CIA Researching Automated IRC Spying 413
Iphtashu Fitz writes "CNet News is reporting that the CIA has been quietly investing in research programs to automatically monitor Internet chat rooms. In a two year agreement with the National Science Foundation, CIA officials were involved with the selection of recipients for research grants to develop automated chat room monitors. Researchers at Rensselaer Polytechnic Institute received $157,673 from the CIA and NSF for their proposal of 'a system to be deployed in the background of any chat room as a silent listener for eavesdropping ... The proposed system could aid the intelligence community to discover hidden communities and communication patterns in chat rooms without human intervention.' How soon until all IM conversations are monitored by Big Brother? The abstract of the proposal is available on the NFS website."
It wont really be any good... (Score:5, Insightful)
Re:It wont really be any good... (Score:3, Insightful)
I'd think anyone planning crimes on IRC would be a complete moron, but then, many criminals tend to be complete morons.
Re:It wont really be any good... (Score:3, Interesting)
Re:It wont really be any good... (Score:3, Funny)
And on the back of that sign it said (scribbled out): "Weed, $40 for an ayth"
Re:It wont really be any good... (Score:3, Informative)
Re:It wont really be any good... (Score:2)
Re:It wont really be any good... (Score:3, Insightful)
A common misconception, considering we only know about the criminals that have been caught. Of the intelligent ones we can only speculate...
Re:It wont really be any good... (Score:3, Interesting)
Re:It wont really be any good... (Score:4, Informative)
Re:It wont really be any good... (Score:3, Informative)
Well, it's not that way in the major networks (Efnet, Undernet, IRCnet, Dalnet at least.) Sure, you could set up DCC to use SSL or some other form of encryption to talk to your friends, but unless you go out of your way to use encryption, nothing is encrypted.
It's cute that the CIA is just looking into this now. I think it was 1990 or so that Avalon (?) was caught logging PRIVMSG traffic on a server
You don't control the trunks (Score:3, Interesting)
This would be some sort of program that can sit on an ISP's trunks, and grab all traffic that looked like IRC traffic and dump it in a log. Since it is the CIA, (And they are in theory, the Intelligence 'Offense') it might be a small embedded hardware solution that has
Re:You don't control the trunks (Score:5, Informative)
Yeah, but you don't have physical control over the pipes between yor server and all your clients. How do you think your bits get sent back and forth? I just have to put an intercept between you and your clients to grab all the data I want.
OpenSSL [openssl.org]. Many IRCds and clients these days support encryption.
This would be some sort of program that can sit on an ISP's trunks, and grab all traffic that looked like IRC traffic and dump it in a log. Since it is the CIA, (And they are in theory, the Intelligence 'Offense') it might be a small embedded hardware solution that has a built in microdrive. It would be very handy to have a CIA controled operative slip in to a NOC in a hostile country, snap it onto a trunk in an unobtrusice location and pick it up a month later.
They already have this, it's called Carnivore. It's not a secret from the ISPs, either, they know it's there. But they are prohibited by law from telling the public whether or not a Carnivore box is monitoring their traffic. Additionally, Carnivore is not only for email these days.
Ahh.. the FBI (Score:3, Funny)
Re:It wont really be any good... (Score:4, Insightful)
Open source IRC daemon running on open source OS.
An invite only channel, with key, now where does CIA plan to step in?
And it's obvious no valuable information will be exchanged via popular IMs. I once though it would, as there is so much traffic, that no one is able to comprehend it, bu as soon as I wanted to relay sth valuable, let's say a password or whatever, delicious cookie recipe, I used secure channels.
Now why would they want to spy on 14 year olds, I don't know.
How can they differntate what's real, I remeber that somwhere out there there is this Echelon system working, recording all my phone call and checking for 'special' words. I try to use 'nuke', 'osama', 'chemical weapons' in few languages, but the black suits still refuse to come.
In general I'm not so paranoid, I don't think that we're facing Orwellian times. The main reason for that, there are not enough human resources to have it working. Let's say we wanted every person in the world to be spied on by another person, the way it is done now, is in shifts, at least two people involved, usually much more. Now technology helps with this problem, let's say we can record every minute of a man's life, there still has to be someone to watch all that footage, if we go on, we could probably end up with only half of the population in the BigBrother business, I think with current economy it is not possible.
I could elaborate on this subject a bit more, but I hope you get my point.
Re:It wont really be any good... (Score:2)
At some router.
To be snarky: the IRC protocol travels over these things called "wires," which can be tapped. If you don't think that Some Agency is monitoring TCP packets on the network, well, I think you're naive.
Now, you can certainly encrypt your traffic and make it harder for them. I have no idea what capabilities they have for decryption. It's possible that they've backdoored popular algorythms -- the math on some of these thing
Re:It wont really be any good... (Score:2)
Re:It wont really be any good... (Score:3, Funny)
Re:It wont really be any good... (Score:2)
You can set channel keys to encrypt the channel or per user query key to encrypt private communications.
