FBI operated 23 Tor-hidden child porn sites, deployed malware from them

Uh-oh....


As Ars has reported, federal investigators temporarily seized a Tor-hidden site known as Playpen in 2015 and operated it for 13 days before shutting it down. The agency then used a “network investigative technique” (NIT) as a way to ensnare site users.
However, according to newly unsealed documents recently obtained by the American Civil Liberties Union, the FBI not only temporarily took over one Tor-hidden child pornography website in order to investigate it, the organization was in fact authorized to run a total of 23 other such websites.

According to an FBI affidavit among the unsealed documents:

In the normal course of the operation of a web site, a user sends "request data" to the web site in order to access that site. While Websites 1-23 operate at a government facility, such request data associated with a user's actions on Websites 1-23 will be collected. That data collection is not a function of the NIT. Such request data can be paired with data collected by the NIT, however, in order to attempt to identify a particular user and to determine that particular user's actions on Websites 1-23.
“That paragraph alone doesn't quite say the FBI is operating them,” Fred Jennings, a cybercrime lawyer, told Ars. “But definitely no other way to read that than websites 1-23 were hosted at a government facility, with the FBI's knowledge and to the FBI's informational benefit. It's clever phrasing on their part.”

Security researcher Sarah Jamie Lewis told Ars that “it’s a pretty reasonable assumption” that at one point the FBI was running roughly half of the known child porn sites hosted on Tor-hidden servers. Lewis runs OnionScan, an ongoing bot-driven analysis of the Tor-hidden darknet. Her research began in April 2016, and it shows that as of August 2016, there were 29 unique child porn related sites on Tor-hidden servers.

“Doing the math, it’s not zero sites, it’s probably not all the sites, but we know that they’re getting authorization for some of them," she said. "I think it’s a reasonable assumption—I don’t think the FBI would be doing their job if they weren’t.”

That NIT, which many security experts have dubbed as malware, used a Tor exploit of some kind to force the browser to return the user’s actual IP address, operating system, MAC address, and other data. As part of the operation that took down Playpen, the FBI was then able to identify and arrest the nearly 200 child porn suspects. (However, nearly 1,000 IP addresses were revealed as a result of the NIT’s deployment, which could suggest that even more charges may be filed.)


In the Playpen case, the NIT’s deployment was signed off by one magistrate judge in Virginia, and it was used to target child porn users both in the United States and abroad. "Websites 1-23" were signed off by a different judge in Maryland.
Under one part of the current rules of federal jurisprudence, known as Rule 41, only more senior federal judges, known as district judges, have the authority to issue out-of-district warrants. However, a change in this rule set to take effect on December 1, 2016 will expand this power to magistrate judges, absent Congressional action.

Of the more than 100 Playpen-related child pornography cases that have been prosecuted, federal judges in Iowa, Massachusetts, and Oklahoma have ruled that such a search violated current laws of federal procedure and was in fact so egregious that the evidence collected as a result should be tossed. Other judges have rebuked prosecutors for unlawful searches, but they have not gone so far as to suppress evidence.

Ars asked FBI spokesman Christopher Allen if at one point the FBI was running half of all child porn sites on the Tor-hidden Web, and if so, was this still true.
“I would refer you to public documents on the Playpen investigation, in which we seized and operated a darkweb child pornography site for a period of less than two weeks,” he e-mailed. “That was an extraordinary investigation, and to my knowledge may be the only time that has occurred. So to suggest this is a common thing is patently not true.”

Lewis is herself a former computer scientist at the Government Communications Headquarters (GCHQ, the British-equivalent of the NSA). She could imagine reasons for the agency to keep the child porn sites online.

“I have no direct evidence to the contrary, but based on what I know about past investigations, not just CP but drugs market investigations, and the trends we have seen in security, hacking investigations—and the direction of other nations' authorities—I expect that we will see more busts where taking over the site plays a role,” she added.

