If Ron Livingston's attorney is smart he'll get a private dick (I chose my words carefully) to check out the B&B ownership in France, and another to pay a visit to Foundation66 in London, before the trail gets too cold. But most attorneys prefer to spew out court briefs that have little chance of success, because they charge by the billable hour (and probably charge more than private dicks).
QUOTE(Somey @ Mon 7th December 2009, 8:56pm)
Maybe he doesn't actually work for Foundation66 at all (despite
this, which I should note is not on the Foundation66 website and was posted by someone else, named "Richard" - so even that could be phony). He might have just known somebody there, for all we know... I mean, if Foundation66 is running a Windows NT (or higher) domain controller that exposes a proxy that's remotely available to anyone with a domain account there, he wouldn't even have to use a remoting program, right? Just specify that that's his proxy server in his Internet settings.
But ultimately, yes, I do think it's easier (or at least more likely) for someone to fake a social-services job than a French B&B.
Yes, with 200 staff members, and no doubt dozens of affiliate self-help groups, and many volunteer "practitioners," I imagine it would be very simple to steal some announcement of some upcoming event and post it under your own name. No one would care or notice that you signed it "Senior Practitioner."
Here's a port scan on that Foundation66 IP, but I don't know much about ports or about nmap, so I probably missed anything significant that might indicate vulnerability as a proxy, or completely messed up nmap since I've tried to use it only about three times in my life:
CODE
C:\NMAPRAW\nmap-4.76>nmap -sVC -v 212.22.3.8
Starting Nmap 4.76 ( http://nmap.org ) at 2009-12-06 00:23 Central Standard Time
Initiating Ping Scan at 00:23
Scanning 212.22.3.8 [2 ports]
Completed Ping Scan at 00:23, 0.20s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 00:23
Completed Parallel DNS resolution of 1 host. at 00:23, 0.02s elapsed
Initiating SYN Stealth Scan at 00:23
Scanning dickens.arp-uk.org (212.22.3.8) [1000 ports]
Discovered open port 1723/tcp on 212.22.3.8
Discovered open port 443/tcp on 212.22.3.8
Discovered open port 25/tcp on 212.22.3.8
Discovered open port 80/tcp on 212.22.3.8
Discovered open port 143/tcp on 212.22.3.8
Discovered open port 993/tcp on 212.22.3.8
Completed SYN Stealth Scan at 00:23, 8.33s elapsed (1000 total ports)
Initiating Service scan at 00:23
Scanning 6 services on dickens.arp-uk.org (212.22.3.8)
Completed Service scan at 00:25, 118.67s elapsed (6 services on 1 host)
SCRIPT ENGINE: Initiating script scanning.
Initiating SCRIPT ENGINE at 00:25
Completed SCRIPT ENGINE at 00:25, 1.89s elapsed
Host dickens.arp-uk.org (212.22.3.8) appears to be up ... good.
Interesting ports on dickens.arp-uk.org (212.22.3.8):
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
25/tcp open smtp Microsoft ESMTP 6.0.3790.3959
| SMTPcommands: EHLO mailserver.rharp.org.uk Hello [69.149.106.37], TURN, SIZE,
ETRN, PIPELINING, DSN, ENHANCEDSTATUSCODES, 8bitmime, BINARYMIME, CHUNKING, VRF
Y, TLS, STARTTLS, X-EXPS GSSAPI NTLM LOGIN, X-EXPS=LOGIN, AUTH GSSAPI NTLM LOGIN
, AUTH=LOGIN, X-LINK2STATE, XEXCH50
|_ HELP This server supports the following commands:, , HELO EHLO STARTTLS RCPT
DATA RSET MAIL QUIT HELP AUTH TURN ETRN BDAT VRFY
80/tcp open http Microsoft IIS webserver 6.0
|_ HTML title: Site doesn't have a title.
143/tcp open imap Microsoft Exchange IMAP server (refused)
443/tcp open https?
|_ HTML title: Site doesn't have a title.
465/tcp closed smtps
587/tcp closed submission
993/tcp open imap Microsoft Exchange IMAP server (refused)
1723/tcp open pptp Microsoft (Firmware: 3790)
Service Info: Host: mailserver.rharp.org.uk; OS: Windows
Read data files from: C:\NMAPRAW\nmap-4.76
Service detection performed. Please report any incorrect results at http://nmap.
org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 130.16 seconds
Raw packets sent: 1997 (87.836KB) | Rcvd: 18 (768B)
C:\NMAPRAW\nmap-4.76>