FacebookTwitterGoogle+RedditEmail

Mass Subversion is a Reality

by

In the wake of a recent article on Tor[1] your author received an e-mail from Shava Nerad, the founding executive director of the Tor Project. Putting aside certain rhetorical devices that have cropped up in this debate, like name-calling or guilt-by-association, let’s examine some of Shava’s points to see if we can take the conversation in a constructive direction.

Choosing Sides

For example Nerad asks me which side I’m on, commenting that my article “seems more aimed to throw fear and darkness” in a manner that discourages activism. Please allow me to clarify that my intent was to caution users against assuming a false sense of security, and from putting “all of their eggs in the Tor basket.”

As things stand now, higher levels of information security require a multi-layered approach and a tool like Tor is but one potential building block. To think otherwise, that you can simply install Tor and be assured of your anonymity, is to fall into a trap. To reinforce this message, consider the recent announcement by Exodus Intelligence that it has discovered zero-day exploits in TAILS OS, a Tor-enabled operating system favored by none other than Ed Snowden. Exodus will disclose the details of the corresponding flaws “in due time.” A reporter from Forbes offers a translation[2]:

“That means customers could use the vulnerability however they see fit, possibly for de-anonymising anyone a government considers a target.”

Soft-Pedaling OPSEC

Nerad posits that only “lazy minded people with bad opsec [operation security]” are at risk when using Tor. And while it’s true
blundenthat OPSEC mistakes led to the downfall of a Tor user known as the “Dread Pirate Roberts,” the guy who ran the Silk Road online black market[3], the FBI employed a more sophisticated approach ─one that utilized software subversion and malware implants─ to identify users of a Tor hidden services site[4].

This is a blind spot that privacy advocates are neglecting. There’s a tendency to present crypto as a turn-key solution without sufficiently qualifying their privacy sales pitch with the myriad of additional operational caveats. This includes obstacles like ubiquitous closed-circuit systems, credit card trails, rogue Tor relays (which is how WikiLeaks got its start[5]), meddlesome eye witnesses, browser fingerprinting[6], social media artifacts, compromised access points, smart phone geo-tracking, Internet cookie staining, and the god awful never-ending stream of zero-day exploits. Covering all of the bases involves training, technical acumen, ingenuity, and discipline. Even professional intelligence officers get it wrong.      

Paranoia

Shava also claims that I’m being “paranoid about Tor” and that the risk of subversion is small. Yet my wariness isn’t necessarily directed at the Tor project per se, but at the tools that intelligence services have at their disposal to subvert Tor. Nor is the risk of subversion trivial. The Deep State is engaged in an effort that spans an entire industry, a veritable parade of corporate collaborators and defense sector monoliths[7].

I repeat, if Snowden’s documents have proven anything it’s that the skeptical posture of cynics like Cryptome’s John Young has been right on the money. In the NSA’s own internal documents, where officials feel relaxed enough to indulge in candid discussions, the spies at the NSA admit that their goal is to undermine security and privacy across the Internet[8]. It isn’t hyperbole. The nature of the risk which NSA efforts represent isn’t a product of threat inflation. We’re not in angels-dancing-on-the-heads-of-a-pin territory. The types of subversion techniques being deployed in the field (CIPAV, QUANTUM, FOX ACID, TURBINE, and so on) are concrete and part of the public record.

As described at length in my previous essay, hard evidence demonstrates that Tor attracts the attention of the NSA. Once more NSA spies have stated that they would actually prefer that people keep using the technology because they’ve developed the means to thwart it. The new head of the NSA, Michael S. Rogers has stated as much. This is the Deep State’s way forward, mass offensive subversion[9]:

“Without referring directly to a secret N.S.A. program to place ‘implants’ on computer networks around the world, so American officials could see attacks in the making, he said in his written answer that the United States could make it clear that it knows where attacks are coming from and is prepared to retaliate.”

The Pentagon plans to triple the number of cyber forces to 6,000 over the next couple of years, spending billions on the development of offensive weaponry[10]. Cyber and drones are both growth areas despite cutbacks in other parts of the Pentagon’s budget.

The Nature of Cyber-Insecurity

The depiction of cryptography as a cure-all obscures a vital message which is being drowned out. While there are technical and economic factors at play, ultimately the problem of cyber insecurity is anchored in political considerations. As Karl Polyanyi observed there is no such thing as a free market. Markets exist as a result of government institutions and the ground rules that they establish. The same dynamic exists with regard to cyber security. Sloppy engineering and mass subversion, both of which enable the Deep State’s global panopticon, transpire as a result of official policy. Top-down security for the 1% undermines society’s collective security on behalf of “total population control. [11]” Changing this will require the body politic to snap its eyes open and confront the crisis of state capture.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

End Notes


[1] Bill Blunden, “The NSA Wants You to Trust Tor, Should You?,” Counterpunch, Weekend Edition July 18-20, 2014, http://www.counterpunch.org/2014/07/18/the-nsa-wants-you-to-trust-tor-should-you/print

[2] Thomas Brewster, “Exploit Dealer: Snowden’s Favourite OS Tails Has Zero-Day Vulnerabilities Lurking Inside,” Forbes, July 21, 2014, http://www.forbes.com/sites/thomasbrewster/2014/07/21/exploit-dealer-snowdens-favourite-os-tails-has-zero-day-vulnerabilities-lurking-inside/

[3] Megan Neal, “Tor Says It’s as Secure as Ever Despite the Silk Road Bust,” Vice, October 3, 2013, http://motherboard.vice.com/blog/tor-says-its-as-secure-as-ever-despite-the-silk-road-bust

