Interplanetary Error Propagation Program K66-15732

Total Page:16

File Type:pdf, Size:1020Kb

Interplanetary Error Propagation Program K66-15732 WDL-TR2184 f5 NOVEMBER 1963 GPU PRICE $ CFSTI PRICE(S) $ Hard copy (HC) Microfiche (MF> ^ • H653 July 65 PROGRAMMER'S MANUAL for Interplanetary Error Propagation Program K66-15732 (ACCESSION NUMBER) (NASA CR OR TMX OR AD NUMBER) CONTRACT NAS 5-3342 prepared for National Aeronautics and Space Administration joddard Space Flight Center ^reenbelt, Maryland PHILCO WDL DIVISION PALO ALTO. CALIFORNIA WDL-TR2184 15 November 1963 PROGRAMMER'S MANUAL FOR INTERPLANETARY ERROR PROPAGATION PROGRAM Prepared by PHILCO CORPORATION A Subsidiary of Ford MoCor Company WDL Division Palo Alto, California CONTRACT NAS 5-3342 Prepared for NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GODDARD SPACE FLIGHT CENTER Greenbelt, Maryland PHILCQ WDL DIVISION ABSTRACT WDL-TR2184 UNCLASSIFIED PROGRAMMER'S MANUAL FOR INTERPLANETARY ERROR PROPAGATION PROGRAM 420 pages 15 November 1963 NAS 5-3342 This report discusses the subroutines that are used in the Interplanetary Error Propagation Program. A narrative des- cription and card listing are provided for each subroutine; flow diagrams are included, if applicable. A listing of assigned locations in common is also presented. THIS UNCLASSIFIED ABSTRACT IS DESIGNED FOR RETENTION IN A STANDARD 3-BY-5 CARD-SIZE FILE, IF DESIRED WHERE THE ABSTRACT COVERS MORE THAN ONE SIDE OF THE CARD, THE ENTIRE RECTANGLE MAY BE CUT OUT AND FOLDED AT THE DOTTED CENTER LINE (IF THE ABSTRACT IS CLASSIFIED, HOWEVER, IT MUST NOT BE REMOVED FROM THE DOCUMENT IN WHICH IT IS INCLUDED ) PHILCQ WDL DIVISION WDL-TR2184 FOREWORD This report is submitted to the National Aeronautics and Space Administration, Goddard Space Flight Center, in fulfilling the require- ments of Contract NAS 5-3342. The documentation provided by Philco WDL in support of the Interplane- tary Error Propagation Program consists of the following three volumes: • WDL-TR2184, "Programmer's Manual for Interplanetary Error Propagation Program" • WDL-TR2185S "User's Manual for Interplanetary Error Propagation Program" 9 Guidance and Control System Engineering Department Technical Report No. 48" The application of State Space Methods to Navigation Problems," by Stanley F. Schmidt These volumes discusse the theory of the Schmidt-Kalman filter used in the program for data smoothing, the manner in which the program is used, and subroutine description and listing. -iii- 'HILCQ WDL DIVISION Page intentionally left blank WDL-TR2184 TABLE OF CONTENTS Section Page 1 INTRODUCTION 1-1 1. 1 General . 1-1 ... 1-1 Main Chains MAIN(Chain 1) M-3 MAIN(Chain 2) M-13 MAIN(Chain 3) M-19 Subroutine Listing ARKTAN S-3 ARKTNS S-5 ASINH S-7 BODY S-9 BVEC S-15 CHNGP S-23 COMPHQ S-27 CONST! S-41 CONVPI S-51 CORRTP S-63 CROSS S-67 (CSH)S S-69 DE6FN S-71 DOT S-117 EARTR S-119 ECLIP S-145 ENCKE S-147 ERP S-151 ERPT S-153 FINP S-155 FNORM S-173 -v- »HILCQ WDL DIVISION WDL-TR2184 TABLE OF CONTENTS (Cont'd) Section Paee Subroutine Listing (Cont'd) GHA S-175 GOTOB S-179 GOTOR S-197 GUID S-203 HOUR S-217 HPHT S-221 INPUT S-223 INTR.INTRI S-231 INV3 S-245 INVAO S-249 LOADO S-251 LOADT S-253 MASS S-255 MATRX S-259 MATSUB S-261 MNA S-267 MNAND S-273 MONBTR S-277 MULT S-285 NUTAIT S-287 OBLN S-295 ONBTR S-303 ORTC S-307 OUTC S-311 OUTDAT S-321 OUTP S-325 PTRAN S-338 RETRO S-341 ROTATE S-347 ROTEQ S-349 RVIN S-355 -vi- PHILCQ WDL DIVISION WDL-TR2184 TABLE OF CONTENTS (Cont'd) Section Subroutine Listing (Cont'd) RVOUT S-361 SDEC S-365 SETN S-369 SHIFTP S-371 STEPC S-375 TIMEC S-391 TIMED S-395 TRAC S-397 TRANSH S-403 LIST OF TABLES Number Page 1-1 List of Assigned Quantities in Common "C" Array T . 