28

There's a recent report in the news of a Harvard student who emailed in a bomb threat so as to postpone year-end exams. According to the report, he carefully covered his tracks using the best technology he knew about: he used a throw-away email account, and only accessed it over Tor.

It turns out that this last point -- using Tor to send his email -- is what made him easy to find. Officials simply searched Harvard's logs for anyone who had recently accessed the Tor network, which led them directly to the culprit.

Arguably his critical mistake was using Harvard's WiFi for his Tor access; going down the street to a coffee shop would possibly have prevented his identity from being tied to his Internet activity. But in that case, Tor would probably have been unnecessary. And in fact, the interesting point is that his use of Tor completely failed at its primary purpose of providing anonymity, but instead simply provided him a completely false sense of security.

This principle easily extends to other anonymity tools and techniques as well; encryption, proxies, and others: if the tools are not popular, then the fact that you're using them alone makes your activity suspicious, making you an immediate target for investigation, interrogation, etc.

So how do you deal with this? Can you really trust Tor and other anonymity tools to make you anonymous? Would layering these tools help? Or would it just compound the problem?

forest
  • 64,616
  • 20
  • 206
  • 257
tylerl
  • 82,225
  • 25
  • 148
  • 226
  • 1
    Do you know the authors of TOR? How do you know they are not all spies trying to get criminals to self-identify themselves to the police? Even if you know their names and see them present at conferences, maybe they're just really good spies. A better approach to being safe is probably not to get involved with groups that the feds really want to get. Remember. OBL was probably better at staying anonymous and hidden than you are, and the feds found him. Most of the people inside our prison system thought they were smarter than the feds too. – Matt Dec 21 '13 at 18:45
  • 7
    @Matt TOR is originally a DARPA project, so created by the US Government. Tune your tinfoil hat accordingly. – tylerl Dec 21 '13 at 20:04
  • @tylerl It was not DARPA (the computer mouse, however, was DARPA). It was actually the Navy, and they did not _create_ it, they just hired contractors (e.g. Jacob Appelbaum) to design it. Basically what they did is say "hey guys, make us an anonymity system that hops between multiple nodes, layering encryption like an onion" and it was made. The creators themselves were not employees of the government. – forest Nov 02 '18 at 03:24
  • The amount of tinfoil misinformation here is absolutely misleading. Whether Tor itself works can be verified, (FOSS), whether Tor is secure can also be verified (Hundreds of research papers on Tor, and the fact that illegal items are still being traded under .onion services.). If you want to remain secure, use a local network and secure the router and connection as much as possible. (If you're in a city, +1 for more Tor users) Tor works, and it has been working for a long time now. – 09182736471890 Dec 06 '19 at 02:47

4 Answers4

38

If you are in a crowd and you wear a mask, but nobody else in the crowd does, then you tend to attract attention...

If you want to remain anonymous, then you must use only tools which do not single you out as a potential miscreant, i.e. tools that everybody uses. A good example is when you pay in cash: this is a mostly traceless payment system, and yet sufficiently many people use it so that paying with cash does not appear suspicious (unless you use cash to pay for, say, a big car).

To a large extent, this illustrates a tendency to miss the point, which is unfortunately often encountered in circles dealing with anonymity: it is what I would call the "game fantasy". When using Tor, PGP or whatever, the wannabe anonymous sometimes feel that he is playing some game with informal rules, in particular a definite and finished scope. The Tor user tends to believe that his adversaries will meet him only in a network-related way. As rumour has it, one of the first reactions of Kevin Mitnick upon his being arrested was to say that Tsutomu Shimomura had "cheated" by calling the cops, instead of trying to defeat him through technical skills alone.

So let there be a lesson: if you want to be anonymous, don't concentrate on the tools. Instead, focus on the big picture. Layering anonymity gimmicks on top of each other does not address the actual problem.

In fact it can be argued that no layering can help Tor in any way, since the point of Tor is to randomize the network path so that sender and recipient cannot be correlated with each other; if something else is needed then sender and recipient were correlated with each other, and the actual use of Tor came to naught. This is a property of anonymity through absence of correlation: it is all-or-nothing. You cannot get anonymity incrementally; you have it all in one go, or you have none. This answers one of your questions: layering does not ultimately help.

