Using a Virtual Private Network (VPN) you can appear to be any persona you have created, or any actual person, located anyplace in the world with an Internet accessible device.
You can use any software functions that will work on the Internet, and make it look like a real person caused it to occur.
A moderately trained Network Specialist, or a novice Network Engineer can easily make a hacking or failed attempts look like they are being made from any place in the world, let's say Russia, even if initiated from within the same network from which it was sent (Virginia, New York, DC); or any device, anywhere, and remain virtually impossible to track beyond the VPN server chosen, like let's say Brazil, Czechia or Russia.
Let's imagine that a political party and a candidate's organization wanted, demonize their opponent.
If they had a couple competent non-citizen Information Technologists working for them that could escape the country with software files and data evidence to their former homeland without a likely deportation process back to the USA; in case something went terrible wrong. Send the evidence and a less visible participants home at the first sign of trouble. The IT guys would clean up servers, device, files and software not already safely in a third world homeland where they have other documents and contacts ready to hide them.
Leaving behind the fake trail of Russian looking attempts to interfere in a political campaign. Leaving fake stories of candidate misbehavior and fake correspondence suggesting collusion with Russians to interfere or attempt to hack files of their own party or campaign, or easily plant dis-information intended to disrupt voting on social media platforms barely disguising the fake origin appearing to be Russia
Then with all the easy evidence gone, you would need only remove and replace with clean drives and memories on the actual devices of origin; and destroy a couple old hard drive and memories.
With the people, and money safely hidden in let's say Pakistan, and all possible hardware and most software destroyed; there would no way to implicate the opposition campaign and candidate of anything but being victim's of a terrible conspiracy to collude with Russians to steal the election from a popular, but losing candidate.
It would be as easy to do, as it was to imagine.
You can use any software functions that will work on the Internet, and make it look like a real person caused it to occur.
A moderately trained Network Specialist, or a novice Network Engineer can easily make a hacking or failed attempts look like they are being made from any place in the world, let's say Russia, even if initiated from within the same network from which it was sent (Virginia, New York, DC); or any device, anywhere, and remain virtually impossible to track beyond the VPN server chosen, like let's say Brazil, Czechia or Russia.
Let's imagine that a political party and a candidate's organization wanted, demonize their opponent.
If they had a couple competent non-citizen Information Technologists working for them that could escape the country with software files and data evidence to their former homeland without a likely deportation process back to the USA; in case something went terrible wrong. Send the evidence and a less visible participants home at the first sign of trouble. The IT guys would clean up servers, device, files and software not already safely in a third world homeland where they have other documents and contacts ready to hide them.
Leaving behind the fake trail of Russian looking attempts to interfere in a political campaign. Leaving fake stories of candidate misbehavior and fake correspondence suggesting collusion with Russians to interfere or attempt to hack files of their own party or campaign, or easily plant dis-information intended to disrupt voting on social media platforms barely disguising the fake origin appearing to be Russia
Then with all the easy evidence gone, you would need only remove and replace with clean drives and memories on the actual devices of origin; and destroy a couple old hard drive and memories.
With the people, and money safely hidden in let's say Pakistan, and all possible hardware and most software destroyed; there would no way to implicate the opposition campaign and candidate of anything but being victim's of a terrible conspiracy to collude with Russians to steal the election from a popular, but losing candidate.
It would be as easy to do, as it was to imagine.
No comments:
Post a Comment