Looks very promising but not may people are using it yet.
Let them monitor.... (Score:2, Insightful)
Sample (Score:5, Funny)
<l33th4x0r> and i h4ck3d into the NSA and compiled gentoo on it
<l33th4x0r> it was awesome
<l33th4x0r> like a beowulf cluster of beowulf clusters
<myPPburns> how long did that take?
<l33th4x0r> like 2 days
<myPPburns> no, I mean compiling Gentoo
<l33th4x0r> yah, like 2 days
<myPPburns> who is that new guy? NotWthCIA?
<l33th4x0r> dunno, never seen him before
<myPPburns> cool nick tho
<myPPburns> I'm gonna go hack WoW l8r. make myself king orc!!!
<l33th4x0r> yah, im gonna go post a letter from osama on drudge
<l33th4x0r> watch the media fr33k out
> Quit: NotWthCIA (OSAMA DETECTED! ALERT! ALERT!)
That's easy to beat... (Score:5, Funny)
Re:That's easy to beat... (Score:3, Insightful)
Re:That's easy to beat... (Score:2)
That said, given that the Internet is truly global (and plans to expand beyond global), in defense of this work (not that I support it) nobody can effectively monit
Re:That's easy to beat... (Score:3, Interesting)
Solution (Score:5, Funny)
Re:Solution (Score:2)
Re:Solution (Score:2)
Isn't IM monitored already (Score:2, Informative)
Re:Isn't IM monitored already (Score:2)
I am one step ahead (Score:3, Funny)
I'm one step ahead of you! (Score:2, Funny)
Isn't that what Echelon does? (Score:2)
Isn't that what Echelon does already?
I mean, filter certain keywords, and associations from ALL communications (IRC included?)
Bing!Bing!Bing! (Score:3, Informative)
Also, technically, the FBI are just federal cops, as opposed to state cops or local cops. The CIA is an intelligence agency (spies), and so they might not want the exact same sort of application. You can't simply get a court order to slap Carnivore on an ISP's lines when the ISP in question i
Of course, but... (Score:2, Insightful)
They'll probably announce in a couple of months that IRC monitoring was not feasible due to the super-complicated technical problems inherent in logging plain text.
Available on the NFS website (Score:3, Funny)
Now's a good time... for SSL (Score:3, Insightful)
Ahhh, IRC (Score:5, Funny)
Women are men,
13 year old girls are FBI agents,
and that guy who never says anything is a CIA bot.
Re:Ahhh, IRC (Score:2, Insightful)
Re:Ahhh, IRC (Score:3, Funny)
Crap, me and too many others must be CIA bots.
I mean, really, what else is IRC for if not idling?
Re:Ahhh, IRC (Score:3, Funny)
and that guy who never says anything is a CIA bot.
Hmm.. I should stop idling in so many channels. Maybe if I put some sort of message on a timer that does "/me is not a CIA bot". Yeah.. I think that'll do just fine.
Now, to analyse those logs effectively... (Score:2)
Seriously, how can one possibly do anything with all that data that comes in...
Re:Now, to analyse those logs effectively... (Score:3, Funny)
I know I know!!! Google Desktop Search!!!
IRC vs IM (Score:2)
IRC tends to be much bigger. There are channels and private messages. Plus the big thing about IRC, are the channel modes +i and +s. So if they're talking bots to monitor all channels, yeah right, they're not going to hit the right ones.
Crypt-IRC (Score:2)
Of course, nobody who has anything to hide knows anything about botnets.
Re:Crypt-IRC (Score:2)
Can it get any more cryptic than LOL,l8r,ROTFLMAO, np ,kewl and everything spelt with an 3 instead of an E?
Re:Crypt-IRC (Score:2)
Re:Crypt-IRC (Score:5, Interesting)
So like channel #random19a9x on server 1 would get a message from you:
L'mtt w dh
and channel #random19a9x on server 2 would get:
ese BLAH BLAH etc
rinse and repeat for as many channels as you like. of course, while all this is happening, you could be continually logging off and on, changing nicks or channels or sending to other servers in a predefined fashion. Perhaps the control connection could be over a DCC connection while the actual secure messages travel thru the IRC never to be found again. (Outband signaling).
You could also combine this with email, SMS, web pages, etc to split the message up into as many channels and media as possible. And of course, you have to make the software client script driven so new scripts can be easily generated to stay ahead of any technology Big Brother could use to monitor it.
Possible problems are pretty obvious: everything originally comes from your IP so anything between you and the network can be compromised. It's really pretty safe to assume that the core routers are compromised as well. Well, this is not the case. The order could be randomized and the complexity of putting it back together grows in proportion with the number of channels.
