topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday December 11, 2024, 10:57 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: FOI Documents Show TOR Undernet Beyond the Reach of the Federal Investigators  (Read 8288 times)

Renegade

  • Charter Member
  • Joined in 2005
  • ***
  • Posts: 13,291
  • Tell me something you don't know...
    • View Profile
    • Renegade Minds
    • Donate to Member
So, we have it from the horses mouth that TOR works:

http://www.activistp...undernet-beyond.html

Recently released documents detail the federal government's inability to pursue cybercriminals shrouded by the tricky anonymity tools used by the Silk Road marketplace and other darknet sites - tools which are funded in part by the federal government itself. In this particular case, a citizen reported stumbling upon a cache of child pornography while browsing the anonymous Tor network's hidden sites, which are viewable with specialized, but readily available, tools and the special .onion domain.

So, chalk up a victory for TOR and .onion~! :D The surveillance state isn't perfect yet.

(Shame about the kiddie porn there... No sympathy from me and only violent rants to ensue, but for the privacy issue - all thumbs up.)
Slow Down Music - Where I commit thought crimes...

Freedom is the right to be wrong, not the right to do wrong. - John Diefenbaker

IainB

  • Supporting Member
  • Joined in 2008
  • **
  • Posts: 7,544
  • @Slartibartfarst
    • View Profile
    • Read more about this member.
    • Donate to Member
Yes, I read about this on the Activist blog. I am skeptical, because of the history of such technologies.
My take on it is that it may or may not be true.
  • (a) If it is true that Tor is impenetrable by the SS (includes Government military, CIA, FBI, para-military, police, or other Secret Services in any form), then maybe we can anticipate a piece of legislation that outlaws its use for civilian communication purposes. The SS after all have a legal duty to intercept and monitor all civilian communications as necessary, for them to meet their obligations for maintaining national security/defence. A government's job, after all, includes the responsibility for "protecting" the people - right? It's all about "Protect & Serve".
  • (b) If it is not true, then the "documents" may have been deliberately released to con people into thinking it is true, so that the people continue to use Tor in blissful ignorance that their communications are being (or can be) intercepted, decoded and monitored by the SS.

The reasoning behind this is that all forms of modern electronic communication transmission, security, and encryption tend to stem from a purpose that originally had a solely military/defence use.
For example, 2 cases:
CASE #1 - Encryption:
Spoiler
In the '70's, there was a legal limit on the level of encryption technology that could be employed in acoustic telephone modems. The standard (level) of encryption permissible was limited by the US DoD. The standard that was permissible was generally referred to as "Commercial" grade encryption, and it was allowable because it could be broken/decrypted by the military.

CASE #2 - GPS:
Spoiler
GPS had a similar military history. It was created and implemented by the U.S. DoD. I think it was originally operated via a 24-satellite GSS network, and fired up in  1994. It was enhanced in/by 1998 and given a much higher resolution (accuracy) technology, which was not available for civilian use (think Cruise Missile self-navigation/guidance systems). Civilian use was allowed only for a downgraded ("fuzzy") version of GPS. I recall that the U.S. government (under the Clinton administration) legally allowed the civilian use of the higher resolution technology in 2000 - the DoD presumably by then having a still higher resolution technology. This was a boon to cartographers and for cadastre upgrade. By now, China and European countries either have developed/implemented or are planning to implement their own GPS technology, so as to be independent of the US-DoD controlled variety.


From these 2 cases, you can see that, for such technologies, there seems to be a "Pandora's Box" type of window of opportunity:
Secure and impenetrable telecommunications, impenetrable encryption, and GPS, are each rather like a Pandora's Box. Once you start using a new military technology, it is only a matter of time before it spreads and the military advantage of that technology dissipates. The trick is to control it as "secret" for as long as possible.
In the case of encryption, recent history provides a sobering example of what can happen when the SS wishes to maintain control over such new technologies and prevent the advantage from being lost by them being made available for civilian use. When Phil Zimmermann invented PGP, he circumvented the prevailing US SS legislation restricting such a technology by publishing the complete source code of PGP in a hardback book, which was sold worldwide. Books are protected by the First Amendment. Anybody could buy the book, OCR-scan the pages, and they would thus have the full set of source code as text files, from which they could build the application using the GNU Compiler. From 1993, the SS hounded Phil Zimmermann under prevailing statutes (including prohibited export of military technology), with legal investigations/actions for several years. Eventually, the SS seemingly closed the matter without filing any criminal charges against Zimmermann or others associated with PGP's publication.

We have seem from a recent court case in the US that the owner of a laptop with impenetrable encryption (PGP - Symantec version) can be legally forced to divulge their encryption key or face criminal charges. You can probably lay a safe bet that the root problem - impenetrable encryption - is probably quietly being addressed at source between the SS and Symantec, possibly under threat of the "Zimmermann treatment", which is still legal - unlike waterboarding. So that loophole will be closed.
And, if it really is impenetrable, then arguably the same could apply for the Tor technology.

And - for them as needs it - all this probably provides just more fodder for the argument that the First Amendment needs to be scrapped, for the public good, so that the SS can get on with their mandated and difficult job of security/defence. The potential "enemy" for the SS has also necessarily become Joe Public - and vice versa, perversely and by implication. We created this.
« Last Edit: June 13, 2012, 08:53 PM by IainB, Reason: Minor corrections. »

4wd

  • Supporting Member
  • Joined in 2006
  • **
  • Posts: 5,644
    • View Profile
    • Donate to Member
Double bluff - kind of like when they were pursuing Phil Zimmermann and then suddenly....they stopped.

We all knew what that meant  ;)





Disclaimer: Blatant OTT conspiracy theory to fit in with Renegade's mindset.