1-3 1-2 List of Assigned Quantities in Common "S" Array 1-6 1-3 List of Assigned Quantities in Common "1C" Array 1-12 1-4 List of Assigned Quantities in Common "T" Array 1-15 -vii- PHILCQ WDL DIVISION Page Intentionally Left Blank WDL-TR2184 PROGRAM SUBROUTINE LISTING ARKTNS Single Precision Arctangent ARKTAN Double Precision Arctangent ASINH(X) Function Evaluation BODY Calculates Accelerations Due to Perturbing Bodies BVEC Calculates B Vector CHNGP Determines when to Shift Body Center COMPHQ Computations for ONBTR and MONBTR Subroutines CONST1 Array of Input Constants CONVPI Converts Input Covariance Matrix to 1950 CORRTP Updates P Matrix CROSS Cross Product (CSH)S Fortran II Card Image Input Subroutine DE6FN Fapclmtegfation ,SubroGtine' u DOT Function Forming Dot Product EARTR Updates Covariance Matrix for Earth Based Tracking KCLIP Transforms Coordinates through Transformations ENCKE Calculates Perturbation due to Deviation from CONIC ERP Prints Out Ephemeris Error ERPT Prints Out Time of Ephemeris Error FINP Data Input Subroutine FNORM Norm of A Vector GHA Greenwich Hour Angle GOTOB Main Subroutine for Integration of Trajectories GOTOR Iterates to Solve Keplers Equation GUID Performs Guidance Calculations HOUR Reads Printer Clock HPHT Performs Matrix Multiplication H*P*HT INPUT Converts Inputs to Equinox of 1950 Reference INTR FAP Ephemeris Subroutine INV3 Inverts Up to a 6 By 6 Matrix INVAO Forms Inverse of Transistion Matrix LOADO Obtains Transition Matrix From T Array -ix- WDL DBVBSION WDL-TR2184 LOADT Puts Unit ICS On Perturbation Equations MASS Arranges Gravitational Constants of Bodies Considered MATRX Multiplies A*B=C or A*B*AT=C Max Dimension (10.10) MATSUB Error Propagation Logic Subroutine MNA Transformation to Selenocenic.. Coordinates MNAND Transformation for Selenocenic Velocities MONBTR Updates Covariance Matrix for Moon Beacons MULT Multiplies Two 3 by 3 Matrices NUTAIT Calculates Nutation Matrix OBLN Calculates Acceleration Due to Oblateness ONBTR Updates Covariance Matrix for Onboard Tracking ORTC Outputs Orbital Parameters OUTC Outputs Trajectory OUTDAT Outputs Calendar Date OUTP Outputs RMS Values of Orbital Parameters PTRAN Transforms P Matrix RETRO Performs Retro Fire ROTATE Calculates Transformation for Rotation About an Axis ROTEQ Calculates Matrix from Equinox 1950 to Mean Equinox of Date RVIN Transforms Coordinates From Spherical to Cartesian RVOUT Transforms Coordinates from Cartesian to Spherical SDEC Second Derivative Subroutine SETN Set Read and Write Tape Numbers SHIFTP Shifts Body Center STEPC Move Along Conic in Time TIMEC Converts Calendar Date to Days from 1950 TIMED Converts Days Hours Min Sec to Seconds TRAC Tracking Station -Coordinates TRANSH Transforms H Matrix From Date to 1950 -x- PHILCO WDL DIVISION WDL-TR2184 PROGRAMMER'S MANUAL FOR INTERPLANETARY ERROR PROPAGATION PROGRAM WDL DIVISION WDL-TR2184 SECTION 1 INTRODUCTION 1.1 GENERAL This manual contains subroutine descriptions, logic, and FORTRAN listings for the Interplanetary Error Propagation Program. Listings of the quantities which are in the four common storage arrays (T,S,C, and 1C) are also included. 