Other urls found in this thread:

reddit.com/r/onions/comments/1jrnb4/freedom_hosting_attack_faq/
reddit.com/r/technology/comments/1joqr6/half_of_all_tor_sites_compromised_freedom_hosting/
assets.documentcloud.org/documents/3216737/Freedom-Hosting-NIT-Affidavit.pdf
usatoday.com/story/news/2016/01/21/fbi-ran-website-sharing-thousands-child-porn-images/79108346/
motherboard.vice.com/read/australian-authorities-hacked-computers-in-the-us
ibtimes.co.uk/australian-authorities-hacked-computers-us-while-investigating-dark-web-child-abuse-site-report-1576337
en.wikipedia.org/wiki/Richard_Huckle
blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
theintercept.com/2015/03/16/howthefbicreatedaterrorist/
en.wikipedia.org/wiki/Lolita_City
mozilla.org/en-US/security/advisories/mfsa2013-53/
dvidshub.net/image/1189046/operation-roundtable-screengrab-3
wired.com/2014/08/federal-cybersecurity-director-guilty-child-porn-charges/
en.wikipedia.org/wiki/Operation_Avalanche_(child_pornography_investigation)
en.wikipedia.org/wiki/Operation_Ore
twitter.com/NSFWRedditVideo

How was this malware deployed exactly? They got everyone that was running javascript like a retard?

gotta love the fbi sometimes

thanks for all that delicious pepperoni

Well, if you control the hidden service, targetted traffic confirmation becomes much easier since you are no longer a third party listener.

But yeah, it's probably just javascript again.

It's always been a JS exploit. if it wasn't JS, it was a browser exploit. The tor network itself has yet to be actually compromised.

They pose as prostitutes, run cp tor sites and more than likely sells drugs and arms.
You're sure they're still cops at this point? Or is entrapment just a facade to actually just run every illegal traffic imaginable under the sun? wtf america?

Entrapment only occurs if you encourage the person to commit a crime they wouldn't have normally committed without coercion. As long as they don't tell someone to commit a crime then it isn't entrapment.

Awhile back(maybe a month) I heard on the No Agenda show that users were amazed at how well the sites were running and showering the new admins with praise. The news report they played on it even had quotes from their discussion forum about how great the place never ran so well before.

Whenever I see CP spam posted here or on other imageboards I automatically assume it's law enforcement. Jim removing pedos from here was a good thing for the long term health of this site.

It's hotdogs, you sick fuck.

t. John Podesta

Me too. I can't think of any other reason why someone would be so dedicated to spaming that shit. I don't necessarily agree with deleting the pedo boards, but I do thing they were a big reason as to why we were attracting bots.

A better option would be to cut the LEO's budgets so they can concentrate on actually solving real crimes instead of constantly having to fish for manufactured ones. Would be a good thing for the long term health of the country.

I know a lot of autists browse Holla Forums, but surely even you can understand that pedophilia is as disgusting as furfaggotry.

B-b-but Holla Forums said that tor, that thing made by the NAVY and DARPA, is secure!

Good one retard

I don't recall an incident where the actual network itself has been compromise. Up till now, it's either been a browser exploit or a JavaScript exploit. If I'm wrong, please point it out.

Not the user you're replying to but doesn't the FBI control an alarming amount of the exit nodes in Tor? Doesn't that compromise the network?

On a semi-unrelated note, has the cloudflare issue in Tor been fixed yet?

godspeed FBI

I fucking love tor, degenerates think they're safe using that shit until the government agencies find it useful to arrest them.

This story has gotten out of control. There were from recent FOIAed documents about the 2013 Freedom Hosting bust.

These 23 sites were all on the same host, Freedom Hosting. This happened back in 2013. Over half of all onions were hosted on FH. FH hosted thousands of sites, anyone could sign up for free web hosting with PHP+MYSQL. The problem was that the operator, Eric Eoin Marques, didn't moderate any of the content.

And the FBI didn't run the sites, they replaced them with an 'down for maintenance' page that had a javascript exploit.

But the FBI fucked up and the exploit showed up on every Freedom Hosting site, including Tormail.

