{"id":56151,"date":"2013-08-06T00:56:48","date_gmt":"2013-08-05T23:56:48","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/fbi-suspected-in-hacking-anonymity-software-tor-to-arrest-child-porn-suspect\/56151\/"},"modified":"2013-08-06T00:56:48","modified_gmt":"2013-08-05T23:56:48","slug":"fbi-suspected-in-hacking-anonymity-software-tor-to-arrest-child-porn-suspect","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/fbi-suspected-in-hacking-anonymity-software-tor-to-arrest-child-porn-suspect\/","title":{"rendered":"FBI suspected in hacking anonymity software Tor to arrest child porn suspect"},"content":{"rendered":"<div class=\"ftpimagefix\" style=\"float:left\"><a target=\"_blank\" href=\"http:\/\/rt.com\/usa\/fbi-suspected-hacking-child-porn-079\/\"><img decoding=\"async\" width=\"150\" src=\"http:\/\/rt.com\/files\/news\/20\/00\/70\/00\/000_hkg3624233.jpg\"\/><\/a><\/div>\n<p>Security experts have accused US law enforcement of taking advantage of a flaw in the Firefox Internet browser then exploiting it to identify and potentially monitor subscribers to Tor, which shields an individual&#8217;s online activity from privacy threats.<\/p>\n<p>\n  A piece of malicious software was launched Sunday morning and<br \/>\n  appeared to target Firefox users who use a Tor add-on that allows<br \/>\n  them to browse the Internet without putting their location,<br \/>\n  communication, and other activities at risk. The malware was also<br \/>\n  reported on multiple websites affiliated with Freedom Hosting, a<br \/>\n  web-hosting company favored by customers who wish to remain<br \/>\n  anonymous.\u00a0\n<\/p>\n<p>\n  The exact origin of the malware attack remains unknown, although<br \/>\n  the Federal Bureau of Investigation and the National Security<br \/>\n  Agency are among the chief suspects. When the malware was<br \/>\n  analyzed, its source was identified as a Virginia server<br \/>\n  belonging to SAIC, a contractor known to work with multiple<br \/>\n  government agencies, according to TechDirt.\u00a0\n<\/p>\n<p>\n  \u201c<i>It just sends identifying information to some IP in Reston,<br \/>\n  Virginia<\/i>,\u201d reverse-engineer Vlad Tsyrklevich told Wired.<br \/>\n  \u201c<i>It\u2019s pretty clear that it\u2019s the FBI or it\u2019s some other law<br \/>\n  enforcement agency that\u2019s US-based<\/i>.\u201d\u00a0\n<\/p>\n<p>\n  Users who visited Freedom Hosting\u2019s websites while cloaked by the<br \/>\n  Tor Browsing Bundle were targeted for identification, possibly<br \/>\n  because of Freedom Hosting\u2019s known willingness to look the other<br \/>\n  way when nefarious activity sprouted on company-protected<br \/>\n  networks.\n<\/p>\n<p>\n  The malware and site outages come just days after the arrest of<br \/>\n  Eric Eoin Marques in Ireland. The 28-year-old is expected to be<br \/>\n  extradited from Dublin to Washington DC after the FBI claims he<br \/>\n  used Freedom Hosting to become \u201c<i>the largest facilitator of<br \/>\n  child porn on the planet<\/i>.\u201d Marques is alleged to be behind<br \/>\n  Freedom Hosting, which first made headlines in 2011 when the<br \/>\n  Anonymous hacker collective launched a<br \/>\n  distributed-denial-of-service (DDoS) attack against sites<br \/>\n  depicting child porn.\u00a0<br \/>\n  <\/p>\n<\/p>\n<p>\n  Tor \u2014 an acronym for \u201cThe Onion Router\u201d \u2014 was quick to distance<br \/>\n  itself from Freedom Hosting after Marques\u2019 arrest, issuing a<br \/>\n  statement on its official blog saying \u201c<i>the persons who run<br \/>\n  Freedom Hosting are in no way affiliated or connected to the Tor<br \/>\n  Project Inc, the organizations coordinating the development of<br \/>\n  the Tor software and research<\/i>.\u201d \u00a0\n<\/p>\n<p>\n  \u201c<i>Anyone can run hidden services, and many do<\/i>,\u201d the<br \/>\n  statement read. \u201c<i>Organizations run hidden services to protect<br \/>\n  dissidents, activists, and protect the anonymity of users trying<br \/>\n  to find help for suicide prevention, domestic violence, and abuse<br \/>\n  recovery<\/i>.\u201d\n<\/p>\n<p>\n  The Tor blog post went on to warn that, while the script was a<br \/>\n  threat to Firefox users, the malware only targeted users with an<br \/>\n  old version of the browser.\u00a0\n<\/p>\n<p>\n  \u201c<i>The malware payload could be trying to exploit potential bugs<br \/>\n  in Firefox 17 ESR, on which our Tor Browser is based. We\u2019re<br \/>\n  investigating these bugs and will fix them if we can<\/i>.\u201d\u00a0\n<\/p>\n<p>\n  While the FBI reportedly sought Marques for more than a year, the<br \/>\n  Bureau is known to have drastically increased its use of malware<br \/>\n  in recent years. Agents first began using a computer and Internet<br \/>\n  protocol address verifier, known as CIPAV, in 2007 to infiltrate<br \/>\n  a suspect\u2019s computer, capture the data, and send that information<br \/>\n  back to FBI servers in Virginia.\u00a0\n<\/p>\n<p>\n  Seven years ago Wired reported that CIPAV gathered information<br \/>\n  including \u201c<i>the computer&#8217;s IP address; MAC address; open ports;<br \/>\n  a list of running programs; the operating system type, version<br \/>\n  and serial number; preferred internet browser and version; the<br \/>\n  computer&#8217;s registered owner and registered company name; the<br \/>\n  current logged-in user name and the last-visited URL<\/i>.\u201d\n<\/p>\n<p>\n  Since then, the FBI has hired former hackers to monitor users\u2019<br \/>\n  key-logs, even capable of turning on a mobile phone\u2019s microphone<br \/>\n  from Virginia. They have also requested court permission to<br \/>\n  override an individual\u2019s phone or computer camera in order to<br \/>\n  snap pictures of a suspect. Judges have consistently denied such<br \/>\n  requests by citing the possibility innocent people would be<br \/>\n  snared in an all-encompassing dragnet, a situation with an eerie<br \/>\n  similarity to what could happen on anonymous Tor networks.\n<\/p>\n<p>Republished from: <a href=\"http:\/\/rt.com\/usa\/fbi-suspected-hacking-child-porn-079\/\" target=\"_blank\" title=\"FBI suspected in hacking anonymity software Tor to arrest child porn suspect\">RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security experts have accused US law enforcement of taking advantage of a flaw in the Firefox Internet browser then exploiting it to identify and potentially monitor subscribers to Tor, which shields an individual&#8217;s online activity from privacy threats. A piece of malicious software was launched Sunday morning and appeared to target Firefox users who use [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":56152,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487],"tags":[],"class_list":{"0":"post-56151","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/56151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=56151"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/56151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/56152"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=56151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=56151"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=56151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}