Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Project to Teach Anonymous Communications to the Media

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
AJ9000 Donating Member (519 posts) Send PM | Profile | Ignore Mon May-29-06 12:54 AM
Original message
Project to Teach Anonymous Communications to the Media
Hey guys just an idea, but in light of the fact that government officials are almost certainly rummaging through phone numbers at will (apparently including prominent journalists) thereby threatening to stifle important journalism, should we consider making a special project with the help of tech savvy types on this forum for the purposes of teaching potential sources of important information how to contact the news-media while remaining anonymous via the internet?

We could then popularize the method so the sources would know how to do it.

It may have limitations, but it might be worthwhile. Some folks might come forward with info that otherwise wouldn’t.

The sources could then provide evidence to corroborate their story and help guide a news investigation without fear of reprisals by the government. (And journalists can’t be forced to divulge sources if they don’t know who they are.)

I’m not sure exactly how it would be done – perhaps a wireless connection from various locations through a proxy.
Printer Friendly | Permalink |  | Top
MADem Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 12:59 AM
Response to Original message
1. Underground Phone Railroad
You give your houaw key (or a portaphone keyed to your house) to Person X, you never know his name. He uses your phone by giving it to Reporter Y, to call Politician Z. Either you leave your house, or he parks out front with a cellphone keyed to your frequency. There's a ton of them. Not just you, but others, from FL to ME. How ya gonna catch 'em all? How can ya prove that it wasn't theft of service?

Good idea to use a voice scrambler, as well...but hey, the more they push, the more thinking folk have to push BACK.
Printer Friendly | Permalink |  | Top
 
AJ9000 Donating Member (519 posts) Send PM | Profile | Ignore Mon May-29-06 02:37 AM
Response to Reply #1
2. Well I had the internet in mind
but I suppose there might be other methods.

Any techies out there with any ideas?
Printer Friendly | Permalink |  | Top
 
salvorhardin Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 03:06 AM
Response to Reply #2
3. Phil Zimmerman, creator of PGP
And prosecuted by the government for illegally exporting munitions grade encryption technology in the early 1990s, is working on a secure SIP phone product. It's in BETA right now, but it's free. Doesn't work with Skype but it'll work with just about any other SIP based service.
http://www.philzimmermann.com/EN/zfone/index-start.html
Printer Friendly | Permalink |  | Top
 
AJ9000 Donating Member (519 posts) Send PM | Profile | Ignore Mon May-29-06 04:06 AM
Response to Reply #3
4. Interesting. Wonder if the gov can beat it. I've heard it
said the NSA et al is 30 years ahead of industry technology.

Wonder if the gov can beat it or trace back to the caller some how. But that's got potential.
Printer Friendly | Permalink |  | Top
 
SoCalDem Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 04:40 AM
Response to Reply #4
6. and YET, wasn't the spin at the 9-11 hearings, this?
"The FBI/NSA/CIA equipment was so antiquated that there was NO way they could even go online, or use email"...?

That was what I heard many of them use as the exuse for why they never connected the dots..

hmmmm..curiouser and curiouser
Printer Friendly | Permalink |  | Top
 
salvorhardin Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 11:51 AM
Response to Reply #4
8. It all depends on how fast the NSA can factor prime numbers
Edited on Mon May-29-06 12:10 PM by salvorhardin
In order to crack the key used for any particular encryption session. The fact that this uses disposable keys (a new key is generated for every session and then destroyed at the end of the session) makes it all the more difficult. I haven't studied the ZRTP protocol or Zimmerman's implementation in detail, but I assume he's chosen a default key length large enough to make cracking non-trivial and yet not overly tax the resoruces of the computing hardware hosting the ZRTP client.

What you've got to remember is that nothing is 100% secure. What one tries to do when striving for security is to put up enough barriers that it is no longer worth the effort to get to whatever is being secured. The flip side to this is that you try to be reasonably secure, without putting up so many barriers that it becomes burdensome to get to or do whatever it is you're interested in securing in the first place. So while I wouldn't count on the NSA not being able to listen in on your conversation, it's reasonable to assume that ZPhone and ZRTP would make it uneconomical to crack every call. And though the NSA may be years ahead in tech, they are not years ahead in quantum computing which would be required to crack arbitrarily large key lengths.

Also, you have to consider that this does nothing to obscure the kind of external or meta data being collected from the phone companies, and even though you're not using a standard phone or cell for ZPhone, you're still generating meta data. As Zimmerman notes in the FAQ:
Q: Does Zfone protect against "social network analysis" and other forms of analysis based on traffic patterns?
A: No, not at all. Zfone just encrypts the contents of the call. The only way to protect against traffic analysis is to go through multiple intermediaries, which is a technique that has been used to protect email and web browsing (see the TOR project for an example of this). But this adds latency to communications, which may be unnoticeable for email, and at least tolerable for web browsing, but would be unacceptable for phone calls. Further, these countermeasures may be ineffective against a clever and resourceful opponent, because it's hard to hide the timing and length of the messages, especially if there are real-time communication requirements.
http://www.philzimmermann.com/EN/zfone/index-faq.html


So in my estimation, as with Zimmerman's previous PGP product, ZPhone is "pretty good privacy" and that's often more than enough, but if you're looking for panaceas, there aren't any.

Now, if you couple ZPhone, with GPG for e-mail (and other things) and Off The Record for instant messaging then you've got a pretty good arsenal for helping to insure that your private communications stay that way. Just remember though, the fact that you are encrypting your communications itself says something -- that you care enough about what you're sending/saying to have it encrypted. But if you were to encrypt everything, just as you use an envelope for almost everything you send through the mail, that wouldn't be so suspicious. If you could get your whole circle of friends doing it, even better. If everybody did it... Well, then over half the country wouldn't be OK with the NSA datamining their external data.
Printer Friendly | Permalink |  | Top
 
thecrow Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 04:39 AM
Response to Original message
5. Word of mouth relay in parts of messages
How could they tap that?
Printer Friendly | Permalink |  | Top
 
sweetheart Donating Member (1000+ posts) Send PM | Profile | Ignore Mon May-29-06 05:32 AM
Response to Original message
7. journalists need to become prostitutes
Then sources can speak their mind during their orgasmic meetings,
and the carnal reality of the oldest profession can keep alive
the 4th estate.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 04th 2024, 02:18 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC