CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES March 2017 CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES

Total Page:16

File Type:pdf, Size:1020Kb

CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES March 2017 CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES CHALLENGING GOVERNMENT HACKING IN CRIMINAL CASES March 2017 CHALLENGING GOVERNMENT HACKING IN CRIMINAL CASES American Civil Liberties Union Electronic Frontier Foundation National Association of 125 Broad Street, 815 Eddy Street, Criminal Defense Lawyers New York, NY 10004 San Francisco, CA 94109 1660 L St. NW, 12th Floor, Washington, D.C. 20036 © 2017 ACLU Foundation © 2017 Electronic Frontier Foundation © 2017 National Association of Criminal Defense Lawyers Cover Image: Hugh D’Andrade ABOUT THE AUTHORS* AMERICAN CIVIL LIBERTIES UNION (ACLU) For nearly 100 years, the ACLU has been our nation’s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country. The ACLU takes up the toughest civil liberties cases and issues to defend all people from government abuse and overreach, and works to establish new privacy protections for our digital age of widespread government surveillance. With more than 2 million members, activists, and supporters, the ACLU is a nationwide organization that fights tirelessly in all 50 states, Puerto Rico, and Washington, D.C., for the principle that every individual’s rights must be protected equally under the law, regardless of race, religion, gender, sexual orientation, disability, or national origin. ELECTRONIC FRONTIER FOUNDATION (EFF) The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows. With roughly 37,000 active donors, EFF represents technology users’ interests in court cases and broader policy debates, including the debate about law enforcement “hacking.” EFF has worked to educate criminal defense attorneys and the courts about the threats to privacy posed by this surveillance technique, including filing amicus briefs in seven cases arising from the Playpen investigation. NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS (NACDL) The National Association of Criminal Defense Lawyers is the preeminent organization in the United States advancing the goal of the criminal defense bar to ensure justice and due process for persons charged with a crime or wrongdoing. NACDL’s core mission is to: Ensure justice and due process for persons accused of crime … Foster the integrity, independence and expertise of the criminal defense profession … Promote the proper and fair administration of criminal justice. Founded in 1958, NACDL has a rich history of promoting education and reform through steadfast support of America’s criminal defense bar, amicus curiae advocacy, and myriad projects designed to safeguard due process rights and promote a rational and humane criminal justice system. NACDL’s many thousands of direct members — and 90 state, local and international affiliate organizations totaling up to 40,000 members — include private criminal defense lawyers, public defenders, active U.S. military defense counsel, and law professors committed to preserving fairness in America’s criminal justice system. Representing thousands of criminal defense attorneys who know firsthand the inadequacies of the current system, NACDL is recognized domestically and internationally for its expertise on criminal justice policies and best practices. * Students in the Technology Law and Policy Clinic at NYU Law School, including David Krone and Charles Low, contributed to this report. ii CONTENTS INTRODUCTION 1 MALWARE: WHAT IS IT & WHAT CAN IT DO? 2 TOR AND THE DARK WEB: WHAT ARE THEY & HOW DO THEY RELATE TO LAW ENFORCEMENT’S USE OF MALWARE? 3 TYPES OF INFORMATION TARGETED BY MALWARE 5 EXISTING WATERING HOLE ATTACKS 6 HOW CAN YOU TELL IF THE GOVERNMENT USED MALWARE IN YOUR CASE? 7 AVAILABLE DISCOVERY REQUESTS 8 AVAILABLE LEGAL ARGUMENTS 9 FOURTH AMENDMENT ARGUMENTS 10 THE DEPLOYMENT OF A NIT ON A SUSPECT’S COMPUTER IS A SEARCH 10 SOME COURTS HAVE HELD THAT VISITING A CHILD PORNOGRAPHY SITE SUPPLIES PROBABLE CAUSE, BUT STRONGER CHALLENGES LIE IN OTHER CONTEXTS 11 NIT WARRANTS CAN BE CHALLENGED FOR LACKING PARTICULARITY 12 SPECIFICITY 12 OVERBREADTH 13 RULE 41(B) ARGUMENTS 14 NIT WARRANTS ISSUED BEFORE DECEMBER 1, 2016 15 NIT WARRANTS ISSUED ON OR AFTER DECEMBER 1, 2016 17 ARGUMENTS FOR SUPPRESSION 17 SEEKING AND RELYING UPON A WARRANT THAT EXCEEDS A MAGISTRATE JUDGE’S JURISDICTION IS IN BAD FAITH 17 SPECIAL LIMITS ON THE EXCLUSIONARY RULE FOR RULE 41(B) VIOLATIONS MAKE SUPPRESSION UNLIKELY ABSENT A FOURTH AMENDMENT VIOLATION 18 DUE PROCESS ARGUMENTS FOR DISMISSAL OF INDICTMENT 20 CONCLUSION 22 APPENDIX A: GLOSSARY 36 APPENDIX B: TABLE OF ORDERS ON MOTIONS TO SUPPRESS 38 APPENDIX C: SAMPLE BRIEFS AND LETTERS TO COMPEL DISCOVERY 43 FIRST SAMPLE MOTION AND EXHIBITS 44 GOVERNMENT’S OPPOSITION TO FIRST SAMPLE MOTION 72 DEFENDANT’S REPLY FOR FIRST SAMPLE MOTION AND EXHIBIT 102 DISCOVERY LETTER FOR FIRST SAMPLE MOTION 119 SECOND SAMPLE MOTION 121 THIRD SAMPLE MOTION 130 FOURTH SAMPLE MOTION AND EXHIBITS 137 INTRODUCTION In recent years, the government has increasingly turned to hacking as an investigative technique. Specifically, the Federal Bureau of Investigation (“FBI”) has begun deploying malware: software designed to infiltrate and control, disable, or surveil a computer’s use and activity. The government calls this type of hacking operation a “Network Investigative Technique,” or NIT. Law enforcement, and particularly the FBI, has been using malware to investigate online criminal activity since at least 2002.1 While the FBI initially limited malware attacks to individual computers, it has in recent years embraced a form of bulk hacking that enables small teams of agents to hack thousands of computers in a single operation, often on the basis of a single warrant issued by a single magistrate judge.2 The use of this controversial technique is driven in part by the increased availability and adoption of easy-to-use privacy-enhancing technologies, like Tor and Virtual Private Network (“VPN”) services, which allow individuals to shield their locations and identities online, and by the use of encryption, which allows individuals to protect the contents of their communications.3 Installing malware can enable the government to identify targets who use privacy-enabling software to hide their IP addresses, and thus their location or identity, or to access encrypted communications. To date, the best known and most frequently litigated form of government bulk hacking is a so-called “watering hole” operation, in which the government commandeers a website associated with criminal activity, continues to operate it, and uses the site to surreptitiously deliver malware to (possibly hundreds or thousands of) computers that connect to the site. The term derives from the concept of poisoning a watering hole where certain animals are known to drink. The government can deliver the malware through a link that a user clicks on, or by programming the malware to secretly install itself on a computer once a user visits a particular page. Unbeknownst to the user, the malware then takes partial control of the computer in order to search it and send identifying information, including the computer’s IP address, back to a law enforcement server. To obtain authorization to deploy malware, the FBI uses search warrants issued by magistrate judges pursuant to Rule 41 of the Federal Rules of Criminal Procedure.4 In several watering hole operations, the FBI has remotely searched thousands of computers located in districts around the country pursuant to a single search warrant—including, in the most recent known operation, searching more than 8,000 computers in 120 different countries.5 As of the date of publication, the legality of such government bulk hacking is being fiercely litigated in criminal cases across the country, giving rise to a quickly developing area of law. As information about law enforcement hacking has come to light, a number of federal judges have voiced concern about the legality of this technique, with some rejecting hacking warrant applications or suppressing evidence obtained by the FBI through the use of malware. This guide seeks to educate defense attorneys about these highly intrusive surveillance techniques and to help them prepare a zealous defense on behalf of their clients against secretive and potentially unlawful hacking. Such hacking has never been discussed by Congress, and we in no way endorse government hacking. However, given that the federal government is deploying malware and a recent amendment to Rule 41 only makes such deployment easier, it is our goal to ensure that all uses of malware are subject to meaningful Fourth Amendment analysis so that malware is installed only when supported by individualized suspicion. Our Fourth Amendment right to be free from unreasonable searches applies regardless of whether new technology is involved in effectuating a particular search; however, the law may be slow to catch up, particularly when the government goes to great lengths to hide details about its use of new surveillance techniques.6 In the following sections, we explain the technologies and terminologies that surround government malware,7 point out how to recognize the use of government malware in a criminal case, and outline the most
Recommended publications
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Online Media and the 2016 US Presidential Election
    Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Faris, Robert M., Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. 2017. Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election. Berkman Klein Center for Internet & Society Research Paper. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33759251 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA AUGUST 2017 PARTISANSHIP, Robert Faris Hal Roberts PROPAGANDA, & Bruce Etling Nikki Bourassa DISINFORMATION Ethan Zuckerman Yochai Benkler Online Media & the 2016 U.S. Presidential Election ACKNOWLEDGMENTS This paper is the result of months of effort and has only come to be as a result of the generous input of many people from the Berkman Klein Center and beyond. Jonas Kaiser and Paola Villarreal expanded our thinking around methods and interpretation. Brendan Roach provided excellent research assistance. Rebekah Heacock Jones helped get this research off the ground, and Justin Clark helped bring it home. We are grateful to Gretchen Weber, David Talbot, and Daniel Dennis Jones for their assistance in the production and publication of this study. This paper has also benefited from contributions of many outside the Berkman Klein community. The entire Media Cloud team at the Center for Civic Media at MIT’s Media Lab has been essential to this research.
