News:

There are two novels that can change a bookish fourteen-year old's life: The Lord of the Rings and Atlas Shrugged. One is a childish fantasy that often engenders a lifelong obsession with its unbelievable heroes, leading to an emotionally stunted, socially crippled adulthood, unable to deal with the real world. The other, of course, involves orcs.

Main Menu

Prism and Verizon surveillance discussion thread

Started by Junkenstein, June 06, 2013, 02:19:29 PM

Previous topic - Next topic

Triple Zero

I still haven't read this whole thread yet, but this XKeyScore leak really kind of hit me like a punch to the gut. Sure this is what we (or I, at least) suspected for a long time (definitely since the news about the Utah Data Centre), but it doesn't quite hit you like that until you see actual proof and the actual computer interfaces and web forms they use to easily query all this data.

I recommend everyone to have a quick browse through the actual leaked slides, instead of just reading the filtered news about it (also US media seems to be very silent or at least short on details when reporting this, so also try the Guardian or something if you want to know more)

the slides:
http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

I'm a bit, eh ... I'm not really sure what to do anymore, I might as well sign up for Facebook again because unless this goes away (which it won't) I can't help but feel we completely lost this war on privacy.
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Doktor Howl

Quote from: Triple Zero on August 05, 2013, 01:09:48 PM
I still haven't read this whole thread yet, but this XKeyScore leak really kind of hit me like a punch to the gut. Sure this is what we (or I, at least) suspected for a long time (definitely since the news about the Utah Data Centre), but it doesn't quite hit you like that until you see actual proof and the actual computer interfaces and web forms they use to easily query all this data.

I recommend everyone to have a quick browse through the actual leaked slides, instead of just reading the filtered news about it (also US media seems to be very silent or at least short on details when reporting this, so also try the Guardian or something if you want to know more)

the slides:
http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

I'm a bit, eh ... I'm not really sure what to do anymore, I might as well sign up for Facebook again because unless this goes away (which it won't) I can't help but feel we completely lost this war on privacy.

Maybe.  Or maybe they just gave us a big "FUCK WITH ME" button. 
Molon Lube

Cain

http://arstechnica.com/tech-policy/2013/08/researchers-say-tor-targeted-malware-phoned-home-to-nsa/

QuoteMalware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).

This revelation comes from analysis done collaboratively by Baneki Privacy Labs, a collective of Internet security researchers, and VPN provider Cryptocloud. When the IP address was uncovered in the JavaScript exploit—which specifically targets Firefox Long-Term Support version 17, the version included in Tor Browser Bundle—a source at Baneki told Ars that he and others reached out to the malware and security community to help identify the source.

Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.

Further analysis using a DNS record tool from Robotex found that the address was actually part of several blocks of IP addresses permanently assigned to the NSA. This immediately spooked the researchers.

Junkenstein

Would seem to tie into a lot of the other existing systems.

QuoteOne poster on Cryptocloud's discussion board wrote, "It's psyops—a fear campaign... They want to scare folks off Tor, scare folks off all privacy services."

Are we still pretending that anything is "secure"?

So when do we find out that the Silk Road is administered via the NSA in some way?

Because it's either that or a major free porn site next. That's my bet anyway.
Nine naked Men just walking down the road will cause a heap of trouble for all concerned.

Doktor Howl

Quote from: Junkenstein on August 05, 2013, 10:54:27 PM
Would seem to tie into a lot of the other existing systems.

QuoteOne poster on Cryptocloud's discussion board wrote, "It's psyops—a fear campaign... They want to scare folks off Tor, scare folks off all privacy services."

Are we still pretending that anything is "secure"?

So when do we find out that the Silk Road is administered via the NSA in some way?

Because it's either that or a major free porn site next. That's my bet anyway.

I wonder how many of the bigboard political forums are run by the government?
Molon Lube

Triple Zero

Quote from: Doktor Howl on August 05, 2013, 03:17:00 PM
Maybe.  Or maybe they just gave us a big "FUCK WITH ME" button.

Yeah. You know how much I care about the digital kind of privacy, it's been something I've been quite passionate about for quite a while, and, well, I only read about the XKeyScore thing yesterday, shit indeed just got real, literally, and I'm gonna need a bit of time to come to terms with the fact that it in fact really is as bad as I've always preached it was. Hopefully that'll just be a few days :) As far as I could tell you've had similar revelations in the past about different topics, no? It's a rollercoaster ride that just goes down, apparently.
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Junkenstein

#306
QuoteI wonder how many of the bigboard political forums are run by the government?

