To Avoid Detection, Terrorists Made Messages Seem Like Spam 110
HughPickens.com writes: It's common knowledge the NSA collects plenty of data on suspected terrorists as well as ordinary citizens, but the agency also has algorithms in place to filter out information that doesn't need to be collected or stored for further analysis, such as spam emails. Now Alice Truong reports that during operations in Afghanistan after 9/11, the U.S. was able to analyze laptops formerly owned by Taliban members. According to NSA officer Michael Wertheimer, they discovered an email written in English found on the computers contained a purposely spammy subject line: "CONSOLIDATE YOUR DEBT."
According to Wertheimer, the email was sent to and from nondescript addresses that were later confirmed to belong to combatants. "It is surely the case that the sender and receiver attempted to avoid allied collection of this operational message by triggering presumed "spam" filters (PDF)." From a surveillance perspective, Wertheimer writes that this highlights the importance of filtering algorithms. Implementing them makes parsing huge amounts of data easier, but it also presents opportunities for someone with a secret to figure out what type of information is being tossed out and exploit the loophole.
According to Wertheimer, the email was sent to and from nondescript addresses that were later confirmed to belong to combatants. "It is surely the case that the sender and receiver attempted to avoid allied collection of this operational message by triggering presumed "spam" filters (PDF)." From a surveillance perspective, Wertheimer writes that this highlights the importance of filtering algorithms. Implementing them makes parsing huge amounts of data easier, but it also presents opportunities for someone with a secret to figure out what type of information is being tossed out and exploit the loophole.
Solution! (Score:5, Funny)
Applying the Cameron Solution [theguardian.com], all we need to do is ban spam... or email. I confess I'm not quite clear.
Re: (Score:1)
Re: (Score:3)
Re: (Score:2)
I've read that the US is trying. Their advisors recognise the importance of encryption and are trying to keep their political ally Cameron from making a fool of himself. While he wants to ban encryption, the US favors a more conventional regulatory approach of allowing encryption but making sure someone (ie, any company with any US presence) has both the capability and the legal requirement to decryption reception of a warrant. Or presumably a flimsy super-secret tell-noone blanket order requesting all thei
Re: (Score:1)
Re: (Score:2)
That applies if you're talking about software packages for individual use. I don't think that is where the legal concerns are addressed - how many people actually use gnupg? The legal concern is directed at services. Facebook, skype, whatsapp and so fourth. In these cases there is a service provider which, unless they actively take measures otherwise, has the capability to access communications. All that is required is a legal framework to compel them to hand over whatever the government requests (Either by
Re: (Score:1)
Re: (Score:2)
Nothing is stopping them from requiring that all software encrypt a copy of the session key (or whatever) with a second public key (which the government can decrypt with their private key). OSS can do that just as easily as closed-source software. Sure, it would be obvious to anyone looking at the code, but the law wouldn't exactly be a secret,
Re: (Score:1)
Re: (Score:2)
To be fair, I never said it was a good idea. :-) In fact, it's a terrible idea, and the issue you mention is just the tip of the iceberg. If you give in to one world government by providing a back door, then all the others will come to you expecting the same treatment.
So you decide that you need to hold those keys in escrow, and use them to decrypt only specific messages upon a court order. After all, you really shouldn't be providing those keys to nearly two-hundred different governments, for the reason
Re: (Score:1)
The US wants to do EXACTLY what Cameron announced. They just don't want anybody to know about it.
Re: (Score:2)
Even that's a stupid idea. A one-time pad is trivial to construct, can be used without any special software, and can not be cracked unless you manage to steal the key. If all you need to communicate is something short (e.g. time and location of target) then you can just post the encrypted thing in the middle of some random spam on a site like Slashdot that doesn't delete spam posts, just hides them.
Then there are techniques like linguistic steganography, that hide messages in things like misplaced apostr
Re: (Score:2, Funny)
Well, if Parliament insists I guess that's it for spam
It will be tied up in the House of Lords though, I mean the lower classes must still have a need for potted meat?
