User4/draft/TOR, the NSA, and CL security: Difference between revisions

From BoyWiki
No edit summary
No edit summary
Line 92: Line 92:




[PAGE_16]
What is Tor and wh}
should I care?
Tor is a software proxy that helps
to protect the anonymity of its users
while browsing the web. As opposed
to most internet surfing, where your
computer sends data (or packets)
directly from your computer to a
server that contains a website, Tor
sends your network packets through
a number of other Tor-enabled
machines before that data reaches the
user's desired web page. Due to this,
it is much harder to tell which
computers are passing other peoples'
packets along apart from a computer
which a request originated from.
Additionally, Tor gives its users the
ability to use websites not normally
accessible without it. Tor hid-
den services are websites which
can only be accessed by using a
Tor-enabled browser. Much like
ing Tor for surfing the web, Tor
den services, or onion sites, are
sites which send data destined to
reach site visitors through mul-
tiple systems before reaching their
users' computers. It is then rather
hard to find where a server hosting
onion sites may be physically
Why Girl Lovers should be
worried about the NSA:
Although the first impression of
Girl Lovers is that, because they love
children, would never harm them,
and hate all kinds of images
depicting abuse, that the NSA and
GCHQ targeting of child porn on
Tor shouldn't cause their concern,
this assumption is a foolish mistake.
Tor is an essential tool for Girl
Lovers to protect their privacy.
Using the tool allows them to
express an opinion without worrying
about having a brick thrown through
their window or having obscene
graffiti scrawled on their door by one
of the many people who disagree
with the views of Girl Lovers.
United Kingdom's legal definition of
child abuse includes downloading
What can Girl Lovers do to
stop these agencies from
tracking therr^ftSo^
It is imperative that you take this
privacy threat seriously. The NSA
and GCHQ have the expertise and
funds to target you, regardless of
whether you are or are not involved
in any kind of illegal activity.
You will not be the first innocent
person to fall into the huge NSA
images of fictitious cartoons that
look underage. If a Girl Lover clicks
on a mislabeled link that takes him to
a site depicting cartoon children
in sexual situations, he is, according
to law, inadvertently abusing kids
while looking at those fictional
characters. If the unlucky Girl
Lover were to be visited by the
police, the cops would find their
story of accidentally accessing
child pornography absurd. At best,
the person would have his opinions
and attractions exposed to everyone
he knows, but worse yet, he could
gamer both exposure of his thoughts
and be arrested for viewing child porn.
Miscarriages of justice are known to
have happened in the past. You
don't want to be falsely accused
of having abused a kid through
cartoons. The consequences would
be prison and having to register
on the sex offender registry each
year for many years.
dragnet.
When the British Prime Minister says
that they will target Tor, it is because
he actually will follow through
on that effort. If, after the Prime
Minister's public announcement to
the press, GCHQ accomplishes no
results in 2014, many cloak and
dagger staff could get fired from their
jobs. They may be willing to set
up Girl Lovers to take the fall, so
that there are results to show the
Prime Minister and they will remain
part of the intelligence community.
Besides, arresting a small number
of Girl Lovers in tandem with the
child porn arrests will not exactly
cause riots.
With the NSA and GCHQ targeting
Tor, those downloading anything
from Tor are probably more at risk
than those doing so from Usenet.
The NSA, and we know this for
sure thanks to Snowden's leaked
documents, has a list of undiscovered
zero day software vulnerabilities
that can be only burned for the most
important targets.
Since child pornography has now
become the primary focus for the
NSA and GCHQ, the spy agencies
[PAGE_17]
will be using resources previously
reserved to catch terrorists for hunting
down child pornographers, as well as
anybody standing up for pedophiles'
Freedom Host was taken over in
2013 by the FBI, claiming it hosted
child porn before shutting down
the site, incidentally also hosting
Tormail. Now in the hands of the
FBI too is a new JavaScript exploit
in the Firefox browser, used
by the Tor browser bundle to reveal
visitors' real computer IP addresses.
People with the Firefox Noscript
plug-in (https://addons.mozilla.
org/en-US/firefox/addon/noscript/)
enabled in the Tor browser bundle
were protected from the exploit, but
others were not.
The Tor network is resilient, and it
does not track you through the nodes.
Spy agencies are not interested in
tracking all of Tor's nodes either. If
the NSA and GCHQ did this, no
one would want to use the software
anymore. The NSA does not want
for this to happen because they run
their own nodes to gather intelligence
from the network. Additionally, it
is the US government who partly
funds Tor development.
Spy agencies will make it look as
if only those visiting child porn
pages or forums in Tor are being
targeted, with the other users being
safe. And the way they will do this
is by exploiting software bugs and
not the network, which would be
challenging to do.
It is impossible to guarantee 100% protection against zero day vulnerabilities that nobody knows about, but you can minimize the risk of accidentally getting caught in this future law enforcement sting operation by making sure that you always run the latest updated version of Tails live CD (httpsz//tails.boum.org).
It would make sense for the NSA to
target the Tor browser bundle default
configuration for the simple reason
that is what most people are using.
Running Tor in Linux using the
non-persistent storage of a live CD
like Tails, specially configured to
avoid leaks, greatly reduces the
possibilities of getting your
computer infected by NSA malware.
Add to that using common sense,
and not going to pages that you suspect
to contain child porn, even if
access to it is provided indirectly.
Finally, those who do not accept all
files and are weary of ignoring
browser warnings without reading
and understanding them will be
safer on the Tor network.
I am not suggesting Tails will make
its users invincible, because the
NSA could find an exploit for them
too. I am saying that, if you use Tor,
Tails is the safest way to do this
right now.
There is no magic wand for
unbreakable security and there will
never be one. There are limited
resources by the part of the NSA,
and they will have to prioritize
who they will go after. If you make
yourself awfully expensive and
time consuming to get, the NSA is
likely to leave you alone and move
onto a child pornographer with
lower security standards instead
of a Girl Lover political dissident.
If you express dissent and lack
protection, these agencies will be
after you online. To catch those
against the status quo, they will
gladly ignore children and those
putting minors in danger.
:--------------
Alicelovers Magazine-Issue-3, Feb. 2015, p.15
Alicelovers Magazine-Issue-3, Feb. 2015, p.15




