Motherboard reports that two New York men arrested on charges of online child pornography, allegedly on the Tor hidden service, were brought down by a Federal Bureau of Investigation (FBI) hacking tool used to identify the “true IP addresses” of the accused.
The FBI argues that, in order to bring down a major pornography site, it had jurisdiction to hack more than a thousand computers in what’s been termed a “bulk hacking campaign.”
“In order to fight what it has called one of the largest child pornography sites on the dark web, the FBI hacked over a thousand computers,” Motherboard detailed.
Christopher Soghoian, principal technologist at the American Civil Liberties Union (ACLU), told Motherboard the news was “simply unprecedented.”
According to court documents, a new bulletin board site titled Playpen appeared in August 2014 online for the explicit purpose of “the advertisement and distribution of child pornography.”
Playpen gained almost 60,000 member accounts one month after launch, though it isn’t clear how many of these were throwaway accounts and how many people actually used the site. According to the FBI, many of the sites posts “contained some of the most extreme child abuse imagery one could imagine, and others included advice on how sexual abusers could avoid detection online.”
The FBI described the site in a complaint as “the largest remaining known child pornography hidden service in the world.”
In February 2015, law enforcement seized a web host in Lenoir, North Carolina. They didn’t close the site down. Instead, they ran it from February 20 to March 4. The FBI used a “network investigative technique.”
The FBI complaint revealed that “approximately 1300 true internet protocol (IP) addresses were identified during this time.” Others posit a higher number.
“Fifteen-hundred or so of these cases are going to end up getting filed out of the same, underlying investigation,” Colin Fieman, a federal public defender involved in several related cases, told Motherboard in a phone interview.
“There will probably be an escalating stream of these [cases] in the next six months or so,” Fieman added. “There is going to be a lot in the pipeline.”
Fieman calls the FBI investigation an “extraordinary expansion of government surveillance and its use of illegal search methods on a massive scale.”
Because Tor Browser Bundle lacked an auto-update mechanism in August 2013 only users who patched their versions were safe from surveillance. Thanks to this vulnerability, anyone who logged into Playpen was breached by the FBI during the time the agency ran the website. Details about the FBI NIT are unclear, such as how it was deployed and used.
“Although the application for the NIT in this case isn’t public, applications for NITs in other cases are,” said Soghoian. “Time and time again, we have seen the Department of Justice is very vague in the application they’re filing. They don’t make it clear to judges what they’re actually seeking to do. They don’t talk about exploiting browser flaws, they don’t use the word ‘hack.’”
What’s known is that the FBI has set a new standard in what sorts of breaching campaigns it embarks upon.
Featured image from Shutterstock.
Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones
In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard.
Using software alone, Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici were able to convert a given pair of headphones or speakers into Orwellian microphones beyond the user’s control or ability to patch. Their method [PDF] exploits a flaw in RealTek hardware chips, which are one of the most widely used chips in motherboards around the world. Companies like Dell, HP, and Compaq regularly utilize RealTek’s industry standard audio chips in their products. Beyond that, motherboards sold to consumers wishing to build their own systems often also include the hardware.
A simple patch or firmware upgrade will not fix this flaw, making the exploit particularly delightful to intelligence agencies, profit-motivated hackers (think boardroom conference calls), and others. Basically, anywhere a computer has an audio output, which in the case of laptops is everywhere, audio can now be intercepted and then relayed with roughly the same quality as if a microphone itself had been compromised. The images of people like Mark Zuckerberg covering up their webcam and microphone with electrical tape now seem trivial.
Jack re-tasking – the process of converting an output jack to either an input or a two-way port – has long been a possibility, but few developers make use of it. Most laptops and desktops will have separate ports for each, while smartphones and the like often require hardware that can do both. But the innovation on the part of Ben Gurion’s researchers involves making any regular output hardware capable of doing as much with only software. They write:
The fact that headphones and earphones are physically built like microphones, coupled with the fact that an audio port’s role in the PC can be altered programmatically from output to input, creates a vulnerability which can be abused by hackers.
The researchers noticed that the design of most audio input and output hardware was basically identical at the metal, drawing the following illustration for clarification:
One saving grace is that the audio output device must be “passive,” or unpowered. This means that if your speakers require power to work, they are not currently able to use these to listen to you. However, the vast majority of laptop speakers and earbuds are, by nature and necessity, passive. The researchers note that while they focused on RealTek codec hardware because of their popularity, other manufacturers also have the ability to retask jacks, which is the heart of the exploit.
While this may seem scary at first, it should be noted that, like anything else on your computer, audio input and output are data. They can therefore be encrypted with keys that are local to the machine, and it would seem that this new exploit opens up a new avenue of research for cryptographic researchers to institute audio encryption in the same way that full-disk encryption has become normalized.
Here is a demonstration of the method in action:
Apple Watches Banned from UK Cabinet Meetings for Hacking Fears
Cabinet ministers have voiced concerns that Apple Watches could be hacked by Russian spies, prompting the devices to be barred from meetings, according to a report from The Telegraph.
