[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: FBI Visits JPUNIX
In regard to an email which was purported to be subjected to
suppression Anonymous wrote:
> The first time it was sent via a remailer, it was bounced for ill-
> defined reasons. The second time it was sent, the remailer was shut
> down, and remains shut down.
Mark M. wrote:
> Speaking as "XXXXXXXXX" (or, at least, one of the "XXXXXXXXXs"), I did receive
> the following message which originated from "TruthMonger." Shortly after I
> received the message, anon.nymserver.com closed down all of its free,
> anonymous accounts due to "abuse."
Anonymous continued:
> Efforts to send it through a second remailer also failed, with no
> notice from the server of any problems being received. Other email
> sent through the remailer at the same time encountered no difficulties.
Later the same day John Perry wrote:
> Due to an FBI investigation that was opened recently naming
> myself and jpunix as suspects, I have decided that the heat taken by
> remailer operators due to those individuals that can't control
> themselves has become unacceptable.
The message in question is below. Draw your own conclusions.
XXXXXXXXX,
I thought I would reply privately to you, since you seem to
at least have a willingness to allow the possibility of compromises
to the security of the encryption methodologies behind PGP programs,
among others.
To begin with, I'm not sure whether you realize it, or not, but the
Navy's spook tenacles run deeper, and extend further, than those of any
of the more notable or visibly involved agencies who lurk in the
background of security and privacy issues.
One of the reasons for this is that their physical existence could be
said to mirror the Internet in many respects. The very nature of their
'global' home (the sea), has always permitted them access to people and
regions which are denied to others. Also, they are often in the position
to be involved in what looks to be merely the 'transporting' of people
and information.
Whether providing escort services or getting drunk in foreign bars,
the expertise of naval intelligence has always lain in the area of
observation, first and foremost.
By far the greatest tool of intelligence agencies on the Internet,
has been traffic analysis. Their techniques are sufficiently sophist-
icated that I would not be surprised to find out that they can tell
more about us from our Internet activity than can be learned from the
satellites capable of reading the newspaper over our shoulder as we
sit in the park.
Traffic analysis involves all measurable quantum of information, the
chief concerns being the patterns and timing of data transfer, from
which everything ranging from content and motivation can be deduced.
If you wish to think in terms of back-doors, then you would be well
advised to go beyond the concepts of 'passwords' and 'holes' and try
to think in terms of patterns and timing, and other such 'structures'
which are peripheral to concerns regarding 'code' and 'mathematics.'
i.e. As well as considering the 'content' of what a program returned,
you must also consider 'when' the program returned the result, and
the patterns in the timing, as well as the content.
An analogy could be made to a person who, being interrogated, answers
all questions with a predictable rhythm and then 'pauses,' however
slightly, in answering a certain question. You can see that what is
revealed by the 'content' of the answer can be greatly insignificant
compared to what is revealed by the 'delay' in answering.
To expand your concept of 'back-doors' and 'holes,' you have to ask
questions such as:
"Does it take a program or hardware longer to return a result of '0',
than to return a result of '1'?"
"What factors can be introduced into the hardware and/or software
that can influence the patterns and/or timing of various processes
and the results they return?"
"Can key searches be made more efficient by analyzing such things
as rhythm, syntax, etc? What 'details' or 'qualities' of an individual,
group, or 'arena of concern' can be analyzed for the purpose of being
able to group them into structures which can be searched for?"
"How can 'assigning' a value to certain sequences of numbers be used
as a pattern to 'filter' the input data into a form which is easier to
analyze?"
You are aware of 'tricks and techniques' that apply to mathematics
and are widely known.
i.e. The process of shifting and adding numbers when multiplying by
the number '11'.
However, what about those quantum of information which are of no
consequence to those seeking for the 'final result' of that multi-
plication? Can the peripheral effects of mathematic calculations
be used to analyze what has taken place, to narrow the scope of
inquiry?
My nephew describes numbers as getting 'wider' as they get larger,
and he does quick checks of his result through his 'feel' for how
much 'wider' a number should be when he is done, even in complicated
equations which he ill-understands.
(He reminds me of Steven Wright, who claims that someone told him
that his socks didn't match, and he replied, "Sure, they do. I go
by thickness.")
I am currently working on a project which involves merging chaos
theory with traffic analysis and other processes to analyze the
effects that algorithms display when processed through the filters
of varying hardware and software structures and methodologies.
The RSA algorithm and accompanying RSAREF subroutines were our
first focus, for the very reason that there were certain factions
behind the scenes of the Zimmerman/RSA agreement who seemed to
have an inordinate amount of interest in the subroutines being
chained to the algorithm (for reasons that have nothing to do
with patent protection).
Those whose expertise goes far beyond my own in this area look at
the initial results of the analysis as confirming that their is a
'relationship' between the RSA algorithm and the RSAREF subroutines
which will enable them to break the system down into workable
units for fairly quick analysis.
What is interesting is that the results from small probes into
other encryption systems show the same potential for exploitation
using varying analysis methodologies and processes.
(One fairly well-known encryption routine is almost lame enough
to reveal its secrets to anyone with a pencil and a stopwatch, as
well as the file size and time it takes to encrypt.)
While I would rather you didn't publicize the preceding information,
as a general rule, I think that is something that should be shared with
anyone who is seriously focusing their efforts on better methods of
encryption and analysis of encryption methodologies.
I am aware of two other groups who are working along the same lines,
although with a narrower range of variables than ourselves, and I am
certain that there must be more than a few other entities out there
who are also pursuing this line of research.