FBI and Next-Gen P2P Monitoring 122
AHuxley writes "Can the FBI get funding to create a next-generation network monitoring and database system for P2P networks, web sites, and chat rooms?
Could the FBI's Regional Information Sharing Systems (RISS) network be opened to more law enforcement agents across the USA?
Will the tracking of p2p users via 'unique serial numbers' generated from a person's computer be expanded from its first use in late 2005?
Is your p2p application or plug-in sending back your MAC address, firmware revision, manufacture date, GUID or other details?" Could this story submitter pose any more questions in his submission? Won't someone please think of the ... oh, never mind.
They're not slow... (Score:5, Funny)
Re: (Score:1, Funny)
Re: (Score:1)
Dupe? (Score:5, Informative)
Seriously though, how difficult is it to use the slashdot search engine with the capitalized words in the title? third hit... [slashdot.org]
And whoever is doing the monitoring (Score:3, Funny)
Re: (Score:2, Interesting)
Funny that Biden is involved (Score:2)
Who cares? (Score:4, Informative)
sudo macchanger -r
I'm no computer scientist but isn't it fairly trivial for them to get your mac (or at least that of your router) from your network traffic anyway?
Re: (Score:3, Informative)
Re: (Score:3, Informative)
I'm no computer scientist but isn't it fairly trivial for them to get your mac (or at least that of your router) from your network traffic anyway?
If I'm not mistaken, MAC never leaves the immediate network, ie your router gets your mac, the next hop that of the router, and so on, but the final destination only gets the mac of the last router in between
You would be correct. A MAC (Media Access Control) address is a local identifier only. In fact it only really applies to switching, not routing. Unless a piece of software on your computer is sending it "home" then it would be rather difficult to obtain your MAC address. Also, it is by no means a unique identifier. It's a well known fact that manufacturers of network devices regularly cycle MAC addresses. It's uncommon, but not unheard of to end up with two devices on a network with the same MAC.
Re: (Score:2)
Manufactured Evidence (Score:3, Insightful)
Re: (Score:2)
Your personal stock portfolio is simply extremely deficient in companies that profit from the slave labor of the 'prison industrial complex'. More schemes l
All Fear, No Facts (Score:4, Informative)
Re: (Score:3, Informative)
All the encryption really does is keep ISP's from throttling you unless they throttle all encrypted traffic (which some do).
Re: (Score:1)
http://phoenixlabs.org/pg2/ [phoenixlabs.org]
Re: (Score:2)
Hence MagikFS (Score:2)
Re: (Score:3, Insightful)
All it takes is indirection to make it so that it does, though. Make the P2P client randomly choose whether to look locally or ask its neighbors. Make it lie randomly and say "I don't have it" at all times to mask the ability to use probability to determine whether you are serving locally-stored data or just passing on the request even with knowledge of how many peers your node has and generating hundreds of requests using a modified client. If nobody is doing that already, color me surprised....
Re: (Score:3, Informative)
Paint yourself half-unsurprised then. MUTE [sourceforge.net] filesharing does something similar. A client communicates directly with a small number of peers and nobody can tell whether a request (or response) comes directly from their neighbor or is merely relayed, so you get plausible deniability. Uh, and it uses an interesting algorithm for routing, similar to one used by ants in real life.
Re: (Score:2)
i also set my number of conected peers fairly low (~30), i do it prevent my isp picking me up when i start up my torrent program (to get linux distros and OO.org OFC), but it has the advantage of leaving me much less exposed to peers, at the cost of much slower d/l rates!
Re:All Fear, No Facts (Score:5, Insightful)
Re: (Score:2)
I thought the Democrats were all out producing the child porn and the GOP trying to stop it. Or prevent a child from being irreversibly harmed by seeing Janet Jackson's tit.
The Democrats want to track your financial transactions. Whatever the current administration puts in place now will be directed next year against that extra lunch you put on your expense account.
Re: (Score:2)
'Kiddie porn' is usually defined as images of a possible sexual nature of any person below the age of 18. So, hold off on
Comment removed (Score:4, Interesting)
Re: (Score:1)
Like who in their right mind would have thought they would charge a 15 year old and 16 year old for taking pics of THEIR OWN BODIES and sending it to each other? That is truly f*cking insane.
Yes, it is criminally insane. I'm not familiar with the case, but I assume these teens are labelled as sex offenders now? This needs to go to the supreme court, srsly. It is the people who arrested/harassed these teens that need to be punished.
Brought to you by Windows Vista,now with SP1 -We're sorry.But hey,Win 7 will rock! We promise!Please don't buy an Apple!
Why would Microsoft care if you bought an Apple? More than likely you would still purchase MS Office and even Windows XP/Vista to run in bootcamp. It'd even benefit them since you would pay retail instead of OEM prebuilt-system price.
Re: (Score:1, Troll)
Re: (Score:1)
There is cross
Protect yourself (Score:2)
This just means you and your smart friends will have to develop legal technologies to protect yourself from entrapment.
I think entrapment is the whole point of this. Not only can you be entrapped by a cop into being a pedophile, but you can also be sent an illegal file by a cop and then arrested for accepting it.
So figure out a way to make it more difficult for yourself to be entrapped, or just expect to be entrapped.
Not quite (Score:2)
Strictly speaking no facts were presented. The questions do not state that anything is happening or true now, nor do they imply that if the suggested precursors and conditions are met that the event will happen. "Could" is a marvellous question if you plan on FUD, because almost anything COULD happen and cause-and-effect is left for the reader to infer. If I eat a cheezeburger, a meteorite COULD land on top of me, but unless McDonalds have gravitic weaponry installed, ther
Re: (Score:1)
You better use hardware encryption (Score:2)
If you use a software random number generator, it's not really random.
Encryption would be a start, but you need hardware encryption.
What about Steganography? (Score:2)
There is a steganographic file system in development for linux called magikfs. If you value your privacy, you'll want to check it out.
MagikFS [sourceforge.net]
Re: (Score:3, Insightful)
Re: (Score:1)
That is the point, it is too easy to point malware in Free Software, it is not worth to try.
Free Software is teh Al Qaeda!!! (Score:2)
Hear that clapping sound in Congress? That clapping sound is the sound of freedom dying... with thunderous applause?
I beg your pardon... (Score:4, Funny)
Re:I beg your pardon... (Score:5, Funny)
Re: (Score:2, Funny)
I beg your pardon, but chat rooms? People still use those? I thought those phased out about 10 years ago....
At this point I bet it's nothing but feds posing as kids trying to catch other feds posing as peds. Not a single person in the room isn't drawing a federal paycheck.
In the interest of accuracy I submit that there are also bots pitching webcam sex shows.So: Feds posing as kids, Feds posing as peds and Bots posing as hotties pitching sex shows. Sound about right?
Re: (Score:1)
Re: (Score:2)
Where men are men, so are the women, and every 'horny 14 yr old virgin' is a Fed. Yup, sounds about right.
Re: (Score:2)
At this point I bet it's nothing but feds posing as kids trying to catch other feds posing as peds. Not a single person in the room isn't drawing a federal paycheck.
Chat rooms are from what I've understood fairly active. When I grew up (god, I sound like an old fart already) the chatrooms were full of us nerdy boys. These days pretty much everyone is on some IM, though I gather it's mostly by contact lists I'm sure the chat rooms are doing fine. In fact, due to the change in demographics I'd guess the ratio of feds as opposed to real girls has gone down. Plus back then webcams and digicams didn't exist, were horribly bad or hidiously expensive plus you didn't have the
Re: (Score:1)
Re: (Score:2)
It wouldn't surprise me if someone out there is using Gopher to pirate material.
Re: (Score:1)
They spend all their time in the chat rooms answering the same trivia questions for all eternity.
Get the MAC address the old fashioned way (Score:1)
Get a warrant to tap the ISP they think you are at and a warrant for your billing information, listen in for awhile to make sure you aren't being joe-jobbed or pwned/bounced-off-of, then raid your house and seize all your computers and routers.
Your MAC address will be somewhere in that pile of equipment.
My MAC address is Oak Brook, IL 60523.
Re: (Score:1)
gotta love the FBI (Score:1)
Re: (Score:1)
oops.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Let's hope so (Score:3, Insightful)
Anyone wonder how many exit nodes the NSA already runs? That'd be a far better(easier?) approach than monitoring "normal" traffic since I suppose the interesting stuff is already going through Tor, though in a typical hour-long scan I can't find any really "interesting" unencrypted web traffic at my exit node.
