Help I Am an Investigative Journalist in 2017

Total Page:16

File Type:pdf, Size:1020Kb

Help I Am an Investigative Journalist in 2017 Help! I am an Investigative Journalist in 2017 Whistleblowers Australia Annual Conference 2016-11-20 About me • Information security professional Gabor Szathmari • Privacy, free speech and open gov’t advocate @gszathmari • CryptoParty organiser • CryptoAUSTRALIA founder (coming soon) Agenda Investigative journalism: • Why should we care? • Threats and abuses • Surveillance techniques • What can the reporters do? Why should we care about investigative journalism? Investigative journalism • Cornerstone of democracy • Social control over gov’t and private sector • When the formal channels fail to address the problem • Relies on information sources Manning Snowden Tyler Shultz Paul Stevenson Benjamin Koh Threats and abuses against investigative journalism Threats • Lack of data (opaque gov’t) • Journalists are imprisoned for doing their jobs • Sources are afraid to speak out Journalists’ Privilege • Evidence Amendment (Journalists’ Privilege) Act 2011 • Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 Recent Abuses • The Guardian: Federal police admit seeking access to reporter's metadata without warrant ! • The Intercept: Secret Rules Makes it Pretty Easy for the FBI to Spy on Journalists " • CBC News: La Presse columnist says he was put under police surveillance as part of 'attempt to intimidate’ # Surveillance techniques Brief History of Interception First cases: • Postal Service - Black Chambers 1700s • Telegraph - American Civil War 1860s • Telephone - 1890s • Short wave radio -1940s / 50s • Satellite (international calls) - ECHELON 1970s Recent Programs (2000s - ) • Text messages, mobile phone - DISHFIRE, DCSNET, Stingray • Internet - Carnivore, NarusInsight, Tempora • Services (e.g. Google, Yahoo) - PRISM, MUSCULAR • Metadata: MYSTIC, ADVISE, FAIRVIEW, STORMBREW • Data visualisation: XKEYSCORE, BOUNDLESSINFORMANT • End user device exploitation: HAVOK, FOXACID So how I can defend myself? Data Protection 101 •Encrypt sensitive data* in transit •Encrypt sensitive data* at rest * Documents, text messages, voice calls etc. Old Times • Ancient history: Caesar cipher, Polybus square, Scytale cipher • 15th century: Vigenére cipher, Cipher disk, Cipher square • 17th century: Jefferson disk cipher • 20th century: One-time pads, Rotor machines (Enigma, Lorenz) Lorenz SZ42 Modern Uses • PGP (1991), PGPfone • Disk encryption: (1995) TrueCrypt (2004), BitLocker • HTTPS (1994) • End-to-end encryption (2010s) • OpenVPN (2001), IPSEC (1995) • Signal, ChatSecure • Tor (2002) • Messenger, WhatsApp, Google Allo • Skype (2003, early days) How all this applies to an investigative journalist? Data Protection 101 • Encrypt sensitive data* in transit • Encrypt sensitive data* at rest * Documents, text messages, voice calls etc. Encrypt the Data in Transit • Web: HTTPS, • Group chat (e2ee): DuckDuckGo Semaphor, • Email: PGP ClearChat, Crypho • Text and voice calls (e2ee): • Video calls (e2ee): Signal, Threema Wire, Tox.im Encrypt the Data at Rest • Local hard-disks and USB drives • macOS: FileVault, Windows: BitLocker, Linux: LUKS • Cloud file storage • Zero-knowledge services: Sync.com, TresorIt, SpiderOak Data Protection 101 •Encrypt sensitive data* in transit •Encrypt sensitive data* at rest * Documents, text messages, voice calls etc. ???? What did we miss? Why? • Metadata retention • State sponsored hacking What about metadata? • Mass collection • Retained for 2 years • Links you to the information source • Easy to apply link analysis IBM i2 Analyst's Notebook What about gov’t hacking? Tailored Access Operations (TAO) • Backdooring routers, switches, and firewalls • Backdooring laptops purchased online • Backdooring your laptop by phishing • Backdooring your laptop by exploits (“FOXACID”) On a Security Conference How all this applies to an investigative journalist? Round 2 Data Protection 101 (for journalists!) • Encrypt sensitive data in transit • Encrypt sensitive data at rest • Work in a secure environment (i.e write articles and communicate with info sources) • Hide