Re: (Score:2)
I do the opposite (Score:1, Interesting)
I use spook-mode in Emacs to greet the voyeurs at NSA all the time.
Kh-11 SSL FBI cypherpunk Attorney General HAMASMOIS Roswell Power Syria Food Poisoning cryptanalysis North Korea Verisign halcon Nuclear facility
Re:I do the opposite (Score:4, Funny)
You're supposed to say "Allah Akbar". Your keywords flag you as a paranoid schizophrenic or Slashdot aficionado. Either one mostly harmless to the Three Letter Agencies.
Re: (Score:1)
On the other side of filtering, after the Snowden revelations, I've definitely written mundane personal email messages that tangentially mentioned certain keywords that genuinely made me think twice before hitting send so as to avoid ending up on a watch list. False positives are an equal problem.
Re: (Score:2)
Three prisoners in a detention camp get to talking about why they are there.
"I am here because I always sent too much spam, and they charged me with been a numbers station," says the first.
"I am here because I sent direct marketing messages, and they charged me with helping sleeper agents," says the second.
"I am here because I sent an email every day," says the third, "and they charged me with been a sleeper agent."
Re: (Score:2)
Kh-11 SSL FBI cypherpunk Attorney General HAMASMOIS Roswell Power Syria Food Poisoning cryptanalysis North Korea Verisign halcon Nuclear facility
Foreign debts, homeless Vets, AIDS, Crack, Bernie Goetz, Hypodermics on the shores, China's under martial law, Rock and Roller Cola wars, I can't take it anymore. [youtube.com]
Or the alternative (Score:5, Funny)
Prince of Nigeria is really funding terror cells to cure his erectile disfunction.
Re: (Score:2)
Well, considering that terrorist like boko haram are kidnapping girls and selling them as slaves, you might be correct more than you know.
I wonder, how much REAL spam these guys received (Score:5, Interesting)
If "Consolidate Your Debt" was a special subject for them, I wonder, how many proposals of that kind the assholes had to sift through to find messages from real comrades.
Re:I wonder, how much REAL spam these guys receive (Score:5, Funny)
More interestingly, I wonder how many perfectly good terrorist emails I've deleted from my spam folder.
Re:I wonder, how much REAL spam these guys receive (Score:5, Funny)
More poignantly, does than mean we should be treating mass spammers like terrorist, oh my, I am torn between annoyance and justice, arghhh.
Re: (Score:2)
It's a public secret that the reason NSA 's billion dollar program doesn't intercept any terrorist communication is their spam filters
Re: (Score:2)
If "Consolidate Your Debt" was a special subject for them, I wonder, how many proposals of that kind the assholes had to sift through to find messages from real comrades.
The sender address? Or a special forged "from"?
Re: (Score:1)
Easy to do with specific words used in the body. This is no different than using the classifieds. Noteworthy because it's being done on a computer.
Re: (Score:2)
NSA Spam Filter (Score:4, Funny)
So does this mean the NSA will now filter my spam for me? Hooray!
Re:NSA Spam Filter (Score:5, Funny)
If everybody hadn't got all of their panties in a bunch, they would have filtered your spam, backed up your hard drive, kept permanent records of your phone calls, your tax returns and every text you've ever made.
All for free (well, not exactly free but at least 'No Extra Cost').
I swear, Americans are just so jumpy these days. No good deed goes unpunished.
Re: (Score:2)
NSA, Google, same diff...
Drone Strikes Against Spammers ? (Score:5, Funny)
Sure we will get some actual spammers in with that, but better safe than sorry.
Re: (Score:2)
Well, some people have been saying spammers are terrorist for a long time. Turns out they might be after all.
Re: (Score:2)
People have been talking about using spam for steganography for a long time too. spammimic.com predates 9/11, and I'm not even sure it's the earliest example.
