FacebookTwitterRedditEmail

Darknet Sweep Casts Doubt on Tor

When news broke of Silk Road 2.0’s seizure by law enforcement a lot of people probably wrote it off as an isolated incident. Silk Road 2.0 was the successor to the original Silk Road web site and like its predecessor it was an underground bazaar for narcotics, fueled by more than $8 million in Bitcoin transactions and operated as a hidden service on the Tor anonymity network.

According to the criminal complaint filed against Blake Benthall, the alleged 26-year-old operator of Silk Road 2.0, law enforcement officers caught their suspect using old fashioned police work. Specifically they sent in a mole, or what the text of the complaint refers to as an HSI-UC (a Homeland Security Investigations agent operating in an Undercover Capacity). Anyway, the undercover spy was wildly effective, gaining access to the Silk Road 2.0 discussion forum while the scheme was still in its formative stages and eventually acquiring administrative access to the web site after it launched.

But it turns out that the Silk Road 2.0 takedown was just the appetizer of a much larger main course called Operation Onymous. Onymous, as in anything but anonymous. Within a matter of hours it was announced that a joint operation involving dozens of officers from the FBI, the DHS, and Europol had taken down a grand total of 414 hidden services on the Tor network. This wasn’t just a single bust, no sir. This was a global dragnet that resulted in the arrest of 17 suspects.

The success of this international operation raises a question: how did they locate the hidden servers and identify the people who managed them?

In this instance Tor hidden services failed to live up to their namesake. Was the sudden collapse of several hundred Tor “.onion” domains the result of traditional police tradecraft ─developing informants, patiently waiting for opportunities, doggedly following leads─ or were security services quietly wielding advanced technical methods?

All told the cops are pretty tight-lipped. Wired Magazine asked Troels Oerting, head of the European Cybercrime Center, this very question and he replied:

“This is something we want to keep for ourselves… The way we do this, we can’t share with the whole world, because we want to do it again and again and again.”

Even with the discretion of insiders like Oerting there have been recent developments that hint at what’s going on behind closed doors. For instance, the FBI has just proposed that the U.S. Advisory Committee on Rules and Criminal Procedure alter federal search and seizure rules so that law enforcement agents can hack into machines that have been “concealed through technological means.” This is no doubt a thinly veiled reference to Tor.

The FBI’s request infers that public gripes against ostensibly strong encryption by officials like FBI Director James Comey, GCHQ Director Robert Hannigan, and former NSA General Counsel Stewart Baker are mere theater. The feds already have tools at their disposal to defeat encryption-based tools like Tor. In fact, an internal NSA document admits that “[A] critical mass of targets use Tor. Scaring them away from Tor might be counterproductive.”

Really? I wonder why?

This past summer I questioned the wisdom of netizens putting all their eggs in the Tor basket, as did other writers like Pando’s Yasha Levine. Granted there were protests voiced by advocates, some of which I responded to. Still, the public record demonstrates that Tor isn’t a guarantee against the intrigues a knowledgeable adversary. And now we clearly see the purported security of the Tor anonymity network unraveled on a grand scale. Not just for one or two illicit websites but hundreds. As to whether it’s possible for an app to safeguard essential civil liberties… the techno-libertarians of Silicon Valley can eat crow.

The reality is that the Deep State’s minions aim to eradicate genuine anonymity for everyone but themselves. The steady erosion of privacy is a part of a long-term campaign to consolidate control as economic inequality accelerates and perpetual war expands. The looming Malthusian disaster born of our leaders’ unenlightened self-interest will be a brutal spectacle and the members of the ruling class want to make sure that they’ll have a good view.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

 

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

bernie-the-sandernistas-cover-344x550
Weekend Edition
February 28, 2020
Friday - Sunday
Rob Urie
Bernie Sanders and the Socialism Question
Vijay Prashad
Witnessing the Hell a Migrant Can Face
Jeffrey St. Clair
Roaming Charges: Knives Out
Andrew Levine
Bloomberg: What Is He Good For?
T.J. Coles
The Space Force Becomes a Weapons System, Arms Companies Profit
Paul Street
The So-Called Party of the People: From Nevada to South Carolina
Matthew Stevenson
Carolina and Super Tuesday on My Mind
Robert Hunziker
Forever-Chemicals Tap Water
Pete Dolack
No Thinking Please, We’re Red-Baiting
Nick Pemberton
If Bernie Sanders Is Unelectable, Then What The Hell Are The Rest Of You?
Jacob Hornberger
Immunity for Killings by Immigration Police
John Curiel – Jack R. Williams
Analysis of the 2019 Bolivia Election: No Evidence of Irregular Trends or Fraud
Ramzy Baroud
Israel at the Cusp of a Bleak Era
Ron Jacobs
Bloomberg’s Billionaire BS
Farzana Versey
Who Will Douse Delhi’s Flames?
Joseph Natoli
Dispelling the Darkness
Marshall Auerback
Boris Johnson, Not Donald Trump, is the Real Blue-Collar Conservative
Steve Early
VoteVets for Buttigieg:  Who’s Really Keeping Us in the Dark About Campaign Funding?
Thomas Knapp
Election 2020: Those Meddling Kids …
Arshad Khan
Trump Visits Modi and Delhi Erupts in Anti-Muslim Riots
Karen J. Greenberg
How Democracy Ends
Ron Jacobs
Bloomberg Bucks
Tom Clifford
Corona and Flu in Beijing: a Report From the Chinese Capital
Scott Tucker
Pete Buttigieg: The Energizer Bunny of Hegemony
Victor Grossman
Breakthroughs Against the Rightwing Menace in Germany
William Hartung
It’s Time to Debate Pentagon Spending
Seth Sandronsky
Struggling for Shelter: Resistance to California’s Housing Crisis Grows 
Daniel Warner
The UN, Homeostasis and China
Eve Ottenberg
Police Torture in Chicago
Kenn Orphan
The Ruling Class Will Stop at Nothing
Sean Reynolds
A Difficult Peace
W. T. Whitney
For the Climate: Protecting the Commons and Fixing Democracy
stclair
Julian Assange, Political Offences and Legal Restraints
Dedrick Asante-Muhammad – Jamie Buell
Does This Economy Work for Black Americans?
Tracey L. Rogers
Reflections on “Black Excellence”
Jill Richardson
Stop Calling Harmful Bigotry “Religious Freedom”
Barbara G. Ellis
Don’t Depend on FEMA to Save Us From Global-Warming’s Armageddon
Mike Garrity
Why We Sued Trump’s BLM Over Its Sagebrush-Juniper Burning Project in Montana
Christopher Brauchli
The Modi/Trump Anti-Muslim Alliance
John Peeler
Why It’s So Hard for White People to Talk About Racism
Nicky Reid
Socialism Without Anti-Imperialism: A Different Flavor of Tyranny
Louis Proyect
Spies, Lies and Videotapes
David Yearsley
The Beef with Kobe
Andrew Stewart
How Netflix And “Manning Marable” Killed Malcolm X (The Third Time)
February 27, 2020
Jim Kavanagh
Bloomberg’s Game
FacebookTwitterRedditEmail