{"id":9417,"date":"2017-10-09T17:39:16","date_gmt":"2017-10-09T21:39:16","guid":{"rendered":"http:\/\/worldjusticenews.com\/news\/?p=9417"},"modified":"2017-10-09T17:39:16","modified_gmt":"2017-10-09T21:39:16","slug":"vpn-logs-helped-fbi-catch-alleged-suspect-extensive-cyberstalking-campaign","status":"publish","type":"post","link":"https:\/\/worldjusticenews.com\/news\/2017\/10\/09\/vpn-logs-helped-fbi-catch-alleged-suspect-extensive-cyberstalking-campaign\/","title":{"rendered":"VPN logs helped FBI catch alleged suspect of extensive cyberstalking campaign"},"content":{"rendered":"<p>A Massachusetts man was arrested late last week on suspicion of conducting a cyberstalking campaign against a female former roommate, her friends, and family. Court documents reveal that logs, obtained by the FBI from privacy service PureVPN, helped the prosecution. Until now, PureVPN had always maintained it carried no logs &#8211; almost.<\/p>\n<p>Last Thursday, Ryan S. Lin, 24, of Newton, Massachusetts, was arrested on suspicion of conducting \u201can extensive cyberstalking campaign\u201d against his former roommate, a 24-year-old Massachusetts woman, as well as her family members and friends.<\/p>\n<p>According to the Department of Justice, Lin\u2019s \u201cmulti-faceted campaign of computer hacking and cyberstalking\u201d began in April 2016 when he began hacking into the victim\u2019s online accounts, obtaining personal photographs, sensitive information about her medical and sexual histories, and other private details.<\/p>\n<p>It\u2019s alleged that after obtaining the above material, Lin distributed it to hundreds of others. It\u2019s claimed he created fake online profiles showing the victim\u2019s home address while soliciting sexual activity. This caused men to show up at her home.<\/p>\n<p>\u201cMr. Lin allegedly carried out a relentless cyber stalking campaign against a young woman in a chilling effort to violate her privacy and threaten those around her,\u201d said Acting United States Attorney William D. Weinreb.<\/p>\n<p>\u201cWhile using anonymizing services and other online tools to avoid attribution, Mr. Lin harassed the victim, her family, friends, co-workers and roommates, and then targeted local schools and institutions in her community. Mr. Lin will now face the consequences of his crimes.\u201d<\/p>\n<p>While Lin awaits his ultimate fate (he appeared in U.S. District Court in Boston Friday), the allegation he used anonymization tools to hide himself online but still managed to get caught raises a number of questions. An affidavit submitted by Special Agent Jeffrey Williams in support of the criminal complaint against Lin provides most of the answers.<\/p>\n<p>Describing Lin\u2019s actions against the victim as \u201cdoxing\u201d, Williams begins by noting that while Lin was the initial aggressor, the fact he made the information so widely available raises the possibility that other people got involved with malicious acts later on. Nevertheless, Lin remains the investigation\u2019s prime suspect.<\/p>\n<p>According to the affidavit, Lin is computer savvy having majored in computer science. He allegedly utilized a number of methods to hide his identity and IP address, including TOR, Virtual Private Network (VPN) services and email providers that \u201cdo not maintain logs or other records.\u201d<\/p>\n<p>But if that genuinely is the case, how was Lin caught?<\/p>\n<p>First up, it\u2019s worth noting that plenty of Lin\u2019s aggressive and stalking behaviors towards the victim were demonstrated in a physical sense, offline. In that respect, it appears the authorities already had him as the prime suspect and worked back from there.<\/p>\n<p>In one instance, the FBI examined a computer that had been used by Lin at a former workplace. Although Windows had been reinstalled, the FBI managed to find Google Chrome data which indicated Lin had viewed articles about bomb threats he allegedly made. They were also able to determine he\u2019d accessed the victim\u2019s Gmail account and additional data suggested that he\u2019d used a VPN service.<\/p>\n<p>\u201cArtifacts indicated that PureVPN, a VPN service that was used repeatedly in the cyberstalking scheme, was installed on the computer,\u201d the affidavit reads.<\/p>\n<p>From here the Special Agent\u2019s report reveals that the FBI received cooperation from Hong Kong-based PureVPN.<\/p>\n<p>\u201cSignificantly, PureVPN was able to determine that their service was accessed by the same customer from two originating IP addresses: the RCN IP address from the home Lin was living in at the time, and the software company where Lin was employed at the time,\u201d the agent\u2019s affidavit reads.<\/p>\n<p>Needless to say, while this information will prove useful to the FBI\u2019s prosecution of Lin, it\u2019s also likely to turn into a huge headache for the VPN provider. The company claims zero-logging, which clearly isn\u2019t the case.