Silk Road forums
Discussion => Security => Topic started by: Leech on July 02, 2013, 04:32 pm
-
OK, suppose you use a computer to surf to a deep net website, first the ISP will log your activity by your IP (supplied by your ISP), then log your MAC ID, which you can change.
Tor exit nodes also leave your IP vulnerable too. And public anonymous proxies might also log your real IP.
So other than real IP, proxy logs, exit nodes, and MAC number, what other elements make one trackable?
-
good question.
-
Online methods:
- rip facebook cookies out of a browser from your honeypot/sting site (how they unmasked China's hacking team)
- java exploits (not javascript, java plugins), PDF or some other direct file download like DCC on IRC
- traffic analysis like grep'ing the logs of ISPs looking for direct Tor connections or a VPN IP you know is the person of interest
- reprogramming aircards/3G internet sticks of suspects to unmask and locate them
- directional analysis of wi-fi signals
- MITM attacks by running malicious exit nodes
- intimidating some cloud service like Gmail to give up your info and emails
- various browser and kernel exploits (illegal in some countries, used heavily in Germany and UK)
- software manufacturer hands feds exploits to use before they patch them (leaked by Snowden, microsoft does this)
- looking at your google search history, or bing search history, or feeding you tracking cookies.
How to avoid: Use something like obfsproxy3 or a VPN to hide your traffic from local analysis. Use Tor browser only and don't go to any links people feed you, use Tails or virtual machine to limit exploit damage. Assume all SSL is compromised and don't use any sites that aren't .onion for business. Use end to end encryption and don't trust Hushmail or Countermail. Stop using closed source software like OSX and Windows. Install everything recommended here for regular browsing (don't add anything to Torbrowser though)
http://donttrack.us/
http://fixtracking.com/
http://dontbubble.us/
Social Engineering methods:
- confidential informants, usually people you work with who got busted and roll on you for a lighter sentence
- insisting on sending cash for a huge order, playing off vendor greed
- offering to trade items for product like a pill press or anything they can put a tracking device into
- offering "security services" like a VPN or to set you up a store/server
- becoming your friend and waiting for you to drop enough intel on yourself with your guard down to find you
How to avoid: trust nobody ever, even if they've bought off you for 10 years with no problems. Always accept only bitcoins for payment. Don't take any trades, don't talk about yourself or operations ever. Go on youtube and search for "OPSEC For Hackers" by the grugq and watch the entire video.
Passive intel collecting methods:
- if you have 300+ posts here you probably gave away enough points of intel they can narrow down a search
- watching what you say here or on IRC or anywhere else you've used the same handle/nym for intel
- analyzing this entire forum which they are already doing
How to avoid: Watch the grugq Opsec for Hackers video, stop talking about your operations, stop using this forum like it's facebook or a reddit circlejerk and dropping intel constantly about yourself.
Post office interception/controlled delivery:
- order drugs, get the tracking number and have postal inspector hold package. Find some excuse to inspect for drugs or attach tracking device and return it to sender claiming insufficient postage hoping vendor goes and picks it up.
- order or find drugs, check for fingerprints, hairs, DNA any forensic evidence. check printed labels for hidden serial numbers they can match up to sales records.
- check sending post office if vendor was stupid enough to go in person and mail it on camera
- hold everything sent from that address or post office for analysis for drugs and forensic analysis
- use their standard methods to detect drugs like "Oh, a California express prepaid box. Let's make up an excuse to open this"
- find drugs, bust whoever is picking it up, turn them informant. see above section on social engineering
- check all addresses to see if they are fake, now have cause to open package.
How to avoid: Use a fake address that's real, like an apartment with no unit #, a business but add on a fake unit #, not an obvious address that doesn't exist. Only use drop boxes with anonymous payment. Don't be greedy and go get a package that was returned if you have access to the address. Don't get sloppy with packs and leave fingerprints or badly seal the dope causing dogs to flag it. Switch up where you mail stuff from, don't use overnight service they always flag it.
Wholesale surveillance and traffic patterns to identify networks
- packet inspection of BGP routers/backbones for mass analysis
- forcing backdoors into all proprietary software like Skype
- exploiting backdoors left by inept manufacturers who use them in routers and other blackboxes for maintenance or tech support
- hiring non government contractors run by ex CIA and NSA to scrape social networks en masse and then analyze for hidden networks, writing styles, ect.
- buying software like this http://www.ntrepidcorp.com/tartan.php to do the above
- NIST recommending inferior random number generation in encryption standards as a backdoor: http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
- operating surveillance drones
- operating gigantic networks of surveillance cameras
- Using Stingray fake cell towers to intercept cellphones
- Mass spying of all telecoms and ISPs as per snowden leaks
How to avoid: end to end encryption using only open source programs. Only using open source operating systems. Not trusting blackboxes or anything proprietary. Running your own firewalls and routers with openbsd or linux instead of buying a blackbox. Not using facebook. Never using your real name online ever. Not using credit cards or other traceable payment methods for business items like label printers or vac sealers. Aluminum tin foil hat to block the drone mind control :) :) :)
I probably missed a thousand other methods
-
Excellent post, @comsec!
-
ya know the way most people get caught up by LE or other government nets is by their own doing/ stupidity. the best thing to do is keep your mouth shut. say nothing to anyone not supremely vetted. Never discuss SR. Never. be smart in your movements. change travel patterns often. dont go to the same McDonalds everytime you want to get on SR or other HiddenServices. dont get fucked up and pulled over in a vehicle. dont beat your kids/ wife/ neighbor and get the cops called to your house. Dont smoke weed in the car, probable cause is a MOFO.
-
Bravo and thanks to comsec! Sticky that post!
All I can add is that I am confident that the number one reason people get busted is by opening their mouth. Try to keep that in mind at all times. This country is fucked at any number of levels, but the whole "innocent until proven guilty" thing is a glorious right to have (for now).
Prosecutors need mountains of circumstantial evidence to equal just one stupid thing you said that indicates guilt, or to be equal to eyewitness testimony (rat). So if TSHTF, shut up and make them do all the work on building that mountain of circumstantial evidence.
I am pretty misanthropic, but with a decent defense attorney, I feel pretty good about my odds when being judged by a jury of my peers.