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • API 101: Modern Technology for Creating Business Value a Guide to Building and Managing the Apis That Empower Today’S Organizations
    API 101: Modern technology for creating business value A guide to building and managing the APIs that empower today’s organizations WHITE PAPER WHITE PAPER API 101: Modern technology for creating business value Contents The modern API: What it is and why you need it 3 The conduit of digital ecosystems 3 The seismic change in the API landscape 3 iPaaS: A better way to build APIs 4 Quick API primer 4 A superior alternative 5 The API Integration Maturity Curve 5 Modern API management: Where are you on the maturity curve? 6 User profiles and requirements 6 How to determine API and management requirements 7 Overview of API creation and management requirements 8 From here to modernity: A checklist for API longevity 9 The components of a modern, manageable architecture 9 Case Study | TBWA Worldwide 10 SnapLogic: A unified integration platform 10 2 WHITE PAPER API 101: Modern technology for creating business value The modern API: What it is Digital deposits in consumer mobile banking provide a perfect example of a digital ecosystem in action. No longer and why you need it do customers need to trek to a branch office to deposit Application programming interface, or API as it’s universally a paper check. They can now open the bank app, take a referred to, is a technology almost as old as software itself, picture of the front and back of the check, specify the designed to allow data to flow between different applications. amount and, somewhat magically, money is transferred Today, modern APIs enable much more than inter-application into the customer’s account within a day.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance
    THE SPIES WE TRUST: THIRD PARTY SERVICE PROVIDERS AND LAW ENFORCEMENT SURVEILLANCE Christopher Soghoian Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the School of Informatics, Department of Computer Science Indiana University August 2012 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Geoffrey Fox, Ph.D. Committee (Principal Advisor) Markus Jakobsson, Ph.D. Fred Cate, J.D. May 1, 2012 Marc Rotenberg, J.D. ii Copyright c 2012 Christopher Soghoian This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States License. iii “The creatures outside looked from pig to man, and from man to pig, and from pig to man again; but already it was impossible to say which was which.” —GEORGE ORWELL,ANIMAL FARM iv Acknowledgements First, I would like to thank L. Jean Camp, who selflessly put herself at risk in order to save me from two extremely unpleasant encounters with the FBI. I will be indebted to her forever. I would also like to thank Stephen Braga and Jennifer Granick, two stellar attorneys who came to my defense in 2006 after the FBI took an interest in my work, raiding my home at 2AM and seizing my personal documents and computers. Their expert assistance led to the return of my possessions in just three weeks and the closing of the FBI’s criminal and TSA’s civil investigations without any charges filed. Jennifer Granick came to my assistance a second time (and was joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated me for using my government badge to attend a closed-door surveillance industry conference.