Well that's a bolt of good sense.

Got to be more than a few. These places employ a shitload of people. I can believe there's a division for shit like this. State centrist/government position - Log extreme negative responses.

Rinse and repeat to feed the DATA GOD.

METADATA FOR THE DATA GOD



Trip, the Xkeyscore shit seems pretty bad as does all of this really. I've been hearing this kind of news for a long time now and each time it just seems to escalate. Previously it was only really tech-focused people that cared. Now as the internet becomes part of life it impacts on many more people and the reaction gets louder. I'd suspect that if there was a version of Manning/Snowden 20/15-ish years ago that showed everything to everyone we'd still be pretty much here. Probably further along as the excuse to put in the preventative measures would have been there earlier.

It does just go down, but at least now more of the cart is screaming and understand there is nothing good at the bottom.

ETA - Clarity
Nine naked Men just walking down the road will cause a heap of trouble for all concerned.

Triple Zero

It's just, they really can see every fart I make on the internet, read my emails, everybody's emails, and to top it off those slides show an interface that a 13 year old could use--that last part really drives it home. That they could technically see everything, I knew for a long time, it's practically built into the Internet, but, damn, the technology! That's some serious hardcore pieces of software, I guess you need to be a tech-head to just see the magnitude of (software) engineering involved in even making this system possible. Of course that's stupid, because Google has been using this very same technology to handle their Big Data--well not exactly the same, they rolled their own, and last I heard the frameworks the NSA uses were made by the Apache Foundation (yeah that part is open source! of course you won't have the machinery to put it to this kind of use, but still).
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Doktor Howl

Quote from: Triple Zero on August 05, 2013, 11:06:49 PM
Quote from: Doktor Howl on August 05, 2013, 03:17:00 PM
Maybe.  Or maybe they just gave us a big "FUCK WITH ME" button.

Yeah. You know how much I care about the digital kind of privacy, it's been something I've been quite passionate about for quite a while, and, well, I only read about the XKeyScore thing yesterday, shit indeed just got real, literally, and I'm gonna need a bit of time to come to terms with the fact that it in fact really is as bad as I've always preached it was. Hopefully that'll just be a few days :) As far as I could tell you've had similar revelations in the past about different topics, no? It's a rollercoaster ride that just goes down, apparently.

There's an obvious solution, but I'm not sure how you'd put it into practice.  It's as old as Winston Churchhill.

Flood 'em.  Drown them in information, most of which is plausible garbage.
Molon Lube

Junkenstein

Yep, that's a solution.

Nice summary of the current security situation:http://frontrowcrew.com/geeknights/20130701/the-levels-of-protecting-your-privacy/
Level 1

Local encryption
SSL enabled and correct
Level 2
VPN (e.g. ipredator)
Level 3
Deniable Encryption
Full Disk Encryption
Level 4
GPG Communication
Level 5
GPG Voip
Level 6
Deniable Communication
One Time Pads
Dead Drops
Forethought
Level 7
Burner Laptops
Ridiculous Spy Bullshit
Preternatural Forethought

Seems fairly correct. I doubt many get to level 2. I suspect many would not even be at 1.

The lower levels all tend to incorporate establishing IRL security links and levels of planning that you're probably just not capable of without it being, well, your job.

As I understand it right now, the concept of "privacy" on the net is pretty much void unless you are some kind of spy.

Even then, it's iffy.
Nine naked Men just walking down the road will cause a heap of trouble for all concerned.

Cain

Worth mentioning this, from all the way back in 2007

http://www.cryptogon.com/?p=624

Quoteneed to get this off my chest, once and for all, because people, who don't know much about computers, are being bombarded with nonsense, and they're bombarding me with nonsense as a result. I want a single post that goes all the way, and this is it.

"Have you heard about Tor?" I am routinely asked via clear text email.

Yes, I know about Tor, but we need to take a much closer look at what remaining anonymous online really requires.

QuoteA lot of times, ignorant people refer to things they don't understand as "tinfoil." (The gatekeeper Left loves this term.) What follows, however, is so far out that it seems like tinfoil even to me. But then again, I haven't been targeted by a death squad for my activities online, like some people are in many countries around the world. So, is it tinfoil? For you, maybe. For people struggling against repressive regimes, maybe not.

