gAtO wAs – asked the Tor-Network is slow as heck, does not support sending outgoing email and does not support UDP packets of the TCP/IP protocol, so can it be weaponized? Maybe monitoring the Tor-Network like Prism and Nucleon or the Japan based Daedalus Monitoring program at the very least?
Data collection in Tor:
I guess this all depends on your definition of what a weaponize cyber weapon is-///-IP theft- here we have a vast collection of both /IP-(intellectual Property) and /copyright – /hacking /sql-i in Tor// -.- /hacktivism -how about /personal privacy online-collection of all internet transaction and data sharing with Google, Facebook, Microsoft and others— /government censorship of it’s people /Worldwide Internet monitoring-/// Like a room 641a for Tor only traffic.
Mix a little more counter-offensive cyber class weapons like Stuxnet, Flame and DuKu – add a bit of misinformation and propaganda to the mix and we have a better question.
Next we have a more military type cyber weaponized solution. Control Drones planes in Tor -another one is dDos, attacks on the electric grid or sabotage satellites. Cyber attacks like power outage, hacking attacks on cell phones and wall street computers and add traffic lights and traffic in the northeast going wacko. Like they say trains, planes and automobiles are all connected to cyberspace from China to Canada…
Tor can also be used in all the above scenario- Yes big brother/sister it can. So the answer is Yes, but Tor is not the pony network that can do this work. There are other kinds of anonymized networks that can be used, and with your own relays all over the world you can create your own Tor-private network that only you use so it will be faster and side nobody can see it – well Tor is not the only network one to watch for cyber weaponized products – gAtO oUt
gAtO lEaRn – On 01-01-213 we hear that Microsoft buys Skype and makes changes to allow Police surveillance. Then on 01-07-2013 we hear that a professor at the Warsaw University of Technology, Wojciech Mazurczyk, found a way to insert secret 70 bits of data and add secret information similar to steganography.
Lawful Intercept is what it’s called and we just heard punch – counter-punch from the government. I just posted about corporations and governments using offensive cyber weapons to fight crime, but this looks like just plain old spying on citizens like China, Iraq and Syria does. Skype is owned by Microsoft and we know that Word and other products have back doors for them to snoop and governments to use in criminal cases. I guess they do it the proper way and get a real FISA document to monitor us it’s citizens.
mEoW 12-30-2012 our re-elected President Obama signs FISA Warrantless Wiretapping Program. STOP – SAY WHAT. mEoW – Forget about gun control how about the privacy of citizens, are we becoming like China, Iraq and Syria the more I find out about this the crazier it becomes. I hate Skypes but now finding this out NO WAY DUDE-
I did a little digging and I found a document from the Straford hack from the LutzBoat crew and this has been on the play board for a long time. More and more governments that play nice with the America and Microsoft will have to live with the fact that they are spying on us, the people. I voted for Obama but I’m pretty sure any president would want to be able to justify this abuse of power to monitor it’s citizens, what get’s me is we scream and yell when other countries do it but here we are doing to ourselves and nobody is talking about this- Hay press wake up. I have nothing to hide but if you do you have been warned – enjoy your government spying on you behind your back – gAtO oUt
IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how
Criminals, predators and hackers now use chats, blogs, webmail and Internet applications such as online gaming and file-sharing sites to hide their communications.
Qosmos provides law enforcement agencies with a powerful solution to identify a target using multiple virtual IDs and intercept all related IP- based communications. Any trigger, such as a “user login = target” initiates intercept of all IP traffic related to the “target.”
Example of recognized applications and protocols
VoIP Email (POP, SMTP)
Webmail (Gmail, Hotmail, Live Mail, SquirrelMail, Yahoo mail, etc.)
Instant Messaging (Aim, SNM, Skype, Yahoo, Google Talk, QQ, Maktoob, Paltalk, etc.)
Online games (World of Warcraft)
Online classified ads
Audio/Video (H.323, SIP, MGCP, RTP, RTCP, MMSE, RTSP, SHOUTcast, Yahoo Video,
MSN Video, SCCP, etc.)
Web applications (Dailymotion, Google, eBay, Google Earth, HTTP, MySpace, Wikipedia,
Example of information extracted
Caller, phone number, called party, duration of call
Webmail login, email address, sender, receiver, subject matter, attached documents
Instant messaging sender, receiver, contact lists and status
Forum login, IP address, MAC address, mobile ID (IMSI, IMEI)
Protocols identified even for unidirectional traffic (e.g. email by satellite).
Chinese hackers were responsible for stealing the personal information of 35 million users of Internet portal Nate and blogging site Cyworld, police said on Thursday.
The stolen information, which included the people’s names and resident registration numbers, may be used to facilitate spam mail or voice phishing.
The Cyber Terror Response Center of the National Police Agency briefed reporters on the findings of their investigation, saying that the hackers used ALZip, a Korean file compression program, to access the data. The stolen personal information was leaked to a server that is believed to be based in China via another server in a third location. The ALZip program produced by ESTsoft is distributed free of charge and has around 14 million users.
An analysis of China’s domestic political situation shows how, increasingly, moderates want to take part in the decision-making process. However, they face the all-out opposition of the party, which fears losing its leadership role. Social unrest is just around the corner.
China is home to some of the world’s most sophisticated hackers, many of which are given a virtual green light to attack foreign governments and businesses, in attacks that assist China’s government and Chinese businesses. It’s a well known fact, but everyone is too afraid to try to stand up to the Asian nation, as it hold large amounts of debt, as well as enjoys control of much of the world’s rare mineral resources and manufacturing.
With more and more cyber attacks against governments and corporations, there is a growing belief that hackers could be potentially be exploited or actively recruited by various government entities.
For example, cyber activists associated with Anonymous have targeted a number of servers belonging to the U.S. government, federal defense contractors and high-profile companies.