Under the new leadership of Theresa May, U.K cabinet ministers have been barred from wearing the watch during meetings after concerns were raised that the gadgets could be employed as listening devices.
The Apple Watches join the list of banned items alongside mobile phones after these were barred for similar reasons.
According to a survey conducted by research firm IDC, Apple Watches account for seven percent of the market compared to FitBit, which is reported to account for 25.4 percent.
A Threat from Russian Hackers
This latest news comes amid concerns of a possible threat from Russian hackers who have recently been in the news.
Russian hackers are alleged to have been able to obtain confidential emails from the Democratic National Congress during the U.S. elections despite Russian president, Vladimir Putin, denying this was the case. Surprisingly, congressional leaders are reported to have known about the hacking a year before it was officially announced.
Not only that, but at the recent Rio Olympics, which saw many Russian athletes banned from competing after it was revealed that there was a state-run doping program in the country, Russian hackers have retaliated.
A Russian cyberespionage group known as Fancy Bear recently accessed and leaked data from several high-profile Olympic athletes, by targeting a World Anti-Doping Agency (WADA) database. This is the same agency that placed a recommendation to ban all Russian athletes from the 2016 Rio Olympics.
Unsurprisingly, with the threat of Russian hackers high, and with devices such as mobile phones and watches now being considered as vulnerable gadgets that can be hacked into, it seems as though banning them from important meetings is the only way that will remove any possible threat to state security.
Featured image from Shutterstock.
In Child Porn Bust, FBI May Have Used Malware on Innocent Users
In 2013, the FBI confiscated Freedom Hosting, a service that hosted websites on the dark web, including several child pornography websites and private email service TorMail. When it happened, it was seen as a massive victory, but recently unsealed documents show the FBI may have used malware on innocent users.
Three years ago, the FBI was given a warrant that allowed them to hack 300 TorMail users who were allegedly linked to child pornography. They went with a piece of malware known as a Network Investigative Technique (NIT), with the goal of acquiring users’ real IP addresses.
The agency did manage to arrest a lot of people for child pornography, but documents unsealed by the American Civil Liberties Union (ACLU) show the NIT was actually used on innocent users.
According to the documents, the FBI was allowed to “investigate any user who logs into any of the TARGET ACCOUNTS by entering a username and password”. Yet, the NIT was used on users even before the TorMail login page appeared. WIRED’s coverage at the time claims users were given a “Down for Maintenance” page that carried the malware, on al websites hosted by Freedom Hosting.
Christopher Soghoian, principal technologist at the ACLU told told Motherboard:
While the warrant authorized hacking with a scalpel, the FBI delivered their malware to TorMail users with a grenade
The malware was quickly discovered by the community, and that forced the Feds to end their operation sooner than expected. Be that as it may, the FBI still arrested a large number of child pornographers.
Christopher Soghoian also noted that it remains unclear whether the court knew the FBI hacked innocent users it shouldn’t have, and whether the agents who did it were punished.
How the Feds Caught the Pedophiles
Although the Feds allegedly hacked innocent users, they still got the job done, as their malware exploited a critical memory management vulnerability in Firefox, which later fixed the problem.
The NIT specifically targeted Tor’s Firefox version, through a hidden Windows executable named “Magneto”. All it did was look up the infected user’s MAC address – a unique hardware identifier – and the Windows hostname. Then it was all sent to a server in Virginia outside of Tor, exposing the user’s real IP address.
Still, after identifying users’ real IP addresses, their anonymity was broken. Thus, child pornographers were taken down.
Image from Shutterstock.
- Tortoise & Hare Investing October 19, 2017
- Asian Market Update – Thursday: Asian stocks mixed on China GDP, Japan trade data October 19, 2017
- Bitcoin Returns to Health After Flash Crash October 19, 2017
- ICO Analysis: Datum October 19, 2017
- Kazakhstan Is About to See Its First Cryptocurrency Backed by Fiat Money October 19, 2017
- Bitcoin Won’t Replace Cash, Says Bank of Canada Deputy October 19, 2017
- Daily Analysis: Dow Leapfrogs 23,000 as IBM Beats Estimates October 18, 2017
- Technical Analysis: Bitcoin Dumps and Pumps amid Broad Volatile Correction October 18, 2017
- Money Leads to More Money – Power to More Power October 18, 2017
- Trade Recommendation: DigiByte October 18, 2017
A part of CCN
Analysis1 week ago
Analysis: Bitcoin Price at $5200, How Much is There Left in the Tank?
Analysis6 days ago
Technical Analysis: Ethereum, Monero, and Litecoin Jump as Bitcoin Goes Parabolic
Analysis4 days ago
5 Things to Watch Next Week: Byzantium, Bitcoin Stretched, Gold’s Strength, The Next Fed Chair, Kirkuk and Crude Oil
Cryptocurrencies1 week ago
Trade Recommendation: Monero
ICO5 days ago
ICO Analysis: UTRUST
ICO1 week ago
ICO Analysis: Request Network
Analysis7 days ago
Technical Analysis: Litecoin Follows Bitcoin Higher as Market Tops $165 billion
Cryptocurrencies4 days ago
Trade Recommendation: Stellar