[4] Kevin Poulsen, “FBI Admits It Controlled Tor Servers Behind Mass Malware Attack,” Wired, September 13, 2013, http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/

[5] Kim Zetter, “WikiLeaks Was Launched With Documents Intercepted From Tor,” Wired, June 1, 2010, http://www.wired.com/2010/06/wikileaks-documents/

[6] Julia Angwin, “Meet the Online Tracking Device That is Virtually Impossible to Block,” ProPublica, July 21, 2014, http://www.propublica.org/article/meet-the-online-tracking-device-that-is-virtually-impossible-to-block

[7] Michael Riley, “U.S. Agencies Said to Swap Data With Thousands of Firms,” Bloomberg, June 15, 2013, http://www.bloomberg.com/news/print/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

[8] James Ball, Julian Borger, and Glenn Greenwald, “Revealed: how US and UK spy agencies defeat internet privacy and security,” Guardian, September 5, 2013, http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

[9] David E. Sanger, “N.S.A. Nominee Promotes Cyberwar Units,” New York Times, March 11, 2014, http://www.nytimes.com/2014/03/12/world/europe/nsa-nominee-reports-cyberattacks-on-ukraine-government.html

[10] David Sanger, “U.S. Tries Candor to Assure China on Cyberattacks,” New York Times, April 6, 2014, http://www.nytimes.com/2014/04/07/world/us-tries-candor-to-assure-china-on-cyberattacks.html

[11] Anthony Loewenstein, “The ultimate goal of the NSA is total population control,” Guardian, July 10, 2014, http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control

 

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:
May 25, 2016
Eric Draitser
Obama in Hiroshima: A Case Study in Hypocrisy
Ryan Mallett-Outtrim
Does Venezuela’s Crisis Prove Socialism Doesn’t Work?
Dan Arel
The Socialist Revolution Beyond Sanders and the Democratic Party
Marc Estrin
Cocky-Doody Politics and World Affairs
Sam Husseini
Layers of Islamophobia: Do Liberals Care That Hillary Returned “Muslim Money”?
Susan Babbitt
Invisible in Life, Invisible in Death: How Information Becomes Useless
Mel Gurtov
Hillary’s Cowgirl Diplomacy?
Kathy Kelly
Hammering for Peace
Dick Reavis
The Impeachment of Donald Trump
Wahid Azal
Behind the Politics of a Current Brouhaha in Iran: an Ex-President Ayatollah’s Daughter and the Baha’is
Jesse Jackson
Obama Must Recommit to Eliminating Nuclear Arms
Colin Todhunter
From the Green Revolution to GMOs: Living in the Shadow of Global Agribusiness
Binoy Kampmark
Turkey as Terror: the Role of Ankara in the Brexit Referendum
Dave Lindorff
72-Year-Old Fringe Left Candidate Wins Presidency in Austrian Run-Off Election
May 24, 2016
Sharmini Peries - Michael Hudson
The Financial Invasion of Greece
Jonathan Cook
Religious Zealots Ready for Takeover of Israeli Army
Ted Rall
Why I Am #NeverHillary
Mari Jo Buhle – Paul Buhle
Television Meets History
Robert Hunziker
Troika Heat-Seeking Missile Destroys Greece
Judy Gumbo
May Day Road Trip: 1968 – 2016
Colin Todhunter
Cheerleader for US Aggression, Pushing the World to the Nuclear Brink
Jeremy Brecher
This is What Insurgency Looks Like
Jonathan Latham
Unsafe at Any Dose: Chemical Safety Failures from DDT to Glyphosate to BPA
Binoy Kampmark
Suing Russia: Litigating over MH17
Dave Lindorff
Europe, the US and the Politics of Pissing and Being Pissed
Matt Peppe
Cashing In at the Race Track While Facing Charges of “Abusive” Lending Practices
Gilbert Mercier
If Bernie Sanders Is Real, He Will Run as an Independent
Peter Bohmer
A Year Later! The Struggle for Justice Continues!
Dave Welsh
Police Chief Fired in Victory for the Frisco 500
May 23, 2016
Conn Hallinan
European Union: a House Divided
Paul Buhle
Labor’s Sell-Out and the Sanders Campaign
Uri Avnery
Israeli Weimar: It Can Happen Here
John Stauber
Why Bernie was Busted From the Beginning
James Bovard
Obama’s Biggest Corruption Charade
Joseph Mangano – Janette D. Sherman
Indian Point Nuclear Plant: It Doesn’t Take a Meltdown to Harm Local Residents
Desiree Hellegers
“Energy Without Injury”: From Redwood Summer to Break Free via Occupy Wall Street
Lawrence Davidson
The Unraveling of Zionism?
Patrick Cockburn
Why Visa Waivers are Dangerous for Turks
Robert Koehler
Rethinking Criminal Justice
Lawrence Wittner
The Return of Democratic Socialism
Ha-Joon Chang
What Britain Forgot: Making Things Matters
John V. Walsh
Only Donald Trump Raises Five “Fundamental and Urgent” Foreign Policy Questions: Stephen F. Cohen Bemoans MSM’s Dismissal of Trump’s Queries
Andrew Stewart
The Occupation of the American Mind: a Film That Palestinians Deserve
Nyla Ali Khan
The Vulnerable Repositories of Honor in Kashmir
Weekend Edition
May 20, 2016
Friday - Sunday
Rob Urie
Hillary Clinton and Political Violence
FacebookTwitterGoogle+RedditEmail