I remember when this happened, I ran some troll "human experiments" sites on Freedom Hosting. My site was replaced with an exploit and I was one of the many people who reported it to Mozilla.


reddit.com/r/onions/comments/1jrnb4/freedom_hosting_attack_faq/

reddit.com/r/technology/comments/1joqr6/half_of_all_tor_sites_compromised_freedom_hosting/

assets.documentcloud.org/documents/3216737/Freedom-Hosting-NIT-Affidavit.pdf


Here is the 74 page document listing the 23 Freedom Hosting sites they were authorized to deploy malware from.**


**The FBI fucked up and deployed malware from thousands of FH sites (on accident probably)

Isn't this a criminal offense? They intentionally possessed and distributed child pornography.

Not according to the justice department


>The FBI was first known to have operated a child porn site in 2012, when agents seized control of three sites from their operator in Nebraska. FBI Special Agent Jeff Tarpinian testified that the government “relocated two servers to an FBI facility here in Omaha and we continued to let those child pornography run – websites operate for a short period of time."

usatoday.com/story/news/2016/01/21/fbi-ran-website-sharing-thousands-child-porn-images/79108346/

They probably did shut down some sites and replaced it with an 'under maintenance' page. But they also ran sites that distributed child pornography, they've admitted it in court.

It's only illegal when you do it, pleb

Go to /pol and look up spirit cooking, John Podesta's emails on wikileaks, and the child porn code words they use. Also, this

The fact is, they controlled the website to exploit via JS. If the network itself was fully compromised, they wouldn't need to do that.

It looks like a bruteforce solution. I wouldn't call it network exploitation.

Did they catch the Clintons yet?

Those are different cases, not related to the 2013 Freedom Hosting bust. That story is about the 2012 operation called Torpedo and the 2015 playpen case.

In 2015, The FBI ran Playpen for 6 weeks. Compared to the Freedom Hosting bust, they were more careful. they only exploited people who logged in and clicked on a subforum clearly labeled as containing child porn.

Australia actually ran a dark web CP site called TLZ (the love zone) for over 5 months..

And users had to upload material at least one a month to stay on the site..

motherboard.vice.com/read/australian-authorities-hacked-computers-in-the-us

ibtimes.co.uk/australian-authorities-hacked-computers-us-while-investigating-dark-web-child-abuse-site-report-1576337

and it was worth it. they caught this monster who molested over 200 children.

en.wikipedia.org/wiki/Richard_Huckle

Think that's just a meme, haven't seen any evidence supporting it.
Not really. An exit node operator would see any plaintext but they wouldn't know where it's going. What does compromise the network is if they also simultaneously control the entry point because then they can correlate traffic going into and out of the Tor network. This is nothing new and has been acknowledged as a possible attack for as long as Tor's been around. See blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters for a good discussion.
Yes, you still get annoying pick 3 pictures captchas but you can solve them with javascript disabled.


Tor is not some magic wand that can fix all security. It never claimed to be. Anything that does is snake oil. Do your homework. For myself, it works great to avoid commercial profiling with no particular effort.

i would disagree there, i dont think its acceptable for the state to bend the rules under which it operates, especially if it makes them complicit in criminal activity.

How are they supposed to catch them then?

If they immediately close down the site, or disable images and links, the users will be suspicious, probably find the exploit and wipe their computers.

actual police work, you know, how police generally catch criminals. i cant imagine you can produce that kind of shit and not give off enough information to catch you.

Producers are rare. Most of them are distributors and possessors. They need to be caught too.

Shill, or genuinely this retarded?

do they though? to the extent that youre willing to allow the police to engage in aiding the distribution themselves? call me crazy, but i dont think the consumers and petty redistributors are doing anything like as much harm as the molesters.

If distributors don't do much harm then what's wrong with the FBI doing it?

There needs to be some kind of incentive or deterent to prevent people from consuming or distributing this content because:
1. it gives the "industry" enough legitimacy to encourage people to start producing their own
2. it still does harm to the consumers themselves.

Personally I don't agree with giving extremely harsh penalties for merely consuming/distributing CP, but we need to draw a line and say no, it's still bad for all parties involved, not just the children. Personally I think an internet ban would suffice the the consumers/distributors of CP and other illegal porn, and then enroll them in some kind of porn rehab.

an internet ban would suffice for* the consumers/distributors of CP

What part was unclear? Did you not do your homework?