To really be anonymous, you have to blend in the background. You achieve perfect anonymity by doing nothing. However, as soon as you try to act, if only to send an email, then you begin to leave traces of many kinds. For instance, when you use a WiFi access from a coffee shop, then you are physically in the coffee shop, so you are in range of CCTV cameras, you leave fingerprints and DNA traces on the premises,...

Thomas Pornin
  • 320,799
  • 57
  • 780
  • 949
  • 26
    "To really be anonymous, you have to blend in the background" -- Like a real-world ninja. Ninjas didn't look like guys in black pajamas; they looked like every other rice farmer in the field of rice farmers. – Brian S Dec 20 '13 at 22:14
  • @BrianS, I live under the impression that there were small groups of ninjas, that climbed castle walls and killed with swords, much like modern special forces squads. Those guys needed to **not be seen**, instead of **not be recognised**, so they wore black as the night. – Vorac Jan 10 '14 at 09:26
  • 4
    @Vorac, While there were certainly times when a ninja would undertake a "stealth mission," the modern concept of the ninja garb (the black body suit) largely stems from theater. The "ninja suit" was the outfit of the stagehands, which the audience was trained to ignore (they weren't actors). Then, surprise! One of the stage hands is actually an actor, portraying a ninja character. – Brian S Jan 10 '14 at 16:39
15

I essentially agree - using Tor from within Harvard's own WiFi network was a big mistake.

Note that in this case, the perpetrator did not have the nerve to stay silent in the face of police questioning. His confession is what made the case against him airtight.

Had he "lawyered" up, the police would have:

  • Evidence that he used Tor around the time the emails were sent

The police would not have:

  • Information about what websites or services he accessed using Tor
  • Information about the content that he transmitted and received via Tor
  • Any residual information on his laptop (if he had used something like TAILS)

The Tor network performed exactly as designed - the weakness was a PEBCAK issue.

At a guess, a tired, sleep-deprived student, under considerable parental and cultural pressure to perform, made the biggest mistake of his life.

scuzzy-delta
  • 9,303
  • 3
  • 33
  • 54
12

I think that the concept here would be dividing data from metadata. In the case of the Harvard student what caught him (well as far as reported facts go) was meta-data rather than the content of his communications. Some privacy techniques (e.g. encryption) just hide the content of the communication they don't hide the fact that the communication has taken place.

In terms of anonymity tools making you less anonymous, I'd say that doing things that make you stand out make you a potential target. So if you start using a VPN and Tor and taking burner laptops to coffee shops to connect to the Internet, someone observing your activity is likely to conclude that you have something to hide, which could in turn cause you to be placed under investigation. This of course depends on the idea of someone observing the metadata, which is what happened in the Harvard case.

Better OPSEC practice is to try not to stand out from the crowd, so if you're one of a large number of people using Tor in a location, you don't stand out from a metadata perspective, and Tor may protect the content of the communication.

So to answer the question, I'd say that anonymity tools have a place in an overall OPSEC regime, but if misused they can be counter-productive.

forest
  • 64,616
  • 20
  • 206
  • 257
Rory McCune
  • 60,923
  • 14
  • 136
  • 217
5

As others have observed, he made two major mistakes: 1) he publicly used a tool (Tor) that singled him out as a suspect; and 2) he confessed under interrogation by the police.

If he had accessed Tor through a plain-vanilla VPN service, popular among his peers, he would not have been so readily targeted. But even that wouldn't have saved him, unless he had routinely used that VPN service for torrenting or streaming.

Confessing under police interrogation was his fatal (career-wise, anyway) mistake. As foolish as that may seem, police are well-trained in psychology to read guilt. They're also well-trained in manipulating suspects into confessing. There's the classic "good cop, bad cop" dynamic, where the "bad cop" scares the [redacted] out of the suspect, and the "good cop" then promises to protect them from the "bad cop". That's also a classic torture routine.

Most people have no clue how to deal with that. It's not so bad for the innocent. They can just be natural. But, for the guilty, it's far harder. It takes skill to convincingly feign innocence, and to resist the temptation to bargain. In an interrogation, there is no bargaining, only evidence collection. If there's any bargaining to be done, the lawyers will handle that, at the appropriate time.

In this video http://www.youtube.com/watch?v=6wXkI4t7nuc, a "law school professor and former criminal defense attorney tells you why you should never agree to be interviewed by the police." Calmly requesting a lawyer is an appropriate answer for everyone undergoing police interrogation.

mirimir
  • 726
  • 4
  • 11