1.2 GENERAL DESCRIPTION OF METHOD OF ORBIT DETERMINATION USED IN PROGRAM The classical approach to the determination of an orbit from tracking data is the maximum likelihood, least-squares technique. This program uses a different approach to this problem. The relationships between the observed tracking data and the initial conditions (or an equivalent set of parameters) which determine the orbit are highly nonlinear. Therefore, it is assumed that a preliminary estimate of the initial conditions and, therefore, the orbit, is known. The equations are then linearized about this "nominal" orbit and an adjustment to the nominal orbit found from the differences between the observed tracking data and the predicted tracking data based on the nominal orbit. In the least-squares technique, the data is pro- cessed in parallel in the sense that the normal equations are summed over all the available tracking data before a modification to the nominal orbit is determined. The Schmidt-Kalman technique differs from the classical least-squares approach in two ways: first, the estimate used is based upon the mini- mization of a risk function different from that used in the least-squares approach and, second, the data is processed serially instead of in parallel. The Schmidt-Kalman technique depends upon a linearization of the relations between the orbit parameters and the observed tracking data. Therefore, it assumes some nominal trajectory and an associated error estimate (covariance matrix) for the nominal trajectory. 1-1 PHILCQ WDL DIVISION WDL-TR2184 CrNF-RAL TLOW PIIAOPAM Or OVf-RAI.l. ERROR PROPAGATION PROGRAM Mft.t, n MM i r ' " ' i ARE 1 1 ".',';',' IS TIMS A UIDANCE YES CALL CALL I Jl 1 ~ * ^ i --» „,,..,, • '-' ^ ' GOTOB |~~*! CHAIN 2 ~| ' TO oE I "/"* cOMPUTEO 1 | NO NO 4 1 1 | , GOTOB INTE- GRATES TRAJECTORY TO TARGET TO OUTAIN GUIDANCE MATRIX MAIN CHAIN I MAIN CHAIN 3 r -i r 1 1 t.FI 1)1' 1 1 ^ ; ROf.HAM CALL , CALL CALI 1 | FOR ERROR O'AIN 3 1 1 GOTOB CHAIN 1 | I PROrAGATlON HUN 1 1 L_ II _ | MATSUB GOT OR i r~ "*" ~i r~ | READ PROPAGATE GOTOB 1 COVARI'iNCE DATA MATRICES CARDS IN TIME J SET UP MATSU- R CALL INT, SEQUENCE CALL AND TYPE EARTR MEASUREMENTS REfNG MADE CALL ONPTR CONTROL INTEORAT'ON 1 — -• TACKACE TO PERMIT CAI 1 CAI 1. OF MAT'jim ,. CAI 1 c-uin CALL MAT '",11 >? — ' | i 1 Figure 1-1 1-2 PHILCO NA/DL DIVISION WDL-TR2184 The serial processing of the tracking data and associated updating of the nominal orbit occurs as follows: At the start of the time period for which tracking data are to be processed and an improved estimate of the orbit is to be obtained, it is assumed that an estimate of the orbit (a set of state variables) and an error estimate exist. Both of these estimates are updated to an instant of time when tracking data are available.
Recommended publications
  • A Generic Data Exchange System for F2F Networks
    The Retroshare project The GXS system Decentralize your app! A Generic Data Exchange System for F2F Networks Cyril Soler C.Soler The GXS System 03 Feb. 2018 1 / 19 The Retroshare project The GXS system Decentralize your app! Outline I Overview of Retroshare I The GXS system I Decentralize your app! C.Soler The GXS System 03 Feb. 2018 2 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows, (+ Android). C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows.