So... What other sites were compromised other than playpen?

This is a fantastic idea. Hey, while we're at it how about a gun ban for anyone who shoots a human being. Self-defense not being used as an official excuse of course. Then we lock them up in a "society rehab".

Hey, what about a "automobile rehab" for people who drive SUVs?

Your arguments are trash, the examples you gave don't even correlate to mine. You're talking 1st parties, I'm talking 3rd parties.

I said internet bans would suffice for consumers/distributors, not actual child molesters. Child molesters should, without a doubt, serve prison sentences.

I don't even know what the fuck you mean by "society rehab" and "automobile rehab". If you mean that convicted murderers who've served a prison sentence should be psychologically evaluated before they are released to the public, I would only half agree. Giving the state the power whether or not to release you based on arbitrary "psychological tests" is too much power for my tastes. If you have a violent history even in prison, then yeah, maybe you should serve some fucking society rehab. Stop being a violent fuck and maybe we'll consider you safe for society. As for the automobile rehab, I don't see why you shouldn't retake a driver's test if you're repeatedly crashing into other vehicles or people.

How would a Tor exit node operator not be able to tell where Tor traffic is going?bjtQxH

That could be entrapment

Don't forget convincing people to try and blow shit up.
theintercept.com/2015/03/16/howthefbicreatedaterrorist/

In 2011-2012 3 sites (Pedobook, Pedoboard, TB3) run by Aaron McGrath was compromised in Operation Torpedo. The FBI found the server by logging into the admin account with a blank password and found the server IP. The guy was running the servers at his work. They used a flash file generated by metasploit to decloak users.

In 2013, Freedom Hosting was compromised. It was ran by Eric Eoin Marques. No one knows how they found the server but it ran for 5 years. Freedom Hosting hosted half of all hidden services. (He hosted thousands of sites, so it probably a lucky correlation attack) All 23 sites in OP were hosted there, the most famous one was en.wikipedia.org/wiki/Lolita_City . The FBI used a javascript exploit that only worked on outdated browsers. ( mozilla.org/en-US/security/advisories/mfsa2013-53/ )

In 2013, Operation Roundtable took down a darkweb site dedicated to boys on webcams (ICE and U.S. Postal Inspection Service were involved) dvidshub.net/image/1189046/operation-roundtable-screengrab-3

In 2014, Australia's Task Force Argos took over The Love Zone (TLZ) after tracking down the admin (Shannon McCoole) because of his unusual greeting (hiyas). They went undercover as Shannon McCoole for months and caught/hacked many people. They used exploits in video files too.

In 2014-2015, PedoEmpire and Hurt2TheCore admin was arrested (Lux aka Matthew David Graham), he had ties with Peter Scully.

In 2015, Playpen was found because the admin (Steven Chase) fucked up and allowed direct IP connections, someone scanning all IPv4 addresses found the true IP. The admin SSHed into his server with his bare IP 6 times. He also payed for the server with a personal paypal account. The FBI ran the server for 2 weeks and used an unknown browser exploit to decloak over a 1000 users.

Entrapment requires that a law enforcement agent induces someone to commit a crime that they otherwise wouldn't. Running honeypots doesn't meet that standard.

My favourite arrest from this operation:

wired.com/2014/08/federal-cybersecurity-director-guilty-child-porn-charges/


Imagine him crying holding on to his laptop. Also, how does a federal cybersecurity get caught by a flash exploit..

i never said it was ok, simply a significantly lesser evil


citation or expansion of argument needed there
1: prove it
2: who are you to dictate what one cant do with their own body if it harms nobody else?

But honeypots are still violating the law.

It depends on the circumstances of how they set it up.
For example, if they had put CP in an otherwise unconspicous /hebe/ thread or similar, and then went after anyone who clicked on that thread, that would be entrapment. Ditto if they post link to external site that's not what is advertised.
They could also post CP to a site they want to take down, or were ordered to take down by (((someone))). Don't forget how many file-sharing and torrent search engines went down over recent years, even though those didn't break any laws. But those unconvenient details don't matter, and in the end you get this

I worked at a large file host. They got hundreds of CP takedown requests a day while I was there. They are still up and running.