Folks surfing porn? Plenty. Plenty of Chinese blogs with plaintext passwords, too. But even those Chinese blogs are benign and not something that would be censored by their gov't (I think). Based on the pictures and my basic proficiency with Chinese, it's either folks just fooling around with Tor or it's steganographic.
Answers (Score:4, Informative)
Yes
Yes
Yes
Yes
CmdrTaco:
Yes
Hope that helps everyone.
Are MAC addresses globally unique? (Score:1)
Re:Are MAC addresses globally unique? (Score:4, Insightful)
Come to think of it, it's a bit silly that they used 4 bytes for the address that has to be globally unique and 6 bytes for the one that only has to be locally unique...
Re: (Score:2)
Considering how trivial it is to defeat MAC address security for wireless, it wouldn't be hard to spoof it at random or just use someone else's you got while war driving.
Re: (Score:2)
Re: (Score:2)
But in seriousness, you could have your lawyer have an internet expert (a teenager) demonstrate how to break into a wireless router with Mac address security.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Besides, you can change the MAC on most current NICs, or just emulate a different one using a VM. ( this gets around serialized motherboards, or CPUs even )
Now, embedded serials in your TPM chip, that might be harder to get ar
Re: (Score:2)
Re: (Score:1)
This is why OSS is important! (Score:3, Insightful)
Closed source applications from companies like M$ can't be trusted in this way.
Re: (Score:2)
Re: (Score:1)
You can send an mp3 file as a PDF file. (Score:2)
It's as simple as designing a steganographic protocol into either the file system, or the file sharing application.
Example, you want to send me an a file, on your Linux machine you combine 10 files into one big PDF file. The PDF file looks like a legit file with text, images etc, and the file name is also very boring, but associated with this file we both know a secret word known only between us.
The only way I can decrypt it into the correct file out of the 10 files you combined into it is if I know the exa
Re: (Score:1)
I'm not sure what you mean when you say,
Re: (Score:2)
What I'm saying is, Linux is not as free as it could or should be. Linux has gone commercial.
Granted, Linux is more free than Windows, but thats not really saying much.
FBI Sofware Projects are Notorious for Failures (Score:5, Insightful)
Re: (Score:2)
Reminds me of that t-shirt quote:
Reality: where the police are Italian, the cooks German, the mechanics Swiss, the lovers British and it is all organized and run by the French.
Re: (Score:2)
Re: (Score:2, Insightful)
The authorities use criminals all the time to catch other criminals. Most snitches are criminals themselves looking for a way to stay out of prison. It shouldn't surprise you at all if they employ Russian/Chinese hackers. And I consider their surveillance and authoritarian enforcement actions to be pretty efficient. If you want to break them down, you need to get the authoritarians to go after each other. Use the same methods that work so well on us.
Re: (Score:3, Informative)
Re: (Score:2)
Take a page from the 'War on Drugs'. A lot of 'anonymous tips' are from paid informants or people who were picked up in a sweep and threatened with prosecution unless they turned i
Another 60 million per year. (Score:3, Informative)
Here's the actual bill. [loc.gov] $60 million per year. 15 cosponsors.
This is another piece of Bush Administration "security theater". Write to your representatives in Congress and your Senators to get them to put this money into fighting spam and computer crime.
Re: (Score:1)
Sponsored by: Joe Biden [D-DE]
Cosponsored by:
Per
Jurisdictional issues? (Score:2)
Can the FBI legitimately scan, say, The Pirate Bay, to discover the IP addresses of supposed child-porn torrenters? Obviously if the person is downloading the material to a computer in the US is liable under Federal laws, but was the evidence obtained legally if it's based on scanning a foreign tracker?
Giving the FBI unfettered access to monitor the entire global Internet raises profound questions about the meaning of
Re: (Score:1)
Re: (Score:2)
The FBI's jurisdiction ends at the water's edge. Scanning an offshore tracker might be considered as gathering "foreign intelligence." That's been the bailiwick of the CIA and NSA, and off-limits to the FBI for decades. It's true that the reorganization of functions after the establishment of the Department of Homeland Security has made these distinctions less clear.
