Silk Road forums
Discussion => Security => Topic started by: ENBOOM on August 23, 2012, 07:47 pm
-
http://www.youtube.com/watch?v=jJDCxzKmROY
Clearnet link
Excellent video for everyone. Please remember all of these things, We all use tor to access this website however, We all need to be aware of the fact of what we do and say outside of the onion network.
Hope this is helpful for some of you guys
ENBOOM
-
started watching, will finish later
very very informative
thanks for the find
-
Good stuff. Thanks guys. :)
-
How frightened should I be? I wonder how many Tor users have the FBI looking into their non-tor activies through their ISP.
-
The feds and ISP's have a very comfy relationship. Especially one large US Crappy cable operator. Feds visiting and monitoring via passive splices and mirrored traffic to fed servers located directly at major intersection points and then fwd onto collection servers (which include raw packet dumps) is more common then you think, and much easier then you think. A lot is done via wink/nod and hey buddy can you help us with this. Being able to isolate your traffic (clearnet/normal) down to your cable modem/house is much more trivial then you think, sadly. Also well known that the feds operate large capacity exit nodes on Tor. The more they operate, and if they operate internal relays (sure they do) the easier it is for them to correlate traffic. Remember, "they" don't have to follow the rules, can be huge bully, and have very large reach.
-
Thank you for this ENBOOM! :)
-
Wow, this video answers a whole set of questions I've had for awhile. Thanks for the upload! Might investigate this speaker some more...
I know a lot of people are busy, will only glance at the comments or watch a few minutes of the vid. Here's the key points I picked out or thought were most important.
But regardless, if you have the time: WATCH THE VIDEO !!
There's a bunch of things I don't have space for right here
><><><><><><><><><><><><
>> CONTENT WIRE-TAPS <<
"Content" taps mean LEO hears your phone calls, reads your text messages, and sees your internet network data. These taps require a "super warrant," which are very difficult to obtain. Police must show probable cause, and prove they have tried other methods of getting the information they're seeking, before they can get this warrant.
The number of these content-based wiretaps grows each year (all forms of wire-taps are). There were just over 500 granted in '87 and 2500 granted in '09. Wiretaps are almost exclusively granted for cases involving drugs (2000 of the 2500 taps from '09 were related to drug investigations). 95% of content-taps are for cell phones, whereas other electronic device taps (such as pagers) are practically zero. Content-taps are apparently most heavily concentrated in NEW YORK and CALIFORNIA
As far as internet-taps go, LEO gets records from ISPs after-the-fact; instead of having a constant feed of your internet information dumping loads of information onto their system, they'll get lists of browser history, search queries, cache data, etc. From what I understand (the speaker was a little vague) getting your internet information still requires the "super warrant."
>> NON-CONTENT WIRE-TAPS <<
Non-content tapping primarily consists of dialed phone numbers. They don't see or hear what was said, but they know that communication was made between two numbers. Non-content taps can also include your location with a special order. These wire-taps are ridiculously easy to get, the criteria simply being "relevance to an ongoing investigation."
LOCATION TAPS are very accurate, using GPS-pings and cell-tower triangulation; LEO will see your location down to a few meters. These taps are described by law-enforcement insiders as "routine." For instance, in murder cases, it's standard procedure to contact cell phone companies to get a list of all persons in the area during the time of death. In any kind of criminal investigation, these taps are regularly used to track the suspects' known list of associates; "It is common in location orders for the government to seek the location of the community of interest- that is, the location of the persons with whom the target communicates." - (Telecom Lawyer Al Gidari, House Judiciary Committee Hearing, May 2010).
The platforms LEO uses with these Location-taps are robust. In some cases, it can take as little as a few hours for tap-requests to be processed by cell phone companies and sent back to the police. Google even created an add-on to Google Earth for a foreign government's law enforcement, where typing in any phone number would bring up that device's pin-pointed location. Whether or not something so blatantly "Big Brother" is currently in use here in America is unknown. Even still, the sheer volume of these location-taps is overwhelming; Sprint alone had over 8 million requests in '11.
Put 2 and 2 together: Remember that 2000 of the 2500 Content-taps in '09 were related to drug investigations.... The speaker didn't mention this, but I think we can safely assume there is a similar disproportion with Location-taps. LEO won't think twice about tracking YOU and ALL YOUR ASSOCIATES if you give them a reason to. Often times a group's movement can be enough to set off red flags with the police, leaving them only a few steps (and wire-taps) away from shutting the whole thing down.
><><><><><><><><><><><><
hope this helps
-
LOCATION TAPS are very accurate, using GPS-pings and cell-tower triangulation; LEO will see your location down to a few meters. These taps are described by law-enforcement insiders as "routine." For instance, in murder cases, it's standard procedure to contact cell phone companies to get a list of all persons in the area during the time of death. In any kind of criminal investigation, these taps are regularly used to track the suspects' known list of associates; "It is common in location orders for the government to seek the location of the community of interest- that is, the location of the persons with whom the target communicates." - (Telecom Lawyer Al Gidari, House Judiciary Committee Hearing, May 2010).
