portland independent media center  
images audio video
newswire article commentary global

corporate dominance | government | technology

Repuglicans hacking into U.S. Democratic Senaters computers.

With the recent news of the U.S. Senaters computers being hacked, one most consider the following when one goes to such sites like the  http://www.democrats.org what you might be finding in logs from your firewall after filling out a web form to submit for review by said party.
I just recently filled out a form that the Democrats placed up on their site demanding an investigation into the hacking of Senate leaders computers. What showed in in my logs are a clear and ever present statement about juno.com,netzerro.net and bluelite.com attempting gleam information packets
in transit from your computer to the server and back, like your name, address and phone number if you included it in your out going packet. Below is proof that juno's servers are indeed gathering information on who ever might go to the Democratic servers:

Subject: Your networks, juno.com/netzerro.net and bluelite.com, the
Democrats web site and hacking!
Cc:  dccc@dccc.org,  mail@democraticunderground.com,  denis@democracynow.org,
 politics.editor@guardianunlimited.co.uk,  maxwell@sptimes.com,  david@sfgate.com,  graywolf611@earthlink.net X-ELNK-AV: 0

Learning that the Democrats computers in the U.S. Senate have been compromised by the Republicans, one considers those coming from your domains doing the same type of hacking to see what one could get in info while filling out a web form to submit the Democratic Headquarters. It would be most interesting to find out if your CEO's have given large sums of money to the Republican National Committee.

This issue should be looked into by the Democrats when it comes to computers and hacking.

I'd really like to know why someone from your domain shows up on my logs every time I go to the Democratic National Committee site juno.com/netzerro.net and bluelite.com?

Intego NetBarrier Log

Date of Creation: 01/25/2004
Log period: From 01/25/2004, 4:55:07 PM to 01/25/2004, 6:07:14 PM

Status Date & Time Network Address Domain Name Kind

01/25/2004, 6:07:14 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:06:14 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:05:49 PM 63.215.64.23 unknown.level3.net. Connection to: TCP HTTP

01/25/2004, 6:05:48 PM 66.77.163.38 66.77.163.38 Connection to: TCP HTTP

01/25/2004, 6:05:26 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:05:25 PM 208.254.24.201 www.democrats.org. Connection to: TCP HTTP

01/25/2004, 6:05:02 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:50 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:44 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:41 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:39 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:20 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:15 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:10 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:04:05 PM 64.136.29.190 search.lax.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 6:03:05 PM 206.117.161.80 samspade.org. Connection to: TCP HTTP

01/25/2004, 6:00:31 PM 192.149.252.43 192.149.252.43 Connection to: TCP whois

01/25/2004, 4:59:09 PM 206.117.161.80 samspade.org. Connection to: TCP HTTP

01/25/2004, 4:58:07 PM 192.149.252.43 192.149.252.43 Connection to: TCP whois

01/25/2004, 4:56:14 PM 64.136.21.234 my-ccfail.nyc.untd.com. Communication rejected: Host in Stop List.

01/25/2004, 4:55:25 PM 206.117.161.81 blighty.com. Connection to: TCP HTTP

01/25/2004, 4:55:07 PM 206.117.161.80 samspade.org. Connection to: TCP

and this one while I was at the same site  http://www.democrats.org:

Intego NetBarrier Log

Date of Creation: 01/20/2004
Log period: From 01/20/2004, 1:24:08 PM to 01/20/2004, 2:24:42 PM

Status Date & Time Network Address Domain Name Kind

01/20/2004, 2:24:42 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:21:57 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:20:15 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:16:56 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:14:22 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:13:24 PM 64.136.21.235 my-resetpw.nyc.untd.com. Communication rejected: Host in Stop List.

01/20/2004, 2:13:02 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

01/20/2004, 2:09:58 PM 207.188.221.246 democrats.com. Connection to: TCP HTTP

Then this one:

Intego NetBarrier Log

Date of Creation: 01/25/2004
Log period: From 01/25/2004, 2:47:21 PM to 01/25/2004, 3:05:15 PM

Status Date & Time Network Address Domain Name Kind

01/25/2004, 3:05:15 PM 64.136.29.190 search.lax.untd.com. Enter Stop List manually

01/25/2004, 3:02:19 PM 64.136.29.190 search.lax.untd.com. Connection to: TCP HTTP

01/25/2004, 3:02:14 PM 208.254.24.197 ns1.democrats.org. Connection to: TCP HTTP

01/25/2004, 3:00:30 PM 208.254.24.197 ns1.democrats.org. Connection to: TCP HTTP

01/25/2004, 2:57:50 PM 208.254.24.197 ns1.democrats.org. Connection to: TCP HTTP

01/25/2004, 2:49:44 PM 63.215.64.110 unknown.level3.net. Connection to: TCP HTTP

01/25/2004, 2:49:35 PM 208.254.24.197 ns1.democrats.org. Connection to: TCP HTTP

01/25/2004, 2:48:29 PM 63.215.64.110 unknown.level3.net. Connection to: TCP HTTP

01/25/2004, 2:48:28 PM 66.77.163.38 66.77.163.38 Connection to: TCP HTTP

01/25/2004, 2:47:21 PM 208.254.24.197 ns1.democrats.org. Connection to: TCP

Which is one of your domains:

Whois user[@<whois.server>]: 64.136.29.190

[whois.arin.net]

OrgName: Juno Online Services, Inc.
OrgID: JUNO
Address: United Online, Inc.
City: Thousand Oaks
StateProv: CA
PostalCode: 91359
Country: US

NetRange: 64.136.0.0 - 64.136.63.255
CIDR: 64.136.0.0/18
NetName: JUNO-BLK
NetHandle: NET-64-136-0-0-1
Parent: NET-64-0-0-0-0
NetType: Direct Allocation
NameServer: AUTHNS.WLV.UNTD.COM
NameServer: AUTHNS.NYC.UNTD.COM
NameServer: AUTHNS.LAX.UNTD.COM
Comment:
RegDate: 2000-07-26
Updated: 2003-02-26

TechHandle: IU14-ARIN
TechName: United Online, Inc.
TechPhone: +1-805-418-2000
TechEmail:  hostmaster@noc.untd.com
Umm... 26.Jan.2004 10:47

Anyone

The fact that a server sends you a packet is not proof, nor even an indication, that that server is trying to eavesdrop on your communications.

That's like thinking that because telemarketers call your home phone it proves that they're tapping your phone.

In fact, someone determined to and capable of intercepting the data streams going into and coming from democrats.org would do so silently, without disturbing their communications.

If the path between your computer and the democrats.org server happens to pass through a router belonging to whoever it is that your knickers are in a twist about, you might get connections from that domain that are just part of the networks' continual sorting-out of what's where and who gets what.

Or it could be due to a variety of ordinary reasons. There's a lot of traffic rattling around the Net and a great deal of it is either normal network housekeeping or confused machines calling out to each other.

I see from your post that you've been using the Sam Spade Web site. For "Bob"'s sake, read their FAQ- ESPECIALLY the "personal firewalls" page.