When I use the term "tinfoil" below, I'm not making fun of you, I'm making fun of myself, and the roles I've had to play in corporate IT departments. You don't know tinfoil unless you've worked in a corporate IT department. Corporate IT is a technocratic pyramid built on paranoia, surveillance and fiefdoms of specialized knowledge and privileges (rights and permissions). Since all modern fascist organizations are essentially the same, I hope that my grim experiences within these organizations will help you understand more about the nature of the dire situation that we're all facing.

If you think that you're thinking outside of the box, my main purpose in writing this is to inform you that there are actually boxes within boxes, and that if you plan on engaging an opponent as powerful as the American Corporate State (or any other maniac fascist regime), it's not going to be easy. I don't know how many boxes within boxes there are. What I do know is that the U.S. Department of Defense built the underlying technologies that make the Internet possible. They built "this" world.

So, you want to be anonymous in a world that was thought up by the U.S. Department of Defense?

QuoteAs you might already know, I studied information warfare in college and I did several years of time in corporate IT environments. I knew about the types of surveillance and control that are possible at the client, server and network levels.

I looked at the challenge as all IT people look at all IT related challenges: Assume the absolute worst.

I went even further with this. I made irrationally negative assumptions.

I assumed that everything I did online was compromised. I assumed the worst tinfoil nightmares about commercial operating systems. I assumed that my ISP was a subsidiary of the NSA, etc.

Got the idea?

Let's look at each level in a bit more detail (in no particular order):

Servers: Potential Honeypots

Many technologies that amateur anonymity fetishists are attracted to are actually designed to harvest information. Put yourself in the shoes of the NSA. If you wanted a concentrated haul of the most interesting information what would you do?

You would establish a honeypot: a service (free or paid) that purported to provide an anonymous web browsing/email capability. Who knows what people might get up to if they thought nobody was looking? That, of course, is the idea with honeypots.

If you're relying on a proxy server, how will you know that it's not simply recording your entire session for examination by acreages of the Homeland's supercomputers that are running advanced statistical Magic 8 Ball algorithms? Because the company or individual providing your proxy service says that they don't keep logs? HA

Am I saying that all proxies are run by the NSA. No. Am I saying that some number of them are. I'd bet my life on it. How many of them are run by governments? I don't know. Unless you know which governments are running which proxies, you must assume that all of them are compromised.

In reality, the NSA would probably be the least of your worries when using a proxy server or open base station.

Nerds with too much time on their hands get up to all kinds nonsense. Do they set up anonymous proxy servers and open base stations just to see what people do with them? Yes. Do criminals do it to find out personal information about you? Yes.

So even if the proxy or base station you're on isn't run by the NSA, who is running it? And why?

Maybe you're eLitE and use several proxies. You can probably assume that the proxies aren't colluding directly, but what about the networks? Which leads us to the next level...

Networks: If You Feel Like You're Being Watched, It's Because You Are

The network providers are keeping end to end records of every session. The question is: Are the network providers colluding with the U.S. Government? Since you can't assume that they're not, you must assume that they are. I would assume that the U.S. Government has end to end coverage of every IP session that starts and ends on U.S. networks. With corporate collusion and off the shelf hardware and software, this isn't a stretch at all. For non U.S. networks, the NSA gets in with multi billion dollar tools like the U.S.S. Jimmy Carter, and who knows what else...

There are dozens of off the shelf products that you would swear were designed for use by intelligence agencies, but they're routinely peddled to—and used by—corporations. If corporations have and use these surveillance capabilities, what are the intelligence agencies running on the service providers' networks? I'll be buggered if I know, but I know it's not good. That recent ATT/NSA thing is just a tiny/trivial tip of the iceberg.

Clients: NSA Side Projects?

Microsoft and Apple sought assistance from the U.S. National Security Agency.

Evil Corporations Working with the NSA + Closed Source Binaries = Not Good.

What is that thing actually doing? I don't know. Thank you. That's all I need to know.

Countermeasures

Access the Internet Using an Open Wireless Network, Preferably from Great Distance

In terms of a threat assessment, for our purposes, I see the networks as posing the biggest problem.

People write to me all the time raving about the dreaded Google cookie. HA. "We must use scroogle!" for freedom and safety, etc.