People who watch CP want new material. The fact they are looking at it and distributing it creates demand for new material to be made.

People rape children and film it because of the demand for it.

That just means you didn't end up on The List.
If you did, nothing your company had done would have made any difference. Unless of course, they're run by kikes, in which case they get a free pass.

Any large site with user generated content has to deal with CP on a daily basis. They aren't gonna shut you down because someone uploaded CP.

If you are using a shitty cheap host, the host might pull the plug, but that's a different issue.

i dont think thats how it works m8

Honeypots doesn't violate US law.

and FBI mostly use honeypots to deter people anyway.

...

...

natural selection lad

I'd post a smug image but Tor so.

The government can. That's why the government and laws exist, to enforce morality. Most people hate pedophiles for good reason.

...

Some obscure websites still sell those.

Operation Pin was in 2003. Before Tor existed.


Yes, and police have learned their lesson from the 1999-2001 landslide case. They received a lot of criticism for how they handled it.

en.wikipedia.org/wiki/Operation_Avalanche_(child_pornography_investigation)

en.wikipedia.org/wiki/Operation_Ore

woah, I'm terrified of having my credit card stolen.

>en.wikipedia.org/wiki/Operation_Ore


wtf, Pete Townshend is a pedophile.


what a shit

Exit nodes don't matter for hidden services. Exit nodes are only used when accessing the clearnet through tor. And if the website your on uses HTTPS then there's nothing they can do anyways.

They can log the request and potentially correlate it with your use of Tor.

correlation attacks against hidden services is cheaper though.

Relative to exit nodes, HSDir relays cost nothing to run. Hidden Services advertise to 6 new HSdir relays a day. If you run 20 HSdir relays and 3 entry guard relays with high selection probability, you'll be able correlate Hidden Service lookups when a target is using your guard and HSDir in the same circuit. You can't control which hidden services advertise their descriptors to your relay or who uses your guard, but eventually you'll catch somebody.

The attacker won't be able to see what you are doing or how long you browsed the site (the Tor client uses a new circuit to connect to the rendezvous point)

btw, when the revamped hidden services come out, this attack will no longer be possible.

Also, in the real world, the false positive rate on a correlation attack like this would probably be too high. They would need something like the RELAY_EARLY exploit to tag requests.

You're confusing legality with morality.

The laws ideally represent the morality of the people. This is why we write laws against gays doing gays things, because it doesn't exist in our ideal world.

But when will they come? Isn't it years ago since they announced them?

Bullshit

And this is a bad thing for what reason?

it wouldn't be bad if the FBI did it right, but in this case, the FBI fucked up and deployed exploits from hundreds, maybe even thousands of legal sites on Freedom Hosting.

If it was actually limited to the 23 sites that were clearly CP, then sure, I don't care.

well, if youre going down that route, so can anyone with a gun, or a sword, or a large stone and sufficient brute strength to overpower you
john locke would like a word with you
theres no good reason to hate people you dont know.

Yes, that is correct.
I don't care what he has to say. I could list other writers who disagree with Locke. That doesn't mean what any of them say is more or less correct. It only means people believe different things.
I don't need to know a murderer to hate them for being a murderer. Same with a jew or furry.

The FBI committed crimes even though their supposed job is to fight crime?

Freedom hosting was bad because they compromised every site on the service, not just pizza.

As for playpen, imagine if it was reported that
...because that's what happened according to their own rhetoric.

indeed, would you like to live in a society where that way of thinking prevails?
good job on missing the point lad.
well arent you edgy? personally im rather partial to english liberal philosophy, but if you want to be an edgy little natsoc kid by all means take your arse over to continental europe, you might actually do some good there.

I actually tried to access Tormail back in Aug 2013 when Freedom Hosting was compromised. I saw the maintenance page with the embedded exploit.

I thought it was a random blackhat at the time, there were rumors that Tormail was run by the Russian government too. I was pissed when I learned the FBI tried to hack me for accessing an email I used for throwaway accounts.

