on their computer" without ever thinking to look to see if it was somehow planted there.
roger
 
  2  
Reply Sun 15 Jul, 2012 06:55 pm
@boomerang,
That is probably how they would react, while being clueless to the possibilities of further research.
boomerang
 
  1  
Reply Sun 15 Jul, 2012 06:58 pm
@roger,
I think so too.
DrewDad
 
  1  
Reply Sun 15 Jul, 2012 07:01 pm
@boomerang,
Considering the fact that they've raided people's houses for downloading child porn, only to discover it was someone piggybacking off of their WiFi, I would have to agree.
0 Replies
 
 

Related Topics

Clone of Micosoft Office - Question by Advocate
Do You Turn Off Your Computer at Night? - Discussion by Phoenix32890
The "Death" of the Computer Mouse - Discussion by Phoenix32890
Windows 10... - Discussion by Region Philbis
Surface Pro 3: What do you think? - Question by neologist
Windows 8 tips thread - Discussion by Wilso
GOOGLE CHROME - Question by Setanta
.Net and Firefox... - Discussion by gungasnake
Hacking a computer and remote access - Discussion by trying2learn
 
  1. Forums
  2. » Hypothetical computer hacking question
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.13 seconds on 12/23/2024 at 06:29:33