Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 
Fred99

13684 posts

Uber Geek
+1 received by user: 10018


  #2721029 9-Jun-2021 09:21
Send private message

According to the NYT:

 

 

Australian officials said they had revealed the operation on Tuesday because of the need to disrupt dangerous plots currently in motion and because of limited time frames for legal authorities invoked to intercept the communications.

 

Investigators also had pulled the plug on the Anom network because their wiretap authorizations were coming up for renewal and the sting had already gathered so much evidence, said Suzanne Turner, the special agent in charge of the F.B.I.’s San Diego office.

 

 




Dratsab
3964 posts

Uber Geek
+1 received by user: 1728

Trusted
Lifetime subscriber

  #2721095 9-Jun-2021 10:30
Send private message

Batman: Question

Why did they let the cat out of the bag?

 

They had to. Chains of evidence would've included information which could clearly have come from only one source.


frankv
5705 posts

Uber Geek
+1 received by user: 3666

Lifetime subscriber

  #2721108 9-Jun-2021 11:08
Send private message

SaltyNZ:

 

A telecommunications service provider is obliged to offer interception in the clear to law enforcement agencies.

 

 

I don't understand this. If I e.g. encrypt a ZIP file and email it to someone, how can a telco give it in the clear to law enforcement? Likewise stuff transmitted using PGP or a VPN?

 

 




SJB

SJB
2945 posts

Uber Geek
+1 received by user: 2287
Inactive user


  #2721111 9-Jun-2021 11:12
Send private message

I wonder why the crim's don't use the Tor network or has anonymity been broken on it?


Beccara
1473 posts

Uber Geek
+1 received by user: 517

ID Verified

  #2721113 9-Jun-2021 11:17
Send private message

frankv:

 

SaltyNZ:

 

A telecommunications service provider is obliged to offer interception in the clear to law enforcement agencies.

 

 

I don't understand this. If I e.g. encrypt a ZIP file and email it to someone, how can a telco give it in the clear to law enforcement? Likewise stuff transmitted using PGP or a VPN?

 

 

 

 

 

 

They can't, just like if you are using HTTPS they can't hand over unencrypted. As discussed there's some leeway with what is a telecommunications provider that may be able to extend to messaging platforms and what not but if it's been tested or not is not something that's likely to be known. Just because the information is encrypted doesn't mean it's not useful, just the date/time/to IP can be immensely helpful to corroborate other intel





Most problems are the result of previous solutions...

All comment's I make are my own personal opinion and do not in any way, shape or form reflect the views of current or former employers unless specifically stated 

SaltyNZ
8867 posts

Uber Geek
+1 received by user: 9550

Trusted
2degrees
Lifetime subscriber

  #2721115 9-Jun-2021 11:17
Send private message

frankv:

 

SaltyNZ:

 

A telecommunications service provider is obliged to offer interception in the clear to law enforcement agencies.

 

 

I don't understand this. If I e.g. encrypt a ZIP file and email it to someone, how can a telco give it in the clear to law enforcement? Likewise stuff transmitted using PGP or a VPN?

 

 

 

 

 

 

The requirement is for the telco to provide a cleartext intercept of the data the user transmits. Which means, if the telco ciphers the data (as we do over the radio interface) then the telco must be able to decipher that for interception. If you cipher your own data before sending it then the cleartext interception of your data is the ciphered data you sent.

 

TL;DR we don't have to try to decrypt your ZIP file, we just have to send the encrypted ZIP file.





iPad Pro 11" + iPhone 15 Pro Max + 2degrees 4tw!

 

These comments are my own and do not represent the opinions of 2degrees.


HP

 
 
 
 

Shop now for HP laptops and other devices (affiliate link).
Scott3
4177 posts

Uber Geek
+1 received by user: 2990

Trusted
Lifetime subscriber

  #2721116 9-Jun-2021 11:19
Send private message

SJB:

 

I wonder why the crim's don't use the Tor network or has anonymity been broken on it?

 

 

My understanding is that Tor has been compromised for many years.


Beccara
1473 posts

Uber Geek
+1 received by user: 517

ID Verified

  #2721121 9-Jun-2021 11:26
Send private message

Pretty much, it's stupidly simple to make a mistake on Tor and leak something that ties you to something. If you are using .onion's then it's a little bit better but the entry and exit from the network lends it's self to finger printing. Again if you combine telemetry from an exit node with a LEO compromised site and what not you end up with something that helps corroborate other intel





Most problems are the result of previous solutions...

All comment's I make are my own personal opinion and do not in any way, shape or form reflect the views of current or former employers unless specifically stated 

1 | 2 | 3 | 4 
View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.