When I mention that their ISP is, most likely, keeping every URL that they visit in a database, at a minimum, and that NSA boxes are probably analyzing every FORM tagged submission, well, that's a hard lesson for people. Go ahead, use scroogle. Maybe the people running it aren't evil. So what. Scroogle might make you feel good, but it has nothing to do with security or anonymity, not when you consider the capabilities of the enemy on the network.

Give any 14 year old hacker access to the right network switch and, unless you know what you're doing, he or she will use a packet sniffer to find out what you had for breakfast. Now, the difference between most 14 year old hackers and the NSA is that the pimply faced kids don't have physical access to the network that would allow them to conduct man in the middle surveillance on you. The NSA does. Again, that NSA/ATT thing is fly fart level. That's nothing. That's just the piece of the program that got outed.

You need a false flag connection to the Internet. In other words, access the Internet via someone else's open wireless router, preferably from great distance. Lots of organizations, businesses and individuals provide free, wireless Internet access; on purpose, believe it or not. Ideally, you would use a cantenna or a high performance parabolic antenna to authoritatively distance yourself from any surveillance cameras that are likely saturating your local coffee shop or other business that provides free Internet access. Hitting the base station from hundreds of meters away would be nice.

If you were to carry the paranoia to an extreme level, you would assume that They would show up at your access point and use direction finding equipment to spot your physical location. "Tinfoil!" you say? Keychain WiFi access point finders have had crude DF capabilities for years. Then you have civilian grade WiFi network engineering stuff like the Yellow Jacket. Direction finding is as old as the hills and trivial to do. If you do happen to attract the wrong kind of attention on an anonymous base station, pinpointing your location would be a simple matter.

Solution? If you are playing this game as if your life is on the line, don't use the same open base station twice. Hey, this post is going out to those of you who send me the paranoid emails. You wanted to know, I'm telling you! I mean, it would suck to look toward your friendly anonymous WiFi provider with a pair of binoculars and see a guy in a suit looking back at you. Hint: if you see a van with several antennas arranged in some geometric pattern on the roof, that would not be a positive development. But that was 1980s era technology, the last time I dabbled with DF gear with a buddy of mine. Here's a nice little integrated soup to nuts solution that is probably more like what They would be using.

Surf Away: Just Don't Do Anything That You Normally Do Online

All of the stuff that you do with your "normal" online persona, you know, online banking, checking email, discussion groups, etc: You can't do any of that. The second you associate a user profile on a server with your behavior, you're back to square one. The Matrix has you. You would have to create what the intelligence business calls a "legend" for your new anonymous online life. You may only access this persona using these extreme communications security protocols. Obviously, you can't create an agent X persona via your anonymous connection and then log into some site using that profile on your home cable modem connection. To borrow another bit of jargon from the people who do this for real, full time, you must practice "compartmentalization."

If you actually attract the wrong kind of attention on a server, OR a network, with your agent X persona, if you haven't f@#$%& up in some way, all roads will lead back to the open base station.

"After connecting through the open WiFi network, should I also use an anonymous proxy?"

I would assume that even if the proxy is clean, and there is no way to know that it is, They will have that thing covered on the network, end to end. Physical disassociation from the access point is the best proxy.

Client Side

Never write anything to disk. Oh, you weren't planning on using your Windows or MacOS laptop with all of those closed source binaries whirring away, were you? Man, I don't know where you got your tinfoil hat, but that thing is obviously defective.

You will have to learn about Live CD distributions of Linux.

You boot that thing. Do your business. Turn off the computer. Nothing is written to the hard disk.

"But I need to save my work?"

If you want to save your work, the easiest way of routinely handling encrypted workflow is to use an encrypted volume and a tool that only decrypts your data on the fly, in RAM. The best tool I know of for handling encrypted volumes is TrueCrypt. Hint: Use cascading encryption algorithms. [UPDATE: Is TrueCrypt a Honeypot?] Do They have some technology, in an underground hanger at Area 51, that's capable of breaking one of those cascading crypto schemes? I don't know. I doubt it, but anything is possible when infinite budgets are involved.

Hey, man, you wanted to save your work, right? That's the score when you've got half a role of Reynolds Wrap® Aluminum Foil around your head.

"But I need to send email."

For our purposes here, I wouldn't. Email is locked down and heavily surveilled, partially because of the plague of spam, but read on...