the metadata • Compartmentalise your work • Solve the first contact problem Secure environment Work on a device that is free of backdoors: • Anonymity: Tails operating system • Security: Qubes OS • Security & Anonymity: Qubes OS + Whonix Hide that metadata Chat: • Ricochet IM File Exchange: • OnionShare Compartmentalise Limits the damage done when you are hacked Compartmentalise (cont’d) • Separate laptop for research & comms • One email address per source • One USB drive per source • Unique password on any website First contact problem • Allow information sources contact you anonymously • SecureDrop • GlobaLeaks Two actually … A word on smartphones Your phone is a spying machine: • Doesn’t matter what model it is • Leave your phone at home The most secure tool •Pen •Paper Wrapping it up Security and privacy is hard… • Surveillance is very sophisticated as technology has advanced • Metadata retention practices and data mining technologies will link you to the info source • The Peeping Toms are on your smartphone and laptop …but not hopeless • Encrypt everything • Compartmentalise • Use a secure • Leave your operating system smartphone home • Use pen and paper • Solve the first contact • Hide the metadata problem Further info • Tweet me on @gszathmari • CryptoAUSTRALIA (soon): https://cryptoaustralia.org.au • Join a CryptoParty: https://cryptoparty.in/sydney • https://www.privacytools.io • https://prism-break.org • https://privacyforjournalists.org.au Questions? Sources • The History of Information Security: A Comprehensive Handbook • https://en.wikipedia.org/wiki/Cabinet_noir • http://blogs.lse.ac.uk/mediapolicyproject/2016/02/15/a-very-brief-history-of-interception/ • https://inforrm.wordpress.com/2016/02/21/a-very-brief-history-of-interception-in-the-britain-bernard-keenan/ • https://en.wikipedia.org/wiki/List_of_government_mass_surveillance_projects • http://www.computerworld.com/article/2476515/network-security/the-security-flaws-in-tails-linux-are-not-its-only-problem.html • https://freedom.press/blog/2014/04/operating-system-can-protect-you-even-if-you-get-hacked • https://www.theguardian.com/world/2016/apr/14/federal-police-admit-seeking-access-to-reporters-metadata-without-warrant • https://www.techdirt.com/articles/20160829/06300835377/australian-government-using-data-retention-law-to-seek-out-journalists-sources-hunt-down-whistleblowers.shtml • https://theintercept.com/2016/06/30/secret-rules-make-it-pretty-easy-for-the-fbi-to-spy-on-journalists/ • http://www.cbc.ca/news/canada/montreal/journalist-patrick-lagace-police-surveillance-spying-1.3828832 • https://en.wikipedia.org/wiki/Telephone_tapping • http://www.nytimes.com/2015/03/01/nyregion/a-short-history-of-wiretapping.html.
Recommended publications
  • Online Media and the 2016 US Presidential Election
    Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Faris, Robert M., Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. 2017. Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election. Berkman Klein Center for Internet & Society Research Paper. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33759251 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA AUGUST 2017 PARTISANSHIP, Robert Faris Hal Roberts PROPAGANDA, & Bruce Etling Nikki Bourassa DISINFORMATION Ethan Zuckerman Yochai Benkler Online Media & the 2016 U.S. Presidential Election ACKNOWLEDGMENTS This paper is the result of months of effort and has only come to be as a result of the generous input of many people from the Berkman Klein Center and beyond. Jonas Kaiser and Paola Villarreal expanded our thinking around methods and interpretation. Brendan Roach provided excellent research assistance. Rebekah Heacock Jones helped get this research off the ground, and Justin Clark helped bring it home. We are grateful to Gretchen Weber, David Talbot, and Daniel Dennis Jones for their assistance in the production and publication of this study. This paper has also benefited from contributions of many outside the Berkman Klein community. The entire Media Cloud team at the Center for Civic Media at MIT’s Media Lab has been essential to this research.
