Advertisement
Guest User

Untitled

a guest
Nov 9th, 2014
696
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.74 KB | None | 0 0
  1. Darknet Sweep Casts Doubt on Tor
  2. Tor Will Be Defeated Again, and Again, and Again
  3. By Bill Blunden, November 7, 2014
  4. When news broke of Silk Road 2.0’s seizure by law enforcement a lot of people probably wrote it off as
  5. an isolated incident. Silk Road 2.0 was the successor to the original Silk Road web site and like its
  6. predecessor it was an underground bazaar for narcotics, fueled by more than $8 million in Bitcoin
  7. transactions and operated as a hidden service on the Tor anonymity network.
  8. According to the criminal complaint filed against Blake Benthall, the alleged 26-year-old operator of Silk
  9. Road 2.0, law enforcement officers caught their suspect using old fashioned police work. Specifically
  10. they sent in a mole, or what the text of the complaint refers to as an HSI-UC (a Homeland Security
  11. Investigations agent operating in an Undercover Capacity). Anyway, the undercover spy was wildly
  12. effective, gaining access to the Silk Road 2.0 discussion forum while the scheme was still in its formative
  13. stages and eventually acquiring administrative access to the web site after it launched.
  14. But it turns out that the Silk Road 2.0 takedown was just the appetizer of a much larger main course
  15. called Operation Onymous. Onymous, as in anything but anonymous. Within a matter of hours it was
  16. announced that a joint operation involving dozens of officers from the FBI, the DHS, and Europol had
  17. taken down a grand total of 414 hidden services on the Tor network. This wasn’t just a single bust, no
  18. sir. This was a global dragnet that resulted in the arrest of 17 suspects.
  19. The success of this international operation raises a question: how did they locate the hidden servers and
  20. identify the people who managed them?
  21. In this instance Tor hidden services failed to live up to their namesake. Was the sudden collapse of
  22. several hundred Tor “.onion” domains the result of traditional police tradecraft ─developing informants,
  23. patiently waiting for opportunities, doggedly following leads─ or were security services quietly wielding
  24. advanced technical methods?
  25. All told the cops are pretty tight-lipped. Wired Magazine asked Troels Oerting, head of the European
  26. Cybercrime Center, this very question and he replied:
  27. “This is something we want to keep for ourselves… The way we do this, we can’t share
  28. with the whole world, because we want to do it again and again and again.”
  29. Even with the discretion of insiders like Oerting there have been recent developments that hint at
  30. what’s going on behind closed doors. For instance, the FBI has just proposed that the U.S. Advisory
  31. Committee on Rules and Criminal Procedure alter federal search and seizure rules so that law
  32. enforcement agents can hack into machines that have been “concealed through technological means.”
  33. This is no doubt a thinly veiled reference to Tor. The FBI’s request infers that public gripes against ostensibly strong encryption by officials like FBI
  34. Director James Comey, GCHQ Director Robert Hannigan, and former NSA General Counsel Stewart Baker
  35. are mere theater. The feds already have tools at their disposal to defeat encryption-based tools like Tor.
  36. In fact, an internal NSA documents admits that “[A] critical mass of targets use Tor. Scaring them away
  37. from Tor might be counterproductive.”
  38. Really? I wonder why?
  39. This past summer I questioned the wisdom of netizens putting all their eggs in the Tor basket, as did
  40. other writers like Pando’s Yasha Levine. Granted there were protests voiced by advocates, some of
  41. which I responded to. Still, the public record demonstrates that Tor isn’t a guarantee against the
  42. intrigues a knowledgeable adversary. And now we clearly see the purported security of the Tor
  43. anonymity network unraveled on a grand scale. Not just for one or two illicit websites but hundreds. As
  44. to whether it’s possible for an app to safeguard essential civil liberties… the techno-libertarians of Silicon
  45. Valley can eat crow.
  46. The reality is that the Deep State’s minions aim to eradicate genuine anonymity for everyone but
  47. themselves. The steady erosion of privacy is a part of a long-term campaign to consolidate control as
  48. economic inequality accelerates and perpetual war expands. The looming Malthusian disaster born of
  49. our leaders’ unenlightened self-interest will be a brutal spectacle and the members of the ruling class
  50. want to make sure that they’ll have a good view.
  51. Bill Blunden is an independent investigator whose current areas of inquiry include information security,
  52. anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal
  53. and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead
  54. investigator at Below Gotham Labs.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement