-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Undercover communication It should be obvious by now, that the only way to communicate stealthily and securely is to avoid raising suspicion to the level at which the authorities might consider it worthwhile to put you under active surveillance (e.g., park a van with TEMPEST equipment by your apartment). It has long been my view that, if the authorities have enough information on you to enable them to park a surveillance van outside your home, then you have failed utterly, and the battle is already lost. Notwithstanding that, I still had to laugh at the story posted in Slashdot the other day about he kid who was being investigated who noticed that, when searching for WiFi connections, one of the SSIDs was "FBI SURVEILLANCE VAN". Moreover, the medium for such a communication must be the Internet, since since it is the only publicly available medium that has seen any serious development of anonymous and/or secure communication. Agreed. Let's go over some specific methods of clandestine information exchange over the net: Encrypted e-mail Although apparently secure, this method puts the communicating parties at great risk of detection. E-mail servers are centralized, and accounts are easily associated with message transmission times and locations. Once a single member of the communication network becomes suspect, the whole network is immediately exposed. This holds for all similar server-dependent protocols. Encrypted email does not prevent traffic analysis; it merely prevents anyone from trivially discovering the message contents. If you can be located, you can be compelled to decrypt your messages, whether through legal threats or the authorities simply beating the passphrase out of you -- so-called "rubberhose cryptography". The only way this can be avoided, is to periodically change one's encryption sub-key. If the old encryption sub-keys are securely destroyed, then the previous message traffic encrypted with those keys is not recoverable. Keys can be changed according to one's level of paranoia -- weekly, bi-monthly, monthly, quarterly, or randomly. E-mail accessed exclusively over onion routing This is a much better approach than just e-mail, but it is still susceptible to traffic analysis, and to control of the communication channel by an external party. Agreed. Usenet posts This is a good approach to clandestine communication. Since Usenet is a distributed system, traffic analysis is non-trivial, and messages can be steganographically hidden inside innocent-looking posts (e.g., SPAM) in some high-traffic unmoderated group. Many users will read the message, oblivious to its true contents -- thus protecting the message recipient from scrutiny. While I agree that the distributed nature of Usenet makes traffic analysis non-trivial, I completely disagree with the use of steganography to protect your traffic. For starters, the authorities are not unaware of the existence of steganography -- as such, it is really suitable only for rendering your message traffic oblivious to the greater public. Also, by disguising it as spam, it may be filtered-out by some news providers. If you're going to secure your messages, then the best way to do so is to use strong encryption. The best way to hide strongly-encrypted messages is to post them to a newsgroup where strongly encrypted messages make-up virtually all of the traffic in the group. If you're looking for such a secure, high-traffic group, you really need look no further than alt.anonymous.messages (a.a.m.) -- it was designed for this very purpose. Furthermore, as I relate in the example case below, any real volume of PGP- encrypted traffic in newsgroups other than alt.anonymous.messages /will/ be noticed. One of the most frequent uses for alt.anonymous.messages is as the target of nymserver reply-blocks. Use of such reply-blocks renders any nymserver email address untraceable, as the encrypted mail can be picked-up from any news- server that carries alt.anonymous.messages. Furthermore, there are utilities (e.g.aamfetch, available from sourceforge) that can be used to fetch all one's messages from alt.anonymous.messages making it impossible to determine precisely what messages are being retrieved. Nymserver accounts are setup/maintained by sending specially-constructed email messages to the nymserver. If these messages are sent via a chain of mixmaster remailers, even the nymserver operator cannot determine who owns a particular nymserver account, even if they were to start keeping logs, perhaps at the insistence of the authorities. If one uses a randomly-chosen chain of mixmaster remailers, then it is not possible to the authorities to compromise the remailers you are using -- in order to trace you, they would have to effectively compromise the entire mixmaster network. Accordingly, the only way a nymserver account holder can then be traced is through their reply-block associated with the account. If the reply block points to alt.anonymous.messages (a.a.m.), then the authorities will reach a dead-end. They will not be able to trace the nym account owner, nor will they be able to read their message traffic. Now, you might ask: "Just how secure is this setup?" You'd be surprised at just how effective it is -- it was enough to thwart a combined investigation by the FBI and the Australian Federal Police (AFP), the Queensland Police Service (QPS), Europol, Interpol, The Department of Internal affairs New Zealand, and the Toronto Police Service. Let me tell you a little story.... In just a few days, it will be exactly 3 1/2 years ago, that the American Federal Bureau of Investigation (FBI), the Australian Federal Police (AFP) and the Australian Queensland Police Service announced the existence of "Operation Achilles" which led to the breakup of what they claimed was one of the largest child pornography rings uncovered up to that time. The individuals comprising this pedophile ring called themselves "the group" and they believed themselves untouchable, beyond the reach of the police. (For many of them, -- one-half to two-thirds, depending on which affidavit you believe -- this did, indeed, turn out to be the case. This includes the ringleader, who is known by the handle Yardbird.) The number of persons reportedly involved varied -- one affidavit stated that there were 61 persons involved, another 45, and yet another 48. All in all, there were 22 persons arrested: 2 in the UK, 4 in Germany, 2 in Australia, and 14 in the U.S. The FBI podcast, "Inside the FBI" states that the number of persons involved was 60, of which 22 were positively identified. You can listen to the podcast and read the transcript at the following URL: https://www.fbi.gov/news/podcasts/inside/operation-achilles.mp3/view Another superb source of information is the so-called "Castleman Affidavit"-- this affidavit was used to justify the arrest of group member Daniel Castleman. The Castleman affidavit explains the group's methodology (or modus operandi) in detail. It can be seen at: http://www.rep-am.com/newsdocuments/affidavit.pdf Another good source of information is: http://www.policyb.org/downloads/Operation_Achilles.pdf Depending on which affidavit you believe, only about 1/3 to 1/2 of the alleged members of this pedophile ring were ever identified and apprehended. As I said earlier, the alleged leader of this ring used the nic "Yardbird". Yardbird made a re-appearance on Usenet in both 2009 and 2010 on the date corresponding to the first and second anniversaries of the busts in 2008. His intent was to show that he was still free, and to answer people's questions. One of the most important things Yardbird stated were that everyone in the group who used Tor and remailers remained free, while those who relied on services such as Privacy.LI were arrested and convicted. Yardbird further commented that several members of the group, including his second-in-command Christopher Stubbings (Helen) and Gary Lakey (Eggplant) were Privacy.LI users -- in fact he stated that they used it for everything. (Helen is currently serving a 25-year sentence in the UK, while Eggplant is serving life in an Arizona prison.) Eggplant literally became notorious because of his constant promotion of Privacy.LI -- he continually boasted that he could not be caught because Privacy.LI did not keep logs, and they were located outside of U.S. jurisdiction. I pointed out to anyone who would listen that services such as Privacy.LI were for /privacy/ -- not for anonymity. In an ideal situation, one needs both to be private as well as anonymous. Essentially, what Privacy.LI supplied was a type of VPN service, providing an encrypted tunnel for data to travel between two endpoints--the customer's computer being one endpoint, while the Privacy.LI servers provided the other. While there was a degree of privacy, there was NO anonymity at all--so it really didn't come as a surprise that Privacy.LI's customers were among those arrested. It is also worthy of note that Privacy.LI earned a 2005 entry in cryptographer Bruce Schneier's "doghouse" as I pointed out more than once. See: http://www.schneier.com/blog/archives/2005/07/the_doghouse_pr.html As I pointed out repeatedly, NO service operator is going to go to prison to protect the identity of his customers -- every last one of them will roll over on you, if given the opportunity. You might ask, "How was the existence of 'the group' discovered?" Simple. Through one of the oldest investigative techniques of all -- the informer. The Australian police arrested a man on totally unrelated child pornography charges -- presumably as part of a plea deal, he revealed the existence of 'the group' and handed over a PGP public/private keypair and password. Now, it is worthy of note that the Department of Internal Affairs of New Zealand had earlier informed the Australian police of the existence of PGP- encrypted traffic in a number of Usenet newsgroups. These messages, from users with handles like "Big Block" and Subject: lines like "New Car Contracts" were rather odd, to say the least. I also noticed some of these--it was quite clear that there were a group of people communicating in private, but obviously there was no way to determine /who/ was communicating, or /what/ they were communicating about. If the Australian police had not had a lucky break, by arresting one of the members of the group on totally unrelated child pornography charges, they would, in all likelihood, /still/ be in the dark about what was going on. Having acquired from the informer the current group PGP public/private keypair, and its passphrase meant that the police could assume this group member's identity, and furthermore, read all the encrypted traffic posted by members of the group. So it was that Constable Brenden Power of the Queensland Police Service used this assumed identity from August 31, 2006 through December 15, 2007. Constable Power spent almost 18 months working out of FBI HQ in Washington, DC while working on this case. In many ways, this case was unprecedented. No similar pedophile ring had ever previously employed the types of security measures that this group did; also unprecedented was the information provided by the informant, who gave the police the tools needed to infiltrate the group--without the informant's help, they could _never_ have succeeded. Once the group was penetrated, the police were able to take advantage of a few factors: 1) They had the informant's computer, with all its email, PGP keys and the like. This provided a history, which made it easier to continue the impersonation. 2) By the time it was penetrated, the group had been operating for about 5 years. By this time, the group had jelled into a community -- people were familiar with each other, they often let their guards down, and would sometimes reveal tidbits of personal information. This is especially the case when they thought their messages were secure, and beyond the ability of the police to intercept--they would say things that they would *never* say in the open. So, as you can see, the group was pretty much an of open book to the police; they were completely and thoroughly penetrated. Despite that, however, the majority of the group were _still_ able to remain at large, and were neither positively identified nor arrested. This is due to the privacy tools (i.e. tor, nymservers, remailers) that were employed. Even with everything else being an open book, those using these tools still managed to elude capture. By now, you're probably thinking, "Why is he going on about pedophiles?" "Pedophiles are disgusting! They should all be shot!" Leaving aside my personal feelings about pedophiles, I brought up this case as an example for several reasons: 1) Child pornography is a serious crime in virtually every jurisdiction. As this example demonstrates, police will work together, even across national boundaries, to investigate these crimes. They are willing to invest considerable time, manpower and money in pursuit of these suspects. The only other crimes which usually merit this type of approach are drug/gun-running or terrorism. The level of effort expended in pursuing this group can be seen in that even FBI executive assistant director J. Stephen Tidwell was involved. Normally one would not expect FBI personnel that highly placed to be involved -- this shows the level of importance placed on this particular investigation. (A year or so after the busts, Yardbird himself expressed astonishment that the FBI would consider his group such a priority.) 2) This case is the only one that I'm aware of, where suspects were using sophisticated tools like PGP, Tor, anonymous remailers and nymservers. 3) This case underscores the effectiveness of these tools even against well-funded, powerful opponents like the FBI, Europol, and Interpol. (N.B.: FWIW, those who were caught used either inappropriate and/or ineffective tools and techniques to protect themselves. 4) I fully understand most people's disgust at the types of crimes/ criminals being discussed here. That said, it is important to remember that one simply cannot design a system that provides protection for one class of people, but denies it for another. You can't, for example, deploy a system that provides privacy/ anonymity for political dissidents, or whistle blowers, and yet denies it to pedophiles -- either *everyone* is safe, or NO ONE is safe. This may not be palatable, but these are the facts. Final Thoughts ============== While this case shows the strengths of the current technologies, it nevertheless underscores that the human element cannot be disregarded. It must continually be borne in mind that the weakest element in /any/ security system is the human element. This has been true since before Sun Tzu wrote his immortal treatise, The Art of War about 2500 years ago. It is, in fact, for this reason that Sun Tzu is still studied in military academies to this very day. It is not for nothing that Sun Tzu devoted an entire chapter in his seminal work to the use of spies. As we have seen, infiltration is still a highly effective tactic. The group was particularly susceptible to this, as the members were unknown to each other, by deliberate design. If someone were to be apprehended, they could be forced to turn over PGP private keys, passphrases, etc. These can then be used by the authorities to PGP-sign messages, which normally would be taken as proof that the messages in question are genuine and untampered-with. This is likely what happened in the case of the group. Traditionally, espionage cells have been made up of only a handful of persons, each known to the other -- the idea behind this was to limit the damage in the case of the cell being either penetrated or exposed. The only types of organizations that cannot be penetrated by the authorities are those close-knit, bound by blood or other kinship ties. The only possible recourse for the authorities in these cases is to try to turn someone on the inside against his fellows. Baal <Baal@nym.mixmin.net> PGP Key: http://wwwkeys.pgp.net:11371/pks/lookup?op=get&search=0x1E92C0E8 PGP Key Fingerprint: 40E4 E9BB D084 22D5 3DE9 66B8 08E3 638C 1E92 C0E8 Retired Lecturer, Encryption and Data Security, Pedo U, Usenet Campus - -- Sed quis custodiet ipsos Custodes?" -- "Who will watch the Watchmen?" -- Juvenal, Satires, VI, 347. circa 128 AD If you accept that freedom of speech is important, then you are going to have to defend the indefensible. -- Neil Gaiman He that would make his own liberty secure must guard even his enemy from oppression. -- Thomas Paine -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJOVwOSAAoJEAjjY4weksDowfgH/0YD0y+/rb8yeDemIgHiVKob Jz8PX9njZKADBxAREMwqGjwZ2tfOr7HDouB/moHE0ZtBvjYmON3LJZFueb661DuA 8AP5tFfJgHx95JKbt/4WWwsKzs534izVnjrL1IW1GdOuVDuooWvBJK50+b9n58p1 o3Pq8N00vGwRAOXwX5ltMJ98zUzDlkVXNMPbs19u8lFdqQNoTVSYYm9rvxcVtqrK MJ/T4oozZz1/RryiOC8wGyEvl5GMAFr0pcFUegIIpjIpMpxXM2d8cqp3yPxXYU6+ ZWmLQbkdgyhkRAOOIMPFWXC0+WKcy6A+xuK0bEyb7ZaJz0ibKAeo0BOgD+IqwlQ= =/sG0 -----END PGP SIGNATURE-----