    [Show full text]
  • Electronic Communications Surveillance
    Electronic Communications Surveillance LAUREN REGAN “I think you’re misunderstanding the perceived problem here, Mr. President. No one is saying you broke any laws. We’re just saying it’s a little bit weird that you didn’t have to.”—John Oliver on The Daily Show1 The government is collecting information on millions of citizens. Phone, Internet, and email habits, credit card and bank records—vir- tually all information that is communicated electronically is subject to the watchful eye of the state. The government is even building a nifty, 1.5 million square foot facility in Utah to house all of this data.2 With the recent exposure of the NSA’s PRISM program by whistleblower Edward Snowden, many people—especially activists—are wondering: How much privacy do we actually have? Well, as far as electronic pri- vacy, the short answer is: None. None at all. There are a few ways to protect yourself, but ultimately, nothing in electronic communications is absolutely protected. In the United States, surveillance of electronic communications is governed primarily by the Electronic Communications Privacy Act of 1986 (ECPA), which is an extension of the 1968 Federal Wiretap act (also called “Title III”) and the Foreign Intelligence Surveillance Act (FISA). Other legislation, such as the USA PATRIOT Act and the Communications Assistance for Law Enforcement Act (CALEA), sup- plement both the ECPA and FISA. The ECPA is divided into three broad areas: wiretaps and “electronic eavesdropping,” stored messages, and pen registers and trap-and-trace devices. Each degree of surveillance requires a particular burden that the government must meet in order to engage in the surveillance.
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It
    The FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It PETER J. GEORGITON* Much controversy has arisen over the FBI's proposal to use an e-mail and Internet surveillanceprogram, named "Carnivore," to assist its law enforcement efforts on the Information Superhighway. In this note, the authorexamines how Carnivoreoperates and its implicationsfor individuals 'privacy rights under the Fourth Amendment and the Electronic Communications Privacy Act of 1986 (ECPA). The author concludes that the current state of constitutional and statutory law governing electronicsurveillance indicates that the FBI can utilize Carnivore to conduct a wide range of intrusive searches with little or no legal justification. Carnivore'sability to retrieve more than mere e-mail messages of suspects, the FBI's checkered past on privacy issues, and the lack ofjudicial oversight make the potentialfor abuse of Carnivoregreat. As a result, Congress must take a hard look at both the ECPA and Carnivore to prevent law enforcement agenciesfrom using Carnivore to peer into our personal e-mails and Internet usage. Whether he wrote DOWN WITH BIG BROTHER, or whether he refrainedfrom writing it, made no difference.... The Thought Police would get him just the same. He had committed-would still have committed, even ifhe had never set pen to paper-the essential crime that contained all others in itself Thoughtcrime, they called it. Thoughtcrime was not a thing that could be concealedforever. You might dodge successfully for a while, even for years, but sooner or laterthey were bound to get you.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Independent Technical Review of the Carnivore System Final Report
    Contract No. 00-C-0328 IITRI CR-030-216 Independent Technical Review of the Carnivore System Final Report 8 December 2000 Contract No. 00-C-0328 IITRI CR-030-216 Independent Review of the Carnivore System Final Report Prepared by: Stephen P. Smith J. Allen Crider Henry H. Perritt, Jr. Mengfen Shyong Harold Krent Larry L. Reynolds Stephen Mencik 8 December 2000 IIT Research Institute Suite 400 8100 Corporate Drive Lanham, Maryland 20785-2231 301-731-8894 FAX 301-731-0253 IITRI CR-030-216 CONTENTS Executive Summary.................................................................................................................. vii ES.1 Introduction................................................................................................................... vii ES.2 Scope............................................................................................................................. vii ES.3 Approach....................................................................................................................... viii ES.4 Observations ................................................................................................................. viii ES.5 Conclusions................................................................................................................... xii ES.6 Recommendations......................................................................................................... xiv Section 1 Introduction 1.1 Purpose.........................................................................................................................