Re:Drone Strikes Against Spammers ? (Score:5, Interesting)
Every spam message that goes past the filters takes several seconds out of someone's life -- and not just the "gross" part that includes sleep, commutes, bathing, etc but of the actual productive part of the day (around 1/3 of it). Averaging batch reading of mail at the start of a day vs full context switch, let's take 5s per piece of spam. Let's assume a 95% spam filter effectiveness rate. Now the hardest part -- how big a spam campaign run is? Let's assume 100M delivery attempts (I'm doing a Fermi estimate -- or rather, pure rectal extraction -- on this number).
This means, a single spammer who did just 10 spam campaign runs effectively murdered a person -- in a death of thousand cuts.
Re: (Score:2)
Speaking of which, that's enough /. for me today :)
Re: (Score:3, Informative)
Of course, never in History, not even in WW1 and 2 has any spy agency tried do collect ALL information that was there. Like every letter sent, every phone call made, every conversation made in public, etc... like spy organisations these days seem to try.
Former East Germany came closest in the last century I guess. Then again, they probably had 20% of the population working at least part-time as undercover agents to spy on the rest.
Re: (Score:3)
Project SHAMROCK https://en.wikipedia.org/wiki/... [wikipedia.org]
"started in August 1945 that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA) and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT."
Just the early days of c
So..... (Score:2)
You think it's bad there (Score:3, Insightful)
Watch the Home Shopping Network. All their plans are on display. Look for the hidden pictures in those artsy plates they sell. They're actually maps and blueprints.
And Hair Club for Men is a sleeper cell.
"I've fallen! And I can't get up!" is a call to arms.
They're everywhere. Am I not right?
Re: (Score:2)
"I've fallen! And I can't get up!" is a call to arms.
I think you've misinterpreted that one... it's clearly a "Help Wanted" posting quietly reaching out to fellow villains for some technical assistance.
Re: (Score:1)
I actually warned the FBI... (Score:3, Interesting)
.......of something similar back in 2002. There were a lot of messages on UseNet that had been attributed to being either spammers or some college testing out an AI. I noticed that the messages all had the same subject but with an added "suffix" at the end and that the messages were all the same in the beginning but at the end of them they had what appeared as a word salad. I dropped a hint to the FBI that it looked like the "suffix" was giving the order in which to reassemble the message and that the word salad at the end was likely some form of steganography that contained the actual message. Two days later those messages stopped appearing on UseNet and were never seen again. Was it a terrorist? I don't know but they were made aware of it at that point at least. I would have contacted the NSA but I didn't want to deal with them on any level.
Re:I actually warned the FBI... (Score:4, Informative)
You alerted them to actual spam.
The purpose of the suffix was to evade simple subject-line spam filters, while the "word salad" was an effort to evade word-classifier spam filters by drowning out the "spam-like" words with "non-spam" words, or to poison the classifiers and render them useless by loading up the "spam" wordlists with words that usually appear in non-spam messages.
Re: (Score:2)
The terrorists have switched to concealing messages in GOP fundraising material.
& Vice Versa ? (Score:3)
Since they always let the terrorist stuff through, so as not to tip their hand, when will the spammers start disguising their messages as jihadist cal to arms?
Re: (Score:1)
Since they always let the terrorist stuff through, so as not to tip their hand, when will the spammers start disguising their messages as jihadist cal to arms?
To: undisclosed-recipients
Subject: MALE PLEASURE!!!!!!
Date: 17 January 2014 02:20:05 +0000
Increase your pleasure NOW AND FOREVER! Click here [nsa.gov] to join the Holy Crusade and very soon you'll be spending eternity with your very own harem of 72 virgins for all eterinity!
Spam Mimic (Score:4, Informative)
Re: (Score:2)
Interesting, and looks like it's been around a while based on whois (2000). Wouldn't be surprised if the evildoers were dumb enough to use that exact site. Also wouldn't be surprised if the 3-letter agencies have been watching the plaintext entries for many years.
Finally something good from the war on terror! (Score:2)
Finally, something good can come out of the "war on terror" and it can be a good use of the NSA's resources -- they can track down and eliminate spammers to prevent terrorist attacks.