https://archive.org/download/Alicelovers-Magazine-Issue3-Feb-2015
https://archive.org/download/Alicelovers-Magazine-Issue3-Feb-2015

Revision as of 19:32, 30 March 2016

TOR, the NSA, and CL security

Towards the end of 2013, British Prime Minister David Cameron explained during a BBC interview that he had ordered the UK Government Communications Headquarters (GCHQ), a British outlet analogous to the American CIA, to work with the National Security Agency of America in a joint operation to find a way to arrest those accessing child pornography in the "Darknet".

His actual words were, "There's been a lot in the news recently about the techniques, ability and brilliance of the people involved in the intelligence community, in GCHQ and the NSA in America. That expertise is going to be brought to bear to go after these revolting people sharing these images [of child abuse] on the dark net, and making them available more widely"


By Darknet, one should know that he is talking about the anonymous Tor network (https://www.torproject. org). It is helping political dissidents worldwide evade ISP censorship and communicate anonymously to debate about human rights. However, David Cameron is right that there is also crime going on within the Tor network. This brings up an essential question:

why are those creating child pornography and/or distributing it on Tor the number one target for law enforcement instead of those killing youths by selling them drugs?


The answer is that, by targeting child porn in Tor, it is easy to convince the population that any measure they take curtailing liberties is for the greater good. Even if all they accomplish is to shatter confidence in the Tor network and harm human rights activists' only means of secure communications to protect themselves from repressive governments, it would still be heralded as a worthwhile effort.

Targeting child porn is also a way for the big spy agencies to justify the illegal wiretapping of the whole world and get people to accept that reading their emails, listening in to their phone calls, and tracking their every move is for the just cause of stopping child porn. Even better, by defining cartoons and photos of kids in the bath as "child abuse images", they make it sound dramatic enough that nobody will be able to say anything against it without looking abominable.


This is not the first time that GCHQ, originally created to protect UK national security from foreign governments and terrorists, is given the task to act against child porn. Just last year during a UK Parliament public hearing, the director of the UK's eavesdropping nerve center revealed to Parliament's Intelligence and Security Committee that they work with the Child Exploitation Online Protection Agency, stating that "in terms of working with them to uncover the identities and track down some of those who are involved in online sexual exploitation of children within the UK, including from overseas."

It was also GCHQ who assisted British police with cracking the password of the notorious UK child abuser Ian Watkins, who, if the press is to be believed, was storing child porn online with the notvery-clever password "ifuckkids".


[PAGE_16]

What is Tor and wh} should I care?


Tor is a software proxy that helps to protect the anonymity of its users while browsing the web. As opposed to most internet surfing, where your computer sends data (or packets) directly from your computer to a server that contains a website, Tor sends your network packets through a number of other Tor-enabled machines before that data reaches the user's desired web page. Due to this, it is much harder to tell which computers are passing other peoples' packets along apart from a computer which a request originated from.


Additionally, Tor gives its users the ability to use websites not normally accessible without it. Tor hid- den services are websites which can only be accessed by using a Tor-enabled browser. Much like ing Tor for surfing the web, Tor den services, or onion sites, are sites which send data destined to reach site visitors through mul- tiple systems before reaching their users' computers. It is then rather hard to find where a server hosting onion sites may be physically


Why Girl Lovers should be worried about the NSA:

Although the first impression of Girl Lovers is that, because they love children, would never harm them,


and hate all kinds of images depicting abuse, that the NSA and GCHQ targeting of child porn on Tor shouldn't cause their concern, this assumption is a foolish mistake.