    [Show full text]
  • Zeronet Presentation
    ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network. ABOUT ZERONET Why? Current features We believe in open, free, and ◦ Real-time updated sites uncensored network and communication. ◦ Namecoin .bit domain support ◦ No hosting costs ◦ Multi-user sites Sites are served by visitors. ◦ Password less, Bitcoin's BIP32- ◦ Impossible to shut down based authorization It's nowhere because it's ◦ Built-in SQL server with P2P data everywhere. synchronization ◦ No single point of failure ◦ Tor network support Site remains online so long as at least 1 peer serving it. ◦ Works in any browser/OS ◦ Fast and works offline You can access the site even if your internet is unavailable. HOW DOES IT WORK? THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: Private key Public key 5JNiiGspzqt8sC8FM54FMr53U9XvLVh8Waz6YYDK69gG6hso9xu 16YsjZK9nweXyy3vNQQPKT8tfjCNjEX9JM ◦ Only you have it ◦ This is your site address ◦ Allows you to sign new content for ◦ Using this anyone can verify if the your site. file is created by the site owner. ◦ No central registry ◦ Every downloaded file is verified, It never leaves your computer. makes it safe from malicious code inserts or any modifications. ◦ Impossible to modify your site without it. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) 1 Gathering visitors IP addresses: Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ..
    [Show full text]
  • Recognition and Investigation of Listening in Anonymous Communication Systems 1 K
    AEGAEUM JOURNAL ISSN NO: 0776-3808 Recognition and investigation of listening in anonymous communication systems 1 K. Balasubramanian, 2 Dr. S. Kannan, 3 S. Sharmila 1Associate Professor, Department of CSE, E.G.S Pillay Engineering College, Nagapattinam, Tamil Nadu, India. Email: [email protected] 2, Professor, Department of CSE, E.G.S Pillay Engineering College, Nagapattinam, Tamil Nadu, India. 3, P.G Student, Department of CSE, E.G.S Pillay Engineering College, Nagapattinam, Tamil Nadu, India. Abstract components through which client activity is steered can Mysterious correspondence systems similar to listen in and get delicate information, for example, user Tor, mostly secure the secrecy of client activity by verification qualifications. This circumstance can scrambling all interchanges inside the overlay system. conceivably decline when clients utilize intermediary based frameworks to get to similar administrations However, when the transferred activity achieves the without utilizing end-to-end encryption, as the quantity limits of the system, toward its end, the first client of hosts or hubs that can listen stealthily on their activity is definitely presented to the last node on the movement increments. Different open and private path. Accordingly, users sending sensitive information, systems may square access to interpersonal interaction similar to verification accreditations, over such and other prominent online administrations for systems, risk having their information between different reasons. Under these conditions, users accepted and uncovered, unless end-to-end encryption regularly depend on utilizing disseminated proxying frameworks to prevent their activity from being is utilized. Listening can be performed by malicious or filtered. They fall back on such mechanisms so as to compromised relay nodes, and additionally any rebel evade system activity filtering in light of source, goal, arrange substance on the way toward the actual end.
    [Show full text]
  • BRKSEC-2011.Pdf
    #CLUS About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 #CLUS Me… CCIE Security #14390, CISSP & Motorboat driving license… Working in Content Security & TLS Security tmayer{at}cisco.com Writing stuff at “blogs.cisco.com” #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Agenda • Why anonymization? • Using Tor (Onion Routing) • How Tor works • Introduction to Onion Routing • Obfuscation within Tor • Domain Fronting • Detect Tor • I2P – Invisible Internet Project • Introduction to Garlic Routing • Conclusion #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2011 by the speaker until June 18, 2018. #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Different Intentions Hide me from Government! Hide me from ISP! Hide me from tracking! Bypass Corporate Bypass Country Access Hidden policies restrictions (Videos…) Services #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Browser Identity Tracking does not require a “Name” Tracking is done by examining parameters your browser reveals https://panopticlick.eff.org #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Proxies EPIC Browser #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates.
    [Show full text]
  • Timing Attack on I2P Web Servers
    Timing attack on I2P web servers Degree programme : BSc in Computer Science | Specialisation : IT Security Thesis advisor : Prof. Dr. Emmanuel Benoist Expert : Thomas Jäggi (GIBB Gewerblich Industrielle Berufsschule Bern) The Invisible Internet Protocol I2P is an anonymous peer to peer network. It promises discretion to its participants, both in hosting and browsing the I2P-websites called Eepsites. The goal of this thesis is to prove the feasibi- lity of a timing attack on the I2P-network, which allows deanonymizing the hosts of certain Eepsites. Invisible Internet Protocol - I2P Timing Attack The I2P-network creates connections between two The attack consists of two parts. Collecting data and nodes using so-called tunnels. Each node has various analysing that data. inbound- and outbound-tunnels. Every tunnel consists By checking for a response every hour, we monitored of multiple nodes. A er con guring the system, a cli- the up- and downtime of a considerable amount of ent can access an Eepsite over the browser, by simply Eepsites and nodes, over a few months. We saved the entering the domain name of the desired Eepsite (e.g. results to a database for later analysis. mud.i2p). The I2P-Protocol will then look for a match- ing entry inside the netDB. The netDB is a distributed For every pair of Eepsite and node, we compare the database containing the domain and corresponding up- and downtime and repeat this for all timestamps. tunnel gateways. We then calculate the ratio between matching times- Janek Bobst By connecting an outbound tunnel of the client with tamps vs total timestamps.