The platforms LEO uses with these Location-taps are robust. In some cases, it can take as little as a few hours for tap-requests to be processed by cell phone companies and sent back to the police. Google even created an add-on to Google Earth for a foreign government's law enforcement, where typing in any phone number would bring up that device's pin-pointed location. Whether or not something so blatantly "Big Brother" is currently in use here in America is unknown. Even still, the sheer volume of these location-taps is overwhelming; Sprint alone had over 8 million requests in '11.
The answer to whether "Big Brother" techniques are used in America is yes, depending on the circumstances. Security information can be confirmed in the most unexpected ways, as this video shows:
Jay Leno on Top Gear
https://www.youtube.com/watch?v=y0XtNGuijqc
The first part of the interview (after reading out the list of cars) reveals some very interesting stuff on what the Secret Service have access to when protecting the President.
The rest of the interview is just entertaining.
-
Thanks for the vid, interesting.
So does anyone know what happens to the things we search on google without tor? Do ISPs and google ever delete your searches after so long or does it stay on their servers forever?
-
Thanks for the vid, interesting.
So does anyone know what happens to the things we search on google without tor? Do ISPs and google ever delete your searches after so long or does it stay on their servers forever?
Unknown. Assume it stays in storage forever.
-
Thanks for the link!! About to start watching this!
-
I wish there was a more updated version of this, I'm sure skype and facebook have probably changed their policies/ started getting more requests in the last two years.
-
http://www.youtube.com/watch?v=jJDCxzKmROY
Clearnet link
Excellent video for everyone. Please remember all of these things, We all use tor to access this website however, We all need to be aware of the fact of what we do and say outside of the onion network.
Hope this is helpful for some of you guys
ENBOOM
thanks so much for posting this video, N-b00m. i watched it in its entirety and found it to be very insightful.
-
It's safe to say ALL social media sites store data and co-operate with Law Enforcement. Hell We all know facebook sells your personal data to corporations for money, I'm sure they'd love to make a pretty penny off good ol' uncle Sam.
-
good thing i use a vpn with my tor.
-
Does just watching this video from my normal browser create risk for me? lol I'm sure I have done dumber security things already but just curious..
-
Does just watching this video from my normal browser create risk for me? lol I'm sure I have done dumber security things already but just curious..
Generally you should never view a video posted via TOR. It could, though various way, be used to track your identity.
That said, in this specific case, this specific video is okay to view on an unsecured connection.
-
Cool thanks!
-
Thanks for the vid, interesting.
So does anyone know what happens to the things we search on google without tor? Do ISPs and google ever delete your searches after so long or does it stay on their servers forever?
I know I'm bumping an old post, but it is a thread linked to from the major introductions to security on the site, so i figured not a big deal.
The answer to your question alpine, is that they retain it forever. So does Amazon.com for any info you put in there, so does Facebook. I recommend checking out some rt.com / Julian Assange interviews on youtube etc (if you're logged into a google account/youtube (same thing) your entire viewing history is also recorded.) There was actually a few articles on RT quite recently discussing these topics so they're pretty fresh in my mind. They pretty much were getting to the concept that since the price of data storage has gone down astronomically, the government bodies (ESPECIALLY the NSA) are finding it to be cheap and worth their time to store everything they can.
Wanna read something real intense? Search for a Wired magazine article about the NSA building a huge facility in Utah (I think Utah, might have been Ohio?) for the sole purpose of downloading litterally all interceptions of electronic communication that goes through the switches/hubs owned by ATT/Verizon et al. They take down this data, encrypted or not, and store it. At the same time, they index it so it can be easily searched for key word patterns etc. At the same time, they're building a computer that will be in the somewhere in the range of the top 10 most powerful computers in the world for the sole purpose of being able to break 256-bit encryption. (then they can go decrpyt all that stored info they have, and know what people did in the past.)
Additionally, Google at least informs the public somewhat of how much information they willingfully surrender to the US and other governments, by occasionally publishing the number of requests they get for personal information disclosure.
Regards.
-Bromine
-
Thanks for the lead, I'll put it allong with my cell tower data
-
not that this is the case in this instance... but i think about this..
Someone comes in here and posts a link.. That link is a clearnet. Then said user can tap that link and see all incoming traffic after they have posted link. NOW the only people that know the link are those people using said tor on said forums. NOT THAT THIS IS THE CASE here. but i do think about that.. How do u know its just not capturing your ip while they are bringing u in with some information u get excited about. who knows. Thanks for the write up anyway. I will check it out on a public wifi.
they keep it forever wouldn't u.....
-
I watched this as part of my research becoming a vendor. Long story short if you don't use end to end encryption your internet connection is loyal to big brother.
They also keep records going back years where you cell phone has been.
-
I follow a very simple rule. Assume that someone is always watching and listening, it has been my best friend!
-
Anyone in Australia want to comment whether they think this is plausible down under? Seeing as though one company (starts with T, ends with A) owns every data carrying piece of cable or wire in this country, I think it's completely possible for local LE to very easily gain access to data.
The NBN that they have recently been raving about is not just for internet traffic either, it can handle millions of CCTV feeds in addition to everything else. I foresee a Big Brother-esque lifestyle coming to Oz. More-so. I recently discovered that in one of the localities I visit, the local council has installed over 300 invisible high definition CCTV cameras with some at head height (nice big high-res images of your face), in nearly every street.