The idea is to make it as much like chat as possible but not have any full packets of clear or encrypted text go out at once, preventing any easy way to view it. And the ability to change the patterns and behavior of the connecting and reconnecting would thwart anyone learning the way it works.
Juristiction? (Score:3, Insightful)
Re:Juristiction? (Score:2)
Re:Juristiction? (Score:2, Informative)
Re:Juristiction? (Score:2)
I was under the impression that the CIA were *only* allowed to spy on foreigners and that the FBI had jurisdiction over the US. Nevertheless, I have absolutely no doubt whatsover that the CIA couldn't give a damn about the rights of foreigners. The US administration is only concerned with protecting US interests. The CIA take th
Re:Juristiction? (Score:5, Funny)
Re:Juristiction? (Score:5, Insightful)
This means that there is no law stopping the US government from spying on Europeans, or for that matter European governments from spying on people in the US. A government can even use this to bypass its own privacy regulations by having a friendly government spy on its citizens and getting that information.
If you want to stop wiretapping, use encryption. Do not assume that a legal barrier is going to stop a secretive organization with little oversight into its activities.
Re:Juristiction? (Score:3, Interesting)
Re:Juristiction? (Score:2)
If you want to be free from this stuff, look at IIP or ssl(or similar) encryption, private networks and authentication.
Re:Juristiction? (Score:2)
What do you think the real job of the CIA is???
Spying on foreign citizens and countries!
In theory (yea right!) the CIA cannot spy within the US.
In theory.......
Re:Juristiction? (Score:2)
"Less legal?" Isn't that like "a little pregnant?"
Heh (Score:5, Informative)
Re:Heh (Score:2)
Re:Heh (Score:2)
I'm guessing all the extra money is for technology to parse the chat logs and extract useful information. I mean, IRC has even more abbreviations and l337-speak than email or IM, so wouldn't it be harder to parse?
That's a good point -- this isn't actually all that invasive. I'm a privacy nut (gonna join
Re:Heh (Score:2)
I don't and I've got lots of better thing to do with $150,000.
Not the government's fault (Score:5, Insightful)
Re:Not the government's fault (Score:2, Funny)
So many things wrong with this post! (Score:3, Insightful)
It *IS* the government's fault (Score:3, Insightful)
No, the only reason they get technology like this is because we allow them to ask for it. You think that if they offered enough money (say $157,673) that some company wouldn't jump to make this same product for them? Should we boycott IBM because they sell computers to the government which they then use to crack codes or monitor the Internet (Carnivore, etc)? Shou
don't worry (Score:5, Funny)
Re:don't worry (Score:2)
Umm... (Score:3, Interesting)
The last time I checked, federal law said you needed a warrant to do that.
Re:Umm... (Score:2)
No, you are mistaken, this could be used to catch 'terrorists' and is thus above both the law and common sense (and judicial oversight).
Good try though, better luck next time.
Re:Umm... (Score:3, Funny)
the last tine I checked, the patriot act made warrants easier to get than cooties on a playground. I think they come out of judges whenever they sneeze.
Re:Umm... (Score:2, Funny)
Its time... (Score:2)
http://silcnet.org/ [silcnet.org]
How Soon... (Score:5, Funny)
> How soon until all IM conversations are monitored by Big Brother?
<musicfan> Hey, anyone got The Smiths - How Soon Is Now.mp *THUMPTHUMPTHUMP* "FEDERAL COPYRIGHT CZAR SQUAD! PUT DOWN THE HEADPHONES AND STEP AWAY FROM THE IPOD!"
*** Disconnected
No expectation of privacy (Score:5, Informative)
IM conversations are a different matter, though. There, the network is private, run by a company, and the expectation is that the conversations are private as well. It might very well be illegal for AOL (and other IM networks) to be monitoring individual IM sessions.
Re:No expectation of privacy (Score:4, Insightful)
Re:No expectation of privacy (Score:2)
give me your money, slave. (Score:5, Insightful)
It's easy to understand why I'm upset. You might understand the next time you pay your taxes. Remember that a fraction of your hard work is going to pay for your government to listen in on your conversations. Many people are making a living at it. I think they and my government have better uses for my money. I did not ask for it, I don't like it and I don't want to pay for it. it's also well-known that your IP address is exposed to all those on the server.
If you don't mind that kind of thing, perhaps I can interest you in a few personal services. For the low price of $50/hr, I'll log all of the communications from your "exposed" IP address, cull what I want, damage your reputation by questioning your peers if I note anything suspicious and even charge you with crimes if you happen to say the wrong thing. Most of the work will be automated but I take no responsibility for the information being stolen by insurance companies, employers and other organizations that have a direct impact on your quality of life. By freedom of information, I'll be sure to let people know that I'm investigating you but I'll tell them that I'm an official government agency, so they won't question my motives and will instead turn their suspicions onto you. Sound like a good deal?