    [Show full text]
  • Torward: DISCOVERY, BLOCKING, and TRACEBACK of MALICIOUS TRAFFIC OVER Tor 2517
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 12, DECEMBER 2015 2515 TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor Zhen Ling, Junzhou Luo, Member, IEEE,KuiWu,Senior Member, IEEE, Wei Yu, and Xinwen Fu Abstract— Tor is a popular low-latency anonymous communi- I. INTRODUCTION cation system. It is, however, currently abused in various ways. OR IS a popular overlay network that provides Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we designed Tanonymous communication over the Internet for and implemented a novel system, TorWard, for the discovery and TCP applications and helps fight against various Internet the systematic study of malicious traffic over Tor. The system censorship [1]. It serves hundreds of thousands of users and can avoid legal and administrative complaints, and allows the carries terabyte of traffic daily. Unfortunately, Tor has been investigation to be performed in a sensitive environment such abused in various ways. Copyrighted materials are shared as a university campus. An intrusion detection system (IDS) is used to discover and classify malicious traffic. We performed through Tor. The black markets (e.g., Silk Road [2], an comprehensive analysis and extensive real-world experiments to online market selling goods such as pornography, narcotics validate the feasibility and the effectiveness of TorWard. Our or weapons1) can be deployed through Tor hidden service. results show that around 10% Tor traffic can trigger IDS alerts. Attackers also run botnet Command and Control (C&C) Malicious traffic includes P2P traffic, malware traffic (e.g., botnet servers and send spam over Tor.
    [Show full text]
  • Investing in Equitable News and Media Projects
    Investing in Equitable News and Media Projects Photo credit from Left to Right: Artwork: “Infinite Essence-James” by Mikael Owunna #Atthecenter; Luz Collective; Media Development Investment Fund. INVESTING IN EQUITABLE NEWS AND MEDIA PROJECTS AUTHORS Andrea Armeni, Executive Director, Transform Finance Dr. Wilneida Negrón, Project Manager, Capital, Media, and Technology, Transform Finance ACKNOWLEDGMENTS Farai Chideya, Ford Foundation Jessica Clark, Dot Connector Studio This work benefited from participation in and conversations at the Media Impact Funders and Knight Media Forum events. The authors express their gratitude to the organizers of these events. ABOUT TRANSFORM FINANCE Transform Finance is a nonprofit organization working at the intersection of social justice and capital. We support investors committed to aligning their impact investment practice with social justice values through education and research, the development of innovative investment strategies and tools, and overall guidance. Through training and advisory support, we empower activists and community leaders to shape how capital flows affect them – both in terms of holding capital accountable and having a say in its deployment. Reach out at [email protected] for more information. THIS REPORT WAS PRODUCED WITH SUPPORT FROM THE FORD FOUNDATION. Questions about this report in general? Email [email protected] or [email protected]. Read something in this report that you’d like to share? Find us on Twitter @TransformFin Table of Contents 05 I. INTRODUCTION 08 II. LANDSCAPE AND KEY CONSIDERATIONS 13 III. RECOMMENDATIONS 22 IV. PRIMER: DIFFERENT TYPES OF INVESTMENTS IN EARLY-STAGE ENTERPRISES 27 V. CONCLUSION APPENDIX: 28 A. ACKNOWLEDGMENTS 29 B. LANDSCAPE OF EQUITABLE MEDIA INVESTORS AND ADJACENT INVESTORS I.
    [Show full text]
  • Computer Science 161 Fall 2020 Weaver Misc Topics 2
    Computer Science 161 Fall 2020 Weaver Misc Topics 2 1 Pre Lecture Facepalm... From just a year ago! Computer Science 161 Fall 2020 Weaver Welcome to Hell Week.... Computer Science 161 Fall 2020 Weaver • Mental pressure of "Curl up in a ball with a rifle" vs "Pretend everything is normal" continues... • Highly likely Biden will be the winner: But we won't know for sure for another few days at least.... • Really a massive screwup: We should just have preliminary results announced on Friday at once for all states • Today is More Off Topic Stuff: • Nukes • Tor Hidden Services • Sidechannels 3 And Checking In With Everyone Again... How Are You on the Fauci Scale? Computer Science 161 Fall 2020 Weaver 4 The Interesting Problem: Limiting Use Computer Science 161 Fall 2020 Weaver • Who might use a nuke without authorization? • Our "allies" where we station our nukes • Original motivation: Nukes stored in Turkey and Greece • Someone who can capture a nuke • This is what sold the military on the need for the problem: We had nukes in Germany which would be overrun in case of a war with the USSR • Our own military • General Jack D Ripper scenario • The mandated solution: • Permissive Access Link (PAL) 5 Nuke Safety Features Computer Science 161 Fall 2020 Weaver • One-point safety – no nuclear yield from detonation of one explosive charge. • Strong link/weak link – • strong link provides electrical isolation; • weak link fails early under stress (heat, etc.) • Environmental sensors – detect flight trajectory. • Unique signal generator – digital signal used for coupling between stages. • Insulation of the detonators from electrical energy.
    [Show full text]