    [Show full text]
  • Unveiling the I2P Web Structure: a Connectivity Analysis
    Unveiling the I2P web structure: a connectivity analysis Roberto Magan-Carri´ on,´ Alberto Abellan-Galera,´ Gabriel Macia-Fern´ andez´ and Pedro Garc´ıa-Teodoro Network Engineering & Security Group Dpt. of Signal Theory, Telematics and Communications - CITIC University of Granada - Spain Email: [email protected], [email protected], [email protected], [email protected] Abstract—Web is a primary and essential service to share the literature have analyzed the content and services offered information among users and organizations at present all over through this kind of technologies [6], [7], [2], as well as the world. Despite the current significance of such a kind of other relevant aspects like site popularity [8], topology and traffic on the Internet, the so-called Surface Web traffic has been estimated in just about 5% of the total. The rest of the dimensions [9], or classifying network traffic and darknet volume of this type of traffic corresponds to the portion of applications [10], [11], [12], [13], [14]. Web known as Deep Web. These contents are not accessible Two of the most popular darknets at present are The Onion by search engines because they are authentication protected Router (TOR; https://www.torproject.org/) and The Invisible contents or pages that are only reachable through the well Internet Project (I2P;https://geti2p.net/en/). This paper is fo- known as darknets. To browse through darknets websites special authorization or specific software and configurations are needed. cused on exploring and investigating the contents and structure Despite TOR is the most used darknet nowadays, there are of the websites in I2P, the so-called eepsites.
    [Show full text]
  • Guide to Retroshare Tor Or I2P Routing Update Some Quick Notes To
    A Guide to Retroshare Tor or I2P routing Update Some quick notes to supplement the existing Help Guides for setting up Retroshare Regular and Hidden Nodes routed via Tor and/or I2P. Snapshot in this update 1) Point out the torrc exit node command is not needed for Regular and Hidden Node Retroshare Tor routing with torrc examples. 2) Steps, guides for setting up multiple Tor binary folders each using a different Socks Port for concurrent TorS applications to enable different specific listening ports, Tor proxys. 3) Guide for setting up a I2P 4/4a/5 client tunnel and need to turn off unused I2P default tunnels. Retroshare Regular nodes using the optional Tor proxy client does not need nor use any Tor Exit Nodes. Unless you are using the same Tor binary for applications which require a Exit Node to clearnet such as with a FeedReader RSS server or website, do not include Exit Node commands in your Tor torrc file. Retroshare Regular Node using the optional Tor Proxy client Working Torrc Example (adjust the file paths for your needs, system) # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamedm to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6 SocksPort 9050 Retroshare Hidden nodes routed solely to and inside the Tor Network should not have any Exit Node commands in your Tor torrc file. Working example of a Retroshare Hidden node operating as a Tor Hidden Service torrc file # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamed to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6i HiddenServiceDir /home/name/hideserv HiddenServicePort 11040 127.0.0.1:13080 SocksPort 9050 Running Multiple concurrentt applications routing each through the tor network as a Tor proxy client or as a Tor hidden service.