I don't believe in web based email solutions that purport to provide strong encryption and/or anonymity. Who knows what their applets and servers are doing? Not me. And if they rely on SSL, well, that's ok for buying a book online, but no tinfoiler in his right mind would bet his life on SSL. The Thunderbird/Enigmail/GPG solution is the best way to send and receive VERY secure email that I know of. But will your agent x persona be able to deliver email via SMTP? I wouldn't count on it. And from which domain? Unless you are very naughty, you shouldn't be allowed anonymous access to a SMPT server anyway.

You might have to go with a throw-away web based email account and then cut and paste your encrypted messages into that. As a rule, however, never compose a message that you plan on encrypting in a web based form. Some of them use technologies that transmit what you're typing over the web AS YOU TYPE. This is so you don't lose what you typed if the session cuts out, but guess what? That's right, you just blew it.

Use open source tools that are running locally on your system to encrypt and decrypt messages.

An effective way of communicating with someone, outside of email, would be via newsgroup or bulletin board that allows anonymous posting. (Note: If you try it here, I'll just delete it.) You are, in effect, using the board as a numbers station. You're not trying to hide the signal. You assume that it will be intercepted. You encrypt your message to the recipient, using his/her public key, and post the ciphertext to the board. The recipient goes on there, copies the message and decrypts it. I first encountered this in the mid 1990s on usenet. Of course, the person on the other end needs to have the same level of discipline and paranoia as you for this to work properly.

Last but not least: Make sure that you spoof your MAC address EVERY time you go online. Funny story: I worked at a place that was locked down to the point that every MAC address was screened at the network level. Say, for example, that someone brought in a personal laptop from home, even though there was no chance of being able to use the network for much (domain sign on was required) the switch would alert a sys admin indicating that an alien device was plugged into the network, along with the jack/cube/desk number.

MAC addresses are unique, and perfect for surveillance purposes. Always spoof your MAC address when you're running in agent x mode.

Well, that's pretty much it. (Actually, I'm tired of typing.) I didn't say it was going to be easy, and you should watch out for people and products that make those claims.

tyrannosaurus vex

This is why I distrust so much of the modern Internet. "Personal Computing" is well on its way now to being entirely "cloud-based." That is to say, your Internet persona is a collection of interests, statements, browsing patterns, communications, purchases, searches, and documents that exist wholly or in copy form on someone else's actual physical hardware. Your documents and search history live on a Google server, your email lives on an Apple or Microsoft server, your politics and social circles exist on Facebook. The idea is to get as much of your data as far away from you physically as possible -- yes, for marketable reasons like convenience and ease of access, but also for other reasons like "legally this server belongs to me, you put your data here, therefore your data belongs to me," and "I don't have to ask YOU to give up data you already gave up to Facebook."

I also work in corporate IT, and I can say that there are automated systems that do a number of potentially scary things with metadata. And of course the corporate justification doesn't have to pretend it's for the user's "own good." It's fairly straightforward. We own the equipment, and we own your time while you are using that equipment; therefore we own everything you create, we see everything you type, and we know everything you look at. Everything you do is subject to immediate search, and every action that looks unrelated to work is grounds for immediate corrective action.

If only I was "domain admin" for this NSA shit, I could set all our histories to "Do not retain."
Evil and Unfeeling Arse-Flenser From The City of the Damned.

Doktor Howl

HOLY FUCK.  Cain, that's absolutely DIABOLICAL.
Molon Lube

Cain

When you need a professional paranoid, Kevin Flaherty of Cryptogon is your man.

Pæs

Quote from: Doktor Howl on August 05, 2013, 11:33:20 PM
Quote from: Triple Zero on August 05, 2013, 11:06:49 PM
Quote from: Doktor Howl on August 05, 2013, 03:17:00 PM
Maybe.  Or maybe they just gave us a big "FUCK WITH ME" button.

Yeah. You know how much I care about the digital kind of privacy, it's been something I've been quite passionate about for quite a while, and, well, I only read about the XKeyScore thing yesterday, shit indeed just got real, literally, and I'm gonna need a bit of time to come to terms with the fact that it in fact really is as bad as I've always preached it was. Hopefully that'll just be a few days :) As far as I could tell you've had similar revelations in the past about different topics, no? It's a rollercoaster ride that just goes down, apparently.

There's an obvious solution, but I'm not sure how you'd put it into practice.  It's as old as Winston Churchhill.

Flood 'em.  Drown them in information, most of which is plausible garbage.

Can it be flooded? How many people would have to type how many convincing lies over how long to upset this number crunching beast? How many websites would it take to slow down Google?