What makes it more complex is the absence of any prior evidence of guilt before the scanning occurs. If the purpose is to d
Re: (Score:2)
Anything is perfectly legal if you can get away with it. The FBI and other government agencies are more likely to get away with something than an individual.
Re: (Score:2)
Add one more question: (Score:2)
On the other hand.... (Score:1)
Oh yeah? So what did the pro-child porn activists have to say about that?
Oh. Nothing? I guess NAMBLA doesn't have a lobbying firm. Yet.
A new trend in p2p (Score:1)
Maroon 5- The FBI is Great.torrent
Hot Sexy Babes (Not Really, It's the State of the Union Address!).torrent
And the FBI will wonder why illegal file-sharing has almost disappeared but the distribution of pro-government materials has skyrocketed.
They fingerprint of the file reviews whats inside (Score:2)
All they'd have to do is scan the filenames to see what the md5 or fingerprint is and then they'd know what it is.
Re:They fingerprint of the file reviews whats insi (Score:1)
Sorry, probably should've put that at the end. Jeese, you had to go and hash on my parade....
Steganographic file systems and protocols (Score:2)
The only solution to defending privacy would be to develop Steganographic software solutions. A steg file system is already in development called stegFS.
And theres plenty of theories on how to do it. The question is who is actually going to write the software and who is going to pay for it?
I don't think theres enough demand for it, but in theory of course it's possible to have privacy and security. I think most linux users are more focused on paying for getting games working in Linux through Transgaming tha
False Positives (Score:2)
Flaws like the flash vulnerability mean that even without the complicity of GNU or Microsoft the majority of communications are open to inspection.
I'm curious to see what would happen if there was a decentralized push for better communication security.
Another government program? (Score:1)
Protect your commuity, design better software. (Score:2)
Ultimately this just means you have to design good software. Design a steganographic protocol for P2P and a steganographic file system for linux. That would be a start.
One example of a protocol I can think of off the top of my head is a stego P2P protocol where I sent you a file with a secret word associated with this file, the file looks like an ordinary legal PDF file, you can even read it, but if you enter the secret word the PDF file decrypts into the real file.
You could even add unlimited layers so tha
Re: (Score:2)
I am seriously hoping that anonymous begins to get rather political toward November. It would just make me happy to see masked people picketing courthouses with signs that tell everyone how senator so-and-so can't count, or has close ties with felons, or whatever... just some signs showing the sins of those who would have our vot
child porn industry: tax it (Score:1, Funny)
*ducks*
Re: (Score:2)
Considering we're speeding toward the bottom at Warp 9, there's not a lot further to go. I'm thinking, we all might as well line up at the prisons now and serve our time for whatever the government decides is a crime tomorrow and get it over with.
Re:Does F/OSS help? (Score:5, Insightful)
I think any of those would be quite hard to inject into open source code.
After all, in a p2p app the traffic is the most important thing ... and is going to be watched very closely. Patches that modify what go over the wire will be under considerable scrutiny.
And how are you going to collect those details once they're transmitted? By their nature p2p apps are hard to keep track of.
Not to say it couldn't happen. But I don't think it's much of a risk compared to the simple fact that your IP address is very visible when using a p2p app...
Re: (Score:2)
Unique file id's passing out in "real time".
Unique user id.
The user would have to feel safe and happy about the above.
I would suggest a something like a helpful new anti junk file database/plug in?
Some solutions to the privacy problem. (Score:2)
Software encryption isn't very good because it's not like you can trust closed source windows to actually encrypt without being buggy.
Hardware encryption is what you'll need to protect your privacy. Hardware encryption, combined with an updated Privacy enhanced Linux, and you'll have a solution.
You'll want to move your entire OS onto CD/DVD and into ram as well. All files stored on the harddrive should be stored in encrypted form, including the swap and cache.
And you'd probably want a stegnographic file sys
Steganographic file systems and protocols. (Score:2)
The solution is actually simple. It's just a matter of people deciding to code it. And I don't think the will is currently there, but where theres a will theres a way.
Steganographic file system [wikipedia.org]
StegFS [mcdonald.org.uk]
The first step would be finishing up the development of StegFS, porting it to the newest Linux Kernel and all the distributions. And let the SERIOUS users have privacy.
Re: (Score:2)
You scrape it off with a metal file, duh.