Tor is an essential tool for Girl Lovers to protect their privacy. Using the tool allows them to express an opinion without worrying about having a brick thrown through their window or having obscene graffiti scrawled on their door by one of the many people who disagree with the views of Girl Lovers.

United Kingdom's legal definition of child abuse includes downloading


What can Girl Lovers do to stop these agencies from tracking therr^ftSo^

It is imperative that you take this privacy threat seriously. The NSA and GCHQ have the expertise and funds to target you, regardless of whether you are or are not involved in any kind of illegal activity. You will not be the first innocent person to fall into the huge NSA


images of fictitious cartoons that look underage. If a Girl Lover clicks on a mislabeled link that takes him to a site depicting cartoon children in sexual situations, he is, according to law, inadvertently abusing kids while looking at those fictional characters. If the unlucky Girl Lover were to be visited by the police, the cops would find their story of accidentally accessing child pornography absurd. At best, the person would have his opinions and attractions exposed to everyone he knows, but worse yet, he could gamer both exposure of his thoughts and be arrested for viewing child porn.

Miscarriages of justice are known to have happened in the past. You don't want to be falsely accused of having abused a kid through cartoons. The consequences would be prison and having to register on the sex offender registry each year for many years.


dragnet.

When the British Prime Minister says that they will target Tor, it is because he actually will follow through on that effort. If, after the Prime Minister's public announcement to the press, GCHQ accomplishes no results in 2014, many cloak and dagger staff could get fired from their jobs. They may be willing to set up Girl Lovers to take the fall, so that there are results to show the Prime Minister and they will remain part of the intelligence community. Besides, arresting a small number of Girl Lovers in tandem with the child porn arrests will not exactly cause riots.

With the NSA and GCHQ targeting Tor, those downloading anything from Tor are probably more at risk than those doing so from Usenet.

The NSA, and we know this for sure thanks to Snowden's leaked documents, has a list of undiscovered zero day software vulnerabilities that can be only burned for the most important targets.



Since child pornography has now become the primary focus for the NSA and GCHQ, the spy agencies


[PAGE_17]

will be using resources previously reserved to catch terrorists for hunting down child pornographers, as well as anybody standing up for pedophiles'

Freedom Host was taken over in 2013 by the FBI, claiming it hosted child porn before shutting down the site, incidentally also hosting Tormail. Now in the hands of the FBI too is a new JavaScript exploit in the Firefox browser, used by the Tor browser bundle to reveal visitors' real computer IP addresses.

People with the Firefox Noscript plug-in (https://addons.mozilla. org/en-US/firefox/addon/noscript/) enabled in the Tor browser bundle were protected from the exploit, but others were not.

The Tor network is resilient, and it does not track you through the nodes. Spy agencies are not interested in tracking all of Tor's nodes either. If the NSA and GCHQ did this, no one would want to use the software anymore. The NSA does not want for this to happen because they run

their own nodes to gather intelligence from the network. Additionally, it is the US government who partly funds Tor development.

Spy agencies will make it look as if only those visiting child porn pages or forums in Tor are being targeted, with the other users being safe. And the way they will do this is by exploiting software bugs and not the network, which would be challenging to do.

It is impossible to guarantee 100% protection against zero day vulnerabilities that nobody knows about, but you can minimize the risk of accidentally getting caught in this future law enforcement sting operation by making sure that you always run the latest updated version of Tails live CD (httpsz//tails.boum.org).

It would make sense for the NSA to target the Tor browser bundle default configuration for the simple reason that is what most people are using. Running Tor in Linux using the non-persistent storage of a live CD like Tails, specially configured to avoid leaks, greatly reduces the possibilities of getting your computer infected by NSA malware. Add to that using common sense, and not going to pages that you suspect to contain child porn, even if access to it is provided indirectly. Finally, those who do not accept all files and are weary of ignoring browser warnings without reading and understanding them will be safer on the Tor network.

I am not suggesting Tails will make its users invincible, because the NSA could find an exploit for them too. I am saying that, if you use Tor, Tails is the safest way to do this right now.

There is no magic wand for unbreakable security and there will never be one. There are limited resources by the part of the NSA, and they will have to prioritize who they will go after. If you make yourself awfully expensive and time consuming to get, the NSA is likely to leave you alone and move onto a child pornographer with lower security standards instead of a Girl Lover political dissident. If you express dissent and lack protection, these agencies will be after you online. To catch those against the status quo, they will gladly ignore children and those putting minors in danger.


--------------

Alicelovers Magazine-Issue-3, Feb. 2015, p.15


https://archive.org/download/Alicelovers-Magazine-Issue3-Feb-2015