Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Monday January 16 2023, @02:28AM   Printer-friendly
from the Guilt-by-association dept.

From: Gizmodo:

Motherboard originally reported that the bureau has somehow managed to nab the IP address of an alleged criminal using Tor, short for "The Onion Router," as part of an ongoing anti-terrorism case. The guy in question, Muhammed Momtaz Al-Azhari, of Tampa, Florida, was charged in 2020 with attempting to provide material support to ISIS. According to the government, Al-Azhari is "an ISIS supporter who planned and attempted to carry out an attack on behalf of that terrorist organization." Part of the government's case against Al-Azhari revolves around his use of Tor to make multiple visits to an ISIS-related website prior to the planned attack. ...

It's not exactly clear what happened here. Somehow, the government ascertained Al-Azhari's real IP address—which actually turned out to be his grandma's IP address because he was staying with her in Riverside, California at the time of his arrest, court documents state. Since Tor should have protected Azhari's real location and IP address, the question remains: how did the feds get this information?

--------

Is use of TOR probable cause for other investigative techniques that would ordinarily violate civil liberties? (ask a warrant issuing judge.) It it any different from wearing a ski mask to the bank teller window?


Original Submission

 
This discussion was created by Fnord666 (652) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by turgid on Monday January 16 2023, @07:58AM (1 child)

    by turgid (4318) Subscriber Badge on Monday January 16 2023, @07:58AM (#1287041) Journal

    Here in the UK they monitor and store every single transaction you do on the Internet and store the data for a year. They don't (routinely) store the content of your transaction, but they store the metadata, source and destination, time of day, that sort of thing. I would imagine that using something like Tor might cause suspicion since, despite having legitimate uses, it also is a very useful tool for criminals. I think if they suspect something, they just need to go to court for a warrant and then they can log and monitor more than just the metadata.

    Many years ago I worked for a company which had a special "box" in the server cabinet that cost > $12k and it was for doing deep packet inspection. We were developing some video gear. One of my colleagues went on YouTube to get some video to test with. Almost instantaneously, the alarms went off, corporate IT in the US were on the phone demanding that he be hauled up before HR and fired.

    He wasn't fired. The Americans were told to calm down.

    I was told by our local IT guy that this black box could to Man In The Middle on encrypted traffic, and in the US it was set up to do so. Corporate IT wanted to do that here in the UK too, but he firmly told them no, that it was illegal here and would not be enabled.

    I also many years ago knew a guy from the former Yugoslavia, who was understandably very nervous about government surveillance. He refused to use the Internet at all, and he was a Computer Scientist.

    Starting Score:    1  point
    Moderation   +3  
       Interesting=3, Total=3
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 3, TouchĂ©) by DannyB on Monday January 16 2023, @05:28PM

    by DannyB (5839) Subscriber Badge on Monday January 16 2023, @05:28PM (#1287090) Journal

    He refused to use the Internet at all, and he was a Computer Scientist.

    There is IP by avian carrier.

    I would also point out a minivan full of pocket hard drives has much higher bandwidth than any internet connection. But the latency sucks.

    If he does not use the internet, he might get actual work done.

    --
    When trying to solve a problem don't ask who suffers from the problem, ask who profits from the problem.