:)

SeraphimLabs

  • Participant
  • Joined in 2012
  • *
  • Posts: 497
  • Be Ready
    • View Profile
    • SeraphimLabs
    • Donate to Member
I wouldn't trust it.

The way Tor works is that it relies on other clients to provide peer to peer routing.

All it takes is for the world governments to start setting honeypots- modified clients that intercept and document traffic passed through them, which of course would also be rather high performance systems to encourage use of them, and they will rather quickly be able to intercept and tamper with Tor traffic.

Seems to be the weakness of any P2P based system- all it takes is malicious clients serving as supernodes and the entire system is compromised because those malicious clients are then able to intercept traffic in the system as they see fit.


Renegade

  • Charter Member
  • Joined in 2005
  • ***
  • Posts: 13,291
  • Tell me something you don't know...
    • View Profile
    • Renegade Minds
    • Donate to Member
Disclaimer: Blatant OTT conspiracy theory to fit in with Renegade's mindset.

Just because you're paranoid doesn't mean it isn't all true~! :P

I wouldn't trust it.

The way Tor works is that it relies on other clients to provide peer to peer routing.

All it takes is for the world governments to start setting honeypots- modified clients that intercept and document traffic passed through them, which of course would also be rather high performance systems to encourage use of them, and they will rather quickly be able to intercept and tamper with Tor traffic.

Seems to be the weakness of any P2P based system- all it takes is malicious clients serving as supernodes and the entire system is compromised because those malicious clients are then able to intercept traffic in the system as they see fit.
-SeraphimLabs (June 13, 2012, 08:10 PM)

I think you're right there about tampering. TOR isn't encryption. It's anonymization.

But I'm not sure if it's possible to do traffic analysis on TOR traffic to figure out the end points... Anyone know?

But if you add in encryption, then you fundamentally change the game. Well, provided the encryption is strong, etc. etc.
Slow Down Music - Where I commit thought crimes...

Freedom is the right to be wrong, not the right to do wrong. - John Diefenbaker

barney

  • Charter Member
  • Joined in 2006
  • ***
  • Posts: 1,294
    • View Profile
    • Donate to Member
It's all about "Protect & Serve".
Shouldn't that be, "Protect & Service?"  (After all, they do wanna protect what they're screwin' ... so they can do it again  :( >:( :(.)

Stoic Joker

  • Honorary Member
  • Joined in 2008
  • **
  • Posts: 6,649
    • View Profile
    • Donate to Member
But I'm not sure if it's possible to do traffic analysis on TOR traffic to figure out the end points... Anyone know?
Strategically placed "hostile" endpoints with their own back channel would break it rather nicely (for them...). Remember the DNS server stunt... :) ...They were just trying to help out...Sure they were... (Not!)

--------------------

(Forgot to mention) IMO IainB nailed it.

40hz

  • Supporting Member
  • Joined in 2007
  • **
  • Posts: 11,859
    • View Profile
    • Donate to Member

FOIFBI.jpg

Can you spell: Black Flag;D


TaoPhoenix

  • Supporting Member
  • Joined in 2011
  • **
  • Posts: 4,642
    • View Profile
    • Donate to Member
I've seen previous articles about corrupted nodes and so on, so I'm inclined to believe it's not quite as perfect as it sounds, but more of a pain than nothing at all. So knowing our govt, they'll play BOTH sides, simultaneously whining "awww we can't catch the terrorists" but then in fact spying on the few who get through.

IainB

  • Supporting Member
  • Joined in 2008
  • **
  • Posts: 7,544
  • @Slartibartfarst
    • View Profile
    • Read more about this member.
    • Donate to Member
Can you spell: Black Flag;D
That image looks rather sinister. I had not seen that before. What is it intending to say exactly? I am not sure.
Is "Black Flag" the opposite of a white flag? Like the Spartan's defiant molon labe ("not easily taken")? Or a statement of defiant anarchy waved in the face of the State?

Stoic Joker

  • Honorary Member
  • Joined in 2008
  • **
  • Posts: 6,649
    • View Profile
    • Donate to Member
I read it as black/false flag - An intentional misdirect so as to incriminate the other side.

IainB

  • Supporting Member
  • Joined in 2008
  • **
  • Posts: 7,544
  • @Slartibartfarst
    • View Profile
    • Read more about this member.
    • Donate to Member
This is another sobering view from torrentfreak: How Long Before VPNs Become Illegal?
Exactly.

40hz

  • Supporting Member
  • Joined in 2007
  • **
  • Posts: 11,859
    • View Profile
    • Donate to Member
I read it as black/false flag - An intentional misdirect so as to incriminate the other side.

Precisely. You cannot make an anonymous request in the United States for information under FOI laws. You must positively identify yourself or your organization when filing such a request. The justification is that certain information may or may not be exempted from FOI discovery depending upon who is making the request. So in order to comply with the law and FOI administrative rules, the agency being petitioned must know who they may be releasing such information to.

One good way to shop dissidents is to encourage them to attempt to obtain restricted information through "official" channels. Not to sound paranoid, but if it's something cabals within the government are concerned about becoming public knowledge, your show of unusual interest may result in you yourself being deemed "a subject of interest" by the agency in question. Not a good thing to be in most cases.

The other problem is that the FOIA has largely become an easily manipulated sham in recent years. There are enough legal exemptions and special 'security' rules that it is now largely up to the government exactly how much it wants to cooperate with this law. Suffice to say it is only now complied with when it provides some advantage to the government. Or casts government actions in a favorable light. Or secures some power group within the government a political advantage if it doesn't. (One excellent way to deal with political opponents is to make sure all their dirty laundry gets aired in public while yours is kept safely buried "for reasons of national security.")

As computer users and programmers we know: garbage in = garbage out. And information received is only as good as the integrity of the database it comes out of.

Invoke FOIA?
 8)