    [Show full text]
  • In the Depths of the Net by Sue Halpern | the New York Review Of
    Font Size: A A A In the Depths of the Net Sue Halpern OCTOBER 8, 2015 ISSUE The Dark Net: Inside The Digital Underworld by Jamie Bartlett Melville House, 308 pp, $27.95 freeross.org Ross Ulbricht, who was recently sentenced to life in prison for running the illegal dark-Net marketplace Silk Road Early this year, a robot in Switzerland purchased ten tablets of the illegal drug MDMA, better known as “ecstasy,” from an online marketplace and had them delivered through the postal service to a gallery in St. Gallen where the robot was then set up. The drug buy was part of an installation called “Random Darknet Shopper,” which was meant to show what could be obtained on the “dark” side of the Internet. In addition to ecstasy, the robot also bought a baseball cap with a secret camera, a pair of knock-off Diesel jeans, and a Hungarian passport, among other things. Passports stolen and forged, heroin, crack cocaine, semiautomatic weapons, people who can be hired to use those weapons, computer viruses, and child pornography—especially child pornography—are all easily obtained in the shaded corners of the Internet. For example, in the interest of research, Jamie Bartlett—the author of The Dark Net: Inside the Digital Underworld, a picturesque tour of this disquieting netherworld—successfully bought a small amount of marijuana from a dark-Net site; anyone hoping to emulate him will find that the biggest dilemma will be with which seller—there are scores—to do business. My own forays to the dark Net include visits to sites offering counterfeit drivers’ licenses, methamphetamine, a template for a US twenty-dollar bill, files to make a 3D-printed gun, and books describing how to receive illegal goods in the mail without getting caught.
    [Show full text]
  • The Qanon Conspiracy
    THE QANON CONSPIRACY: Destroying Families, Dividing Communities, Undermining Democracy THE QANON CONSPIRACY: PRESENTED BY Destroying Families, Dividing Communities, Undermining Democracy NETWORK CONTAGION RESEARCH INSTITUTE POLARIZATION AND EXTREMISM RESEARCH POWERED BY (NCRI) INNOVATION LAB (PERIL) Alex Goldenberg Brian Hughes Lead Intelligence Analyst, The Network Contagion Research Institute Caleb Cain Congressman Denver Riggleman Meili Criezis Jason Baumgartner Kesa White The Network Contagion Research Institute Cynthia Miller-Idriss Lea Marchl Alexander Reid-Ross Joel Finkelstein Director, The Network Contagion Research Institute Senior Research Fellow, Miller Center for Community Protection and Resilience, Rutgers University SPECIAL THANKS TO THE PERIL QANON ADVISORY BOARD Jaclyn Fox Sarah Hightower Douglas Rushkoff Linda Schegel THE QANON CONSPIRACY ● A CONTAGION AND IDEOLOGY REPORT FOREWORD “A lie doesn’t become truth, wrong doesn’t become right, and evil doesn’t become good just because it’s accepted by the majority.” –Booker T. Washington As a GOP Congressman, I have been uniquely positioned to experience a tumultuous two years on Capitol Hill. I voted to end the longest government shut down in history, was on the floor during impeachment, read the Mueller Report, governed during the COVID-19 pandemic, officiated a same-sex wedding (first sitting GOP congressman to do so), and eventually became the only Republican Congressman to speak out on the floor against the encroaching and insidious digital virus of conspiracy theories related to QAnon. Certainly, I can list the various theories that nest under the QAnon banner. Democrats participate in a deep state cabal as Satan worshiping pedophiles and harvesting adrenochrome from children. President-Elect Joe Biden ordered the killing of Seal Team 6.
    [Show full text]
  • Articles & Reports
    1 Reading & Resource List on Information Literacy Articles & Reports Adegoke, Yemisi. "Like. Share. Kill.: Nigerian police say false information on Facebook is killing people." BBC News. Accessed November 21, 2018. https://www.bbc.co.uk/news/resources/idt- sh/nigeria_fake_news. See how Facebook posts are fueling ethnic violence. ALA Public Programs Office. “News: Fake News: A Library Resource Round-Up.” American Library Association. February 23, 2017. http://www.programminglibrarian.org/articles/fake-news-library-round. ALA Public Programs Office. “Post-Truth: Fake News and a New Era of Information Literacy.” American Library Association. Accessed March 2, 2017. http://www.programminglibrarian.org/learn/post-truth- fake-news-and-new-era-information-literacy. This has a 45-minute webinar by Dr. Nicole A. Cook, University of Illinois School of Information Sciences, which is intended for librarians but is an excellent introduction to fake news. Albright, Jonathan. “The Micro-Propaganda Machine.” Medium. November 4, 2018. https://medium.com/s/the-micro-propaganda-machine/. In a three-part series, Albright critically examines the role of Facebook in spreading lies and propaganda. Allen, Mike. “Machine learning can’g flag false news, new studies show.” Axios. October 15, 2019. ios.com/machine-learning-cant-flag-false-news-55aeb82e-bcbb-4d5c-bfda-1af84c77003b.html. Allsop, Jon. "After 10,000 'false or misleading claims,' are we any better at calling out Trump's lies?" Columbia Journalism Review. April 30, 2019. https://www.cjr.org/the_media_today/trump_fact- check_washington_post.php. Allsop, Jon. “Our polluted information ecosystem.” Columbia Journalism Review. December 11, 2019. https://www.cjr.org/the_media_today/cjr_disinformation_conference.php. Amazeen, Michelle A.