<\/p>\n<p>\u201cPureVPN operates a self-managed VPN network that currently stands at 750+ Servers in 141 Countries. But is this enough to ensure complete security?\u201d the company\u2019s marketing statement reads.<\/p>\n<p>\u201cThat\u2019s why PureVPN has launched advanced features to add proactive, preventive and complete security. There are no third-parties involved and NO logs of your activities.\u201d<\/p>\n<p><center><b>PureVPN privacy graphic<\/b><a href=\"https:\/\/torrentfreak.com\/images\/pure-privacy.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-145636\" src=\"https:\/\/torrentfreak.com\/images\/pure-privacy.png\" alt=\"\" width=\"1202\" height=\"406\" \/><\/a><\/center>However, if one drills down into the PureVPN\u00a0<a href=\"https:\/\/www.purevpn.com\/privacy-policy.php\" target=\"_blank\" rel=\"noopener\">privacy policy<\/a>\u00a0proper, one sees the following:<\/p>\n<blockquote><p><em>Our servers automatically record the time at which you connect to any of our servers. From here on forward, we do not keep any records of anything that could associate any specific activity to a specific user. The time when a successful connection is made with our servers is counted as a \u2018connection\u2019 and the total bandwidth used during this connection is called \u2018bandwidth\u2019. Connection and bandwidth are kept in record to maintain the quality of our service. This helps us understand the flow of traffic to specific servers so we could optimize them better.<\/em><\/p><\/blockquote>\n<p>This seems to match what the FBI says \u2013 almost. While it says it doesn\u2019t log, PureVPN admits to keeping records of when a user connects to the service and for how long. The FBI clearly states that the service also captures the user\u2019s IP address too. In fact, it appears that PureVPN also logged the IP address belonging to another VPN service (WANSecurity) that was allegedly used by Lin to connect to PureVPN.<\/p>\n<p>That record also helped to complete another circle of evidence. IP addresses used by<br \/>\nKansas-based WANSecurity and Secure Internet LLC (servers operated by PureVPN) were allegedly used to access Gmail accounts known to be under Lin\u2019s control.<\/p>\n<p>Somewhat ironically, this summer Lin took to Twitter to criticize VPN provider IPVanish (which is not involved in the case) over its no-logging claims.<\/p>\n<p>\u201cThere is no such thing as a VPN that doesn\u2019t keep logs,\u201d Lin said. \u201cIf they can limit your connections or track bandwidth usage, they keep logs.\u201d<\/p>\n<p>Or, in the case of PureVPN, if they log a connection time and a source IP address, that could be enough to raise the suspicions of the FBI and boost what already appears to be a pretty strong case.<\/p>\n<p>If convicted, Lin faces up to five years in prison and three years of supervised release.<\/p>\n<p>Source: \u00a0<a href=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\" alt=\"TorrentFreak\" width=\"38\" height=\"38\" \/><\/a> <a href=\"https:\/\/torrentfreak.com\/purevpn-logs-helped-fbi-net-alleged-cyberstalker-171009\/\" target=\"_blank\" rel=\"noopener noreferrer\">TorrentFreak.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\">A Massachusetts man was arrested late last week on suspicion of conducting a cyberstalking campaign against a female former roommate, her friends, and family. Court documents reveal that logs, obtained by the FBI from privacy <a class=\"mh-excerpt-more\" href=\"https:\/\/worldjusticenews.com\/news\/2017\/10\/09\/vpn-logs-helped-fbi-catch-alleged-suspect-extensive-cyberstalking-campaign\/\" title=\"VPN logs helped FBI catch alleged suspect of extensive cyberstalking campaign\">[&#8230;]<\/a><\/div>\n","protected":false},"author":1,"featured_media":4270,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","footnotes":""},"categories":[2,3],"tags":[4274,1172,342,4273,4275,1890],"class_list":{"0":"post-9417","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-usa","9":"tag-cyberstalking","10":"tag-fbi","11":"tag-massachusetts","12":"tag-purevpn","13":"tag-ryan-lin","14":"tag-vpn","15":"pmpro-has-access"},"_links":{"self":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/comments?post=9417"}],"version-history":[{"count":1,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9417\/revisions"}],"predecessor-version":[{"id":9418,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9417\/revisions\/9418"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media\/4270"}],"wp:attachment":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media?parent=9417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/categories?post=9417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/tags?post=9417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}