Pay up!
Re:No expectation of privacy (Score:3, Insightful)
IRC is more like a bar. You're talking to a bunch of people, and people come and go freely. Of course people can record what you're saying in a bar, just as they can record a log of what's said in an IRC channel, but would you go to a bar with the expectation of your every word being recorded?
And, if you were in a bar and there was a high probability that your every word was being monitored, wouldn't you cho
Re:No expectation of privacy (Score:2)
I doubt it. Telcos (including wireless) are allowed to monitor any activity (incl. voice traffic) on their network, all in the name of network security and maintenance. Targetting specific person or persons and following their calls through a network (aka wireless) would probably be crossing
Security reasons HA! (Score:5, Funny)
Re:Security reasons HA! (Score:5, Funny)
Eliza anyone? (Score:2)
Has anyone ever tried this?
Re:Eliza anyone? (Score:2, Informative)
Here's [jibble.org] the first google hit for "irc bot ai", there are plenty more.
I don't think they're useful, but they can be entertaining when some leghumping 15 year old kid gets into a fight with, or hits on one.
obligatory 1337-ification (Score:2)
Thats not much money. (Score:2)
Seems to me this is more a shot in the dark.
Echelon - already done (Score:5, Insightful)
The NSF might lack the tools, but I sincerely doubt that the CIA are developing these sorts of very basic tools. More likely, the NSF aren't given access or information on the extent of CIA information gathering.
Also, I imagine such a news article makes the public likely to believe that the technology isn't already in active use.
threat models (Score:4, Insightful)
This surpasses basic monitoring of clear text protocols like irc but it still doesn't have the ability to monitor where you must actually be a part of a community. If you use irc over SSL, you're in the clear from passive and undetectable monitoring. This obviously gets around that but it means that they will have some interesting people poking around with people who normally do the poking on networks.
The rand corp goes one step further and seeks to hire people to become members of groups by being an outright spy. Pretty interesting stuff. It was on cypherpunks a while back.
It should be assumed that if you don't use encryption, it can be monitored. If you use encryption (irc over ssl, silc, etc) in a broadcast medium (for an entire room), you should assume it's monitored also. It would just have to be monitored by an agent of some sort.
It's all about the threat model you're up against.
Tinfoil hat time (Score:2)
I had a nightmare the other night (Score:2, Interesting)
What, you mean they aren't? (Score:5, Interesting)
All you really need is the servers at a few of the nodes to be running logging software, and it wouldn't even need to be running in the context of the IRC server - it'd just need to be tracking the inbound and outbound traffic. It wouldn't catch everything, but you'd get a fair amount of it and probably get enough to tell you what areas needed more examination.
Similarly, I assume that just about everything on Usenet is monitored and saved by at least a few agencies domestic and foreign, if not more. How much would Giganews charge for a full feed? That's not going to be a lot of use against one-way traffic, but discussions would almost certainly be trackable.
As with many things the information stream itself is relatively easy and inexpensive to get access to, but extracting good information out of it is likely to be harder. I wouldn't be surprised if a big chunk of the money they're giving out is related more to the analysis of that sort of information stream (and existing store) than to the simple acquisition of data.
public vs private in cyberspace (Score:5, Insightful)
Of course, cynics (like me
Vulnerability in usage, not in spec (Score:2)
Welcome CIA Overlords (Score:3, Funny)
This is the CIA? (Score:2, Insightful)
Untrust worthy (Score:2)
GG CIA, you lose.
Our tax dollars at work... (Score:2)
"They hate us for our freedom!" (Score:3, Insightful)
Until we can control our govts, something like this is just a bad thing.
It's not too hard to do this (Score:2)
Basic scanning, and parsing is very easy to do, and then you just need some "ai" in the background to scan the data and report/perform an action when patterns are matched.
I'm sure the feds are looking at a much more serious creation than I was, but I'm sure the concept's similar. The scary thing, to me at least, is that they're probably going at it from a server level, so they coul
Good luck (Score:3, Insightful)
Or good luck to listening to my Skype conversations. Although, knowing that Skype is closed source and proprietary, I have absolutely no guarantee, that their claim of AES encryption gives me any protection/privacy. Just recently there was thread on
Or couple of years ago, I've had to convince my boss that "security" of MDaemon on Windows does not exist. I sat to its password files, noticed something peculiar about them and broke the "secret algorithm" in about 4hrs. Passwords were not even xored, they were summed[1] with "secret" and encoded with base64. The secret was "The setup process could not create the necessary system accout MDaemon".
Robert
[1] you know: (passwd[n] + secret[n]) & 0xff
Similar proposal met with opposition by IRCops (Score:3, Interesting)