    [Show full text]
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) Surveillance as public matter Revisiting sousveillance through devices and leaks van der Velden, L.C. Publication date 2018 Document Version Final published version License Other Link to publication Citation for published version (APA): van der Velden, L. C. (2018). Surveillance as public matter: Revisiting sousveillance through devices and leaks. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Surveillance as Public Matter Revisiting surveillance through devices and leaks metadata trackers network interferences network interferences trackers, files Lonneke van der Velden social media profiles files files files Surveillance as public matter Revisiting sousveillance through devices and leaks ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Mitigating the Risks of Whistleblowing an Approach Using Distributed System Technologies
    Mitigating the Risks of Whistleblowing An Approach Using Distributed System Technologies Ali Habbabeh1, Petra Maria Asprion1, and Bettina Schneider1 1 University of Applied Sciences Northwestern Switzerland, Basel, Switzerland [email protected] [email protected] [email protected] Abstract. Whistleblowing is an effective tool to fight corruption and expose wrongdoing in governments and corporations. Insiders who are willing to report misconduct, called whistleblowers, often seek to reach a recipient who can dis- seminate the relevant information to the public. However, whistleblowers often face many challenges to protect themselves from retaliation when using the ex- isting (centralized) whistleblowing platforms. This study discusses several asso- ciated risks of whistleblowing when communicating with third parties using web- forms of newspapers, trusted organizations like WikiLeaks, or whistleblowing software like GlobaLeaks or SecureDrop. Then, this study proposes an outlook to a solution using decentralized systems to mitigate these risks using Block- chain, Smart Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed Domain Name Systems (DDNS). Keywords: Whistleblowing, Blockchain, Smart Contracts 1 Introduction By all indications, the topic of whistleblowing has been gaining extensive media atten- tion since the financial crisis in 2008, which ignited a crackdown on the corruption of institutions [1]. However, some whistleblowers have also become discouraged by the negative association with the term [2], although numerous studies show that whistle- blowers have often revealed misconduct of public interest [3]. Therefore, researchers like [3] argue that we - the community of citizens - must protect whistleblowers. Addi- tionally, some researchers, such as [1], claim that, although not perfect, we should re- ward whistleblowers financially to incentivize them to speak out to fight corruption [1].
    [Show full text]
  • The Tor Dark Net
    PAPER SERIES: NO. 20 — SEPTEMBER 2015 The Tor Dark Net Gareth Owen and Nick Savage THE TOR DARK NET Gareth Owen and Nick Savage Copyright © 2015 by Gareth Owen and Nick Savage Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this license, visit (www.creativecommons.org/licenses/by-nc- nd/3.0/). For re-use or distribution, please include this copyright notice. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS vi About the Global Commission on Internet Governance vi About the Authors 1 Executive Summary 1 Introduction 2 Hidden Services 2 Related Work 3 Study of HSes 4 Content and Popularity Analysis 7 Deanonymization of Tor Users and HSes 8 Blocking of Tor 8 HS Blocking 9 Conclusion 9 Works Cited 12 About CIGI 12 About Chatham House 12 CIGI Masthead GLOBAL COMMISSION ON INTERNET GOVERNANCE PAPER SERIES: NO. 20 — SEPTEMBER 2015 ABOUT THE GLOBAL ABOUT THE AUTHORS COMMISSION ON INTERNET Gareth Owen is a senior lecturer in the School of GOVERNANCE Computing at the University of Portsmouth.
    [Show full text]