Do you think you don't live in such a society right now? So long as the power lives in an institution we can trust, there will be no problems.
Which was what exactly? Namedropping to sound intelligent?

mind if i ask where youre from, lad?
this is an english imageboard, which hosts predominantly anglo imageboard culture, and here in the anglosphere we dont worship authority
youre not on reddit lad, thats not how we do things here

Look at your post again.

i see them quite clearly lad, its just that youre not currently in your little corner of Holla Forums where everyone jerks off to natsoc bullshit

No, you just jerk off to Locke and refuse to acknowledge contrary viewpoints because you believe anything else is not anglosphere and therefor incorrect. You're probably incapable of proving your point of view anyways.

gtfo fbi

yeah, we were only the last great empire left standing, and the greatest liberator of peoples ever to grace gods green earth, but by all means continue to indulge in your backwards illiberal philosophy, its what makes us better than you

So you can't prove a single point you made? Maybe you should just stick to saying >>>Holla Forums, it would work out better for you.

oh, so might only makes right when it suits you then? besides, youve failed to respond to any of mine, so i dont see why i should do anything other than mock you for clinging to a failed worldview.

OK, Allahu Akbar. Maybe that's how things work in whatever desert country you come from but in the US there's a thing called separation of church and state. How it's supposed to work is if there's no victim, there's no crime.

Firstly, I never said might makes right. I said might = power = control. You should live by natures rules but we can still temper it with human reason. That being said, what exactly do you think the British Empire was? How exactly do you think they got such a large empire in the first place? They conquered other people. Might does not make right, but might does make control. It's just that we hope and try to make it so that might operates on what we agree to be moral.


Church != morality
Victim is not so easily defined. You can easily argue that because ones actions influence the people around them, any harm you do to yourself is also a harm to them. Can you really say drug addicts do not harm their friends and family?

see

not so, first they grew their economy, then they grew their military, much of the british empire was oriented towards economic domination

Not to create it.
Did they rule over India and half of Africa with just an economy? Of course not. They had soldiers, soldiers they used to conquer other lands, they used the wealth there to fuel a larger, more power navy and army, which in turn conquered more territory, which created further wealth. Are you going to seriously argue the British empire did not conquer other peoples?

It's great that this guy was v& and all, but the end doesn't justify the means...

Same difference. Once you start trying to legislate morality you no longer have a free country.

Yes, unless you are talking about feels but then you are basically taking the side of the SJWs. They are "victims" too when somebody says something offensive to them.

Can you prove that statement? There's ample evidence drug users are a drain on society, they bring crime and spread disease. They also form an underclass that could not exist without the charity of honest society. Can you really say such things are only of their concern? Of course you can't. A society is not a bunch of individuals living in the same area, it is a union of individuals, each contributing and taking as needed to maintain order. The individual can bring nothing without the society around them. Similarly, the society around them is nothing without the individuals. You cannot separate the two.

What do you imagine a law against murder is? It only codifies that murder is bad. If we lived in a society where murder was seen as good, there would be no law against it.

If drug users bring crime then prosecute them for any actual crimes committed against actual people a.k.a. victims. Murder, for example.
Not interested in playing word games.

Thanks for ruining this thread with Holla Forumscrap, guys. Would be nice if you could limit yourself to Holla Forums with the other twelve year olds. Thanks.

That's like saying laws against "hate speech" and "offensive" things are valid. They're horribly vague and both are euphemisms for censorship. The 1st Amendment protects ALL free speech, including speech that may offend.

There are already laws against actual crimes so there's no need for unconstitutional laws other than gaining illegitimate power and control.

irrelevant

no, but they required it to do so, and were motivated by the prospect of further economic expansion. britain has been an economically driven nation for quite some time, and the purpose of the british military has long been to protect economic interests.

They may be, depending on your point of view and what you value.
Except yelling fire in a crowded theater :^)


haha
Which is exactly what I told you. The British Empire was dominated by the reality of life, that the stronger side wins and the weaker perishes. The British were stronger and so they got to control India, not the Indians. You can't get around this law.

If you wanna be smart, adopt harm-based morality. Not principle-based morality.

Make it illegal to cause harm and damage, not simply offend or violate a "principle".

Since when is morality a tech subject? Would you pretentious retards fuck off back to Holla Forums?