State v Bradley Cooper 04-19-2011

Status
Not open for further replies.
  • #961
I caught the last 20 minutes of testimony. The guy did a good job I thought of clearly explaining how one could hack a WEP account. If that is important for Kurtz's defense theory then well done.

So nice to have a step by step tutorial for all the wanna be hackers!
 
  • #962
Was the neighborhood full of computer geeks?

I was just about to ask the same thing. That would be important with respect to anybody actually having the wherewithal to do it.
 
  • #963
I am lost as a goose! I do not understand any of this. I have to say that I do respect all of you computer people no matter whose side you are on!

re: the latter testimony, JW essentially said that anyone with a wireless-enabled device, the ambition, and in range of the wireless router could break into/log into a wireless network which uses WEP (like the Coopers did).
 
  • #964
According to the options listed, that also included the ability to hack into WPA and WPA2.

That wasn't what that meant. There were other things you could do with that program (such as a denial of service attack). I think it just allowed you to search based on network security type (for filtering purposes).
 
  • #965
Theoretically, a neighbor could have done this to gain access to the network after the 11th, hacked into the PC, changed the date on the PC, performed the search, then changed the date back.

The distance would limit the pool of people who could do it in their houses, and I wonder if any in that 100 meter or so range were some of those involved in all the drama. Also, for purposes of the theory, it wouldn't have to be a neighbor I suppose as it could have been anyone with a motive who got their laptop close enough to do the deed - could be done while sitting in a car.

I haven't seen anything at all that would make me think this is in any way what happened, but they have shown it could, at least to the point of getting into the network.
 
  • #966
Now how and why it does not work. Only a small part of what is needed to protect a system. Better than nothing, usually.

BTW Norton is part of Symantec, the company Ward worked for after Cisco.

I do know I almost never got Norton off of my computer! I went in to 'search files' and deleted every file connected with it. I hated it.

I have free virus protection with my ATT account. Even though it is Norton, it is an updated version which does not take as long to load.

JMO
 
  • #967
I agree re office vs home sec. difference -- but I just can't imagine someone working in a Cisco or similar business (like many of us who know the dangers of hacking) and not being just naturally security-conscious. He certainly wouldn't want his unfriendly neighbors having any teeny tiny chance of breaking into anything he had online, so surely, Shirley, he would have had it wrapped up in some decent kind of protocol, protection, etc., etc.

He probably set up wep long before the vulnerabilities were known. That's what I did. And I just got around to changing to WPA last month.
 
  • #968
A neighbor OR CPD.

specifically, anyone who wanted to take a peek at BC's laptop or home PC before a SW was issued. I have a feeling we're going to find out someone did.
 
  • #969
Are there different size fxo cards? I'm just curious since the Cisco expert said he had to have at least the 2600 series (or whatever 2xxx number it was).

I'm sure there are, but one example:
The VIC-2FXO is a 2 port card and is compatible with the 1751, 1760, 2600, 3600, 2600XM, 2691, 3725, and 3745.

So, it appears that the same size card works over a wide product range.
 
  • #970
Good point ... so I guess the IP address for the machine at the time of the search is work ... but with a home office that is connected to cisco network, is the IP address the home or work IP?

It would be home or both. If he was running a VPN client, his laptop would have a 192.x.x.x (or whatever) private IP address and also an address assigned from Cisco.
 
  • #971
Theoretically, a neighbor could have done this to gain access to the network after the 11th, hacked into the PC, changed the date on the PC, performed the search, then changed the date back.

In theory, one of the friendly neighbors may have decided that they had to help the police along a little with evidence ... and now we know how quick and easy it is to hack in and mess with the machine.
 
  • #972
All you computer experts out there - are 'we' crazy to be using wireless laptops etc?
 
  • #973
He didn't have to infiltrate her PC...he used it downstairs that morning. He said in the deposition that it was the family PC. We have a similar set up. We have a PC downstairs that we both have accounts on. Then I have my work PC and laptop and a personal laptop. She doesn't use anything but the home PC.

But Brad was quite capable to getting onto nancy's computer dating back to April..and this guy showed how easy it is for puter geekish peeps to do..so was quite capale to know exactly what she said, planned or was going to do by getting copy's of everything she sent or received from people....Personally I dont think this is really helpful for the defense. Of course the defense can accuse neighbours or interlopers of hacking onto his computer back before it was seized..but it would have to been done after finding Nancy and Identifying her which wasnt until the 15th, late in the day..So talk about conspiracy theories :waitasec:
 
  • #974
Theoretically, a neighbor could have done this to gain access to the network after the 11th, hacked into the PC, changed the date on the PC, performed the search, then changed the date back.

Now the question is, which neighbor not only hated Brad enough to do this, but was savvy enough?

My husband knows the details of this case because I keep updating him, whether he wants me to or not. I asked him, if he was a juror, and this defense was presented to him, what would he think. LOL accurately represents his response. Surely, if this is what Kurtz is hanging Brad's future on, he's been figuring out who the "real killer" is because without proof a neighbor did this, they will be laughing in the jury room.

Don't see the scenario of someone sitting outside on the street in the car hacking Brad's computer either. This isn't a movie with Brad's enemies waiting for the right opportunity!
 
  • #975
It would be home or both. If he was running a VPN client, his laptop would have a 192.x.x.x (or whatever) private IP address and also an address assigned from Cisco.

Yes, and the address assigned from Cisco would be different if he was on via VPN compared to being connected at the office.
 
  • #976
In theory, one of the friendly neighbors may have decided that they had to help the police along a little with evidence ... and now we know how quick and easy it is to hack in and mess with the machine.

I suspect tomorrow we'll hear questions from Kurtz along the lines of:

"is it possible to detect these intrusions?" (witness's specialty)

"and what did you find?"
 
  • #977
I think if they go this way they should stick to the irate neighbor concept. If CPD were looking to plant evidence, it seems they'd plant some physical evidence and be done with it.

To me they are trying to pour water into an upside down bucket unless they can show the system WAS hacked and things actually altered, or produce the neighbor who did it.
 
  • #978
I suspect tomorrow we'll hear questions from Kurtz along the lines of:

"is it possible to detect these intrusions?" (witness's specialty)

"and what did you find?"

You should be the person who gets to write the teasers for upcoming testimony b/c that would (will?) be exciting stuff! :rocker:
 
  • #979
All you computer experts out there - are 'we' crazy to be using wireless laptops etc?

I think for the most part people have better things to do with their time than hack into other people's machines. I'm not super secure with my machine ... don't really care what happens so long as nothing malicious happens. I use Sophos antivirus software. Seems to work.
 
  • #980
So far, we've seen it is easy to get on a WEP network.

Next, the hacker will need to be lucky that:
1) the laptop is on
2) the laptop is connected to home network
Have the skill to:
1) defeat the cisco installed security software on the laptop.
2) know how to leave a TIF without a cookie without leaving a trace of unauthorized access

Bringing the popcorn for tomorrow.
 
Status
Not open for further replies.

Members online

Online statistics

Members online
108
Guests online
2,305
Total visitors
2,413

Forum statistics

Threads
632,725
Messages
18,630,978
Members
243,274
Latest member
WickedGlow
Back
Top