Re: (Score:2)
How f'ing dumb are they? They must've worked at M$ before the NSA.
NOTHING in the article says that it actually worked, and in fact there is NO FUCKING WAY the NSA is going to say one way or another. If the answer is not in the files Snowden took, we'll never know for sure. (But I rather suspect that it did not work.)
Comment removed (Score:3)
Re: (Score:3)
What are you talking about? It's spam. The terrorist sends it to a million random addresses; one of which is the other terrorist who knows how to interpret it.
Re: (Score:2)
Sending instructions while optimally infuriating the viewer: win-win.
porncoding (Score:2)
If you can think of as many distinct sexual activities as there are symbols in your wrinting system, make a table and encode your secret messages as porn movies. (Spies will probably watch them, but probably also forget that they're supposed to be looking for messages.)
Re: (Score:3)
Abdul. According to this message, we are to attack on both coasts plus invade up the Mississippi River simultaneously!
Hidden messages (Score:2)
this is actually an old technique (Score:3)
During WWII the 'beeb sent messages to the resistance in occupied Europe. (examples at http://www.struthof.fr/en/test... [struthof.fr] ... damn that is an insanely long url...). If I remember my history "innocuous" announcements in newspapers were used to send covert messages by all sides in the Revolutionary and Napoleonic wars.
Heck, if you controlled your own botnet (reasonable to do and a minor profit center for terrorists) you could put "random" text at the ends of your spams to confuse bayesian spam filters and piggyback coded messages in the random text as well.
Chaffing your messages this way has the bonus of making traffic analysis useless if you are sending your message to literally millions of people.
Secure communication is always available. (Score:2)
Bagdahdi is a fraud (Score:1)
There is a technical cryptographic term for this (Score:4, Informative)
Its called steganography.
Hopefully... (Score:1)
Hopefully this puts spam-senders on the NSA's watch-list..
Yet another cyber-terrorist-bullshit story .. (Score:1)
--
further reading ref [stuartwilde.com]
Dr. Wertheimer was just cited on Slashdot (Score:3)
This made some member of the AMS very unhappy. Here is what angry mathematicians sound like: [ams.org]
If you read his statement, it is content free. As a admission of wrongdoing, it's completely worthless.
This is more of an apology for getting caught then anything else.
So when Dr. Wertheimer pontificates about filtering email and national security, you should not be very impressed. His agenda assumes the end of constitutional protections for privacy. He is not an honest man doing an honest job for an honest employer.
Big Pen1s! (Score:2)
Get V1aggra strong enuf to last thru the 72 v1rgins you will s00n meat.
Re:Big Pen1s! (Score:1)
Use hufman coding to disguise messages (Score:5, Interesting)
Overreach of Surveillance reduces chances ... (Score:3)
Given the fact that France has had one of the most extensive data retension programs since 2006 and were still unable to prevent the terrorist attack should give a clue to politicians and police ... ... All three terrorists (much like the 9/11 ones) were on watch lists and known, yet they were able to buy guns and plan this whole ordeal. Good job, politicians! Fund the police instead of keeping tabs on all of your country's inhabitants and cutting in to their private lifes ... ...
I believe the contrary is true: By relying on being able to prevent attacks through data retention (which by definition will create floods of data hard or impossible to interpret) and expecting to catch anybody before the fact, police have obviously reduced their work on surveillance of suspects as well as regular police work
Even if you had 100% surveillance of ALL the people, including the contents of ALL the communication, any person just slightly intelligent and versed in computers will be able to hide their communication from the state. Also, who ever called for checking every single letter mailed through the postal service? Or listening in to every person-to-person talk? Just because technology makes listening in on people possibly doesn't mean it should be done, or would be helpful to prevent crimes
OMG!!! (Score:2)
Oma gehts gut! (Score:2)
Oma gehts gut!
Goddamnit, Slashdot! (Score:2)
The ONE TIME one of those weird gibberish leet-speak "first-post-bsd-is-dying-you-fail-it" spam posts would be on-topic, I can't find one to cite!