    [Show full text]
  • Hidden Retroshare Nodes Routed Via Tor Or I2P For
    A Hidden Retroshare Nodes routed via Tor or I2P For Hidden Retroshare Nodes routed via Tor Using only the Tor binary system file for a Hidden Node RetroShare 0.6 thru Tor as a Hidden Service Configuration. The use of the system files Tor binaryS alone (not using Vidalia) is termed 'Expert' level by the Tor project developers. Administrative (Windows) or Root/Superuser (Linux) level permissions are needed and used to access, read, write the resulting torrc updates and Hidden Service files. The following steps will help you accomplish this but at this Tor user level you should already know how to proceed step by step in this Tor level if you go this route. Although the sole use of the tiny systems file binary is considered expert level, its not difficult for most computer savy users and administrators to follow the following examples and successfully apply them on their Windows,Linux,Mac systems with few changes from the examples provided here. Install the newest Tor binary onto your system files using the following reference links. Many Linux repository’s have the Tor binary also but it can be very old. Suggest getting it from torproject.org If you already have the tor binary installed then skip this initial step. m Tor Binary Only Downloads from Torprojet.org Windows https://www.torproject.org/download/download.html.en Windows https://www.torproject.org/dist/torbrowser/4.0.3/tor-win32-tor-0.2.5.10.zip Unix,Linux, BSD https://www.torproject.org/download/download-unix.html.en Source Tarball https://www.torproject.org/download/download.html.en If you select to build the newest Tor Binary from the torproject.org Source Code To build the Tor source binary don't use ./configure && make && src/or/tor Instead break this into separate stepped commands $ ./configure $ make $ sudo make install From Linux Ubuntu PPA sudo add-apt-repository ppa:ubun-tor/ppai sudo apt-get update sudo apt-get install tor tor-geoipdb Test for system Tor binary versiont tor --version Tor version 0.2.5.10 <-- Should be the same or newer.
    [Show full text]
  • Untraceable Links: Technology Tricks Used by Crooks to Cover Their Tracks
    UNTRACEABLE LINKS: TECHNOLOGY TRICKS USED BY CROOKS TO COVER THEIR TRACKS New mobile apps, underground networks, and crypto-phones are appearing daily. More sophisticated technologies such as mesh networks allow mobile devices to use public Wi-Fi to communicate from one device to another without ever using the cellular network or the Internet. Anonymous and encrypted email services are under development to evade government surveillance. Learn how these new technology capabilities are making anonymous communication easier for fraudsters and helping them cover their tracks. You will learn how to: Define mesh networks. Explain the way underground networks can provide untraceable email. Identify encrypted email services and how they work. WALT MANNING, CFE President Investigations MD Green Cove Springs, FL Walt Manning is the president of Investigations MD, a consulting firm that conducts research related to future crimes while also helping investigators market and develop their businesses. He has 35 years of experience in the fields of criminal justice, investigations, digital forensics, and e-discovery. He retired with the rank of lieutenant after a 20-year career with the Dallas Police Department. Manning is a contributing author to the Fraud Examiners Manual, which is the official training manual of the ACFE, and has articles published in Fraud Magazine, Police Computer Review, The Police Chief, and Information Systems Security, which is a prestigious journal in the computer security field. “Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author.
    [Show full text]
  • Monitoring the I2P Network Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier
    Monitoring the I2P network Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier To cite this version: Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier. Monitoring the I2P network. [Research Report] RR-7844, INRIA. 2011. hal-00653136 HAL Id: hal-00653136 https://hal.inria.fr/hal-00653136 Submitted on 18 Dec 2011 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Monitoring the I2P network Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor N° 7844 — version 1 initial version October 2011 — revised version Décembre 2011 Domaine 2 apport de recherche ISSN 0249-6399 ISRN INRIA/RR--7844--FR+ENG Monitoring the I2P network Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor Domaine : Algorithmique, programmation, logiciels et architectures Equipe-Projet´ madynes Rapport de recherche n° 7844 | version 1 | initial version October 2011 | revised version D´ecembre 2011 | 15 pages Abstract: We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through a one week long experiment the ability of the system identify a significant number of all running applications, among web servers and file- sharing clients.
    [Show full text]
  • The Gnunet System Christian Grothoff
    The GNUnet System Christian Grothoff To cite this version: Christian Grothoff. The GNUnet System. Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017. tel-01654244 HAL Id: tel-01654244 https://hal.inria.fr/tel-01654244 Submitted on 3 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License 1 Th`esed'habilitation `adiriger des recherches Universit´eede Rennes 1 Mention: Informatique The GNUnet System Christian Grothoff Soutenue le 10 octobre 2017 devant le jury compos´ede Messieurs les Professeurs: Anne-Marie Kermarrec (Universit´ede Rennes 1) Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Joe Cannataci (University of Groningen) Saddek Bensalem (University of Grenoble) Au vu des rapports de Messieurs les Professeurs: Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Saddek Bensalem (University of Grenoble) Revision 1.0 2 Abstract GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old inse- cure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and ap- plications towards the creation of a GNU internet.
    [Show full text]
  • Measuring I2P Censorship at a Global Scale
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]