Beruflich Dokumente
Kultur Dokumente
Not Cryptic:
An Intro To
Crypto-Anarchy and
Practical Resistance of
the
Modern Surveillance
State
In accordance with the Honor Code, I affirm that this work is my
own and all content taken from other sources has been properly
acknowledged.
T@b1e 0f (Dis)C0ntents
Introduction.............................................................Page 3
Definitions...............................................................Page 5
A Brief History of U.S. State Surveillance ..............Page 10
A Brief History of Crypto-Anarchy............ ..............Page 14
How-To Guide.........................................................Page 17
Conclusion..............................................................Page 24
Works Cited............................................................Page 25
Pamphlet by k8
A Fri3ndly Intr0duction...
Its no secret that the United States Government and an
facebook friends other facebook friend could lead to a profile being built
around you,even though you are completely unrelated and may
have never interacted with this person.Millions are caught in the
largest dragnet surveillance program in history. (Macaskill and
Important Definitions
Poitras)
PATRIOT ACT: 2001 legislation that created a broad legal
framework for expanded mass surveillance, including the
secret requisition of library records, phone conversations,
emails, texts messages and financial documents. It passed
almost unanimously in the Senate, and was renewed
through June 2015. In June of 2015, it was succeeded by
the USAFREEDOM Act, which renewed most sections but
redacted the phone data collection program (Section 215).
(Epic.org)
Bitcoin: A digital currency not attached to any government
and represented by unique units of data that are being
kept track of by a public ledger known as Block Chain. The
information that represents a users bitcoin data is held in
a digital wallet, which stores the information necessary to
use bitcoin for transactions. Bitcoin can be invested, used
in online marketplaces, or at various business. (Wikipedia)
Open Source: A variety of software where the source code
that was used to design the software is available for public
view. Open source software is considered more secure
because since it is open to the public to see, individuals
can see exactly what functions the software performs, and
can make changes if they find something they dont like.
Closed source software is a type of software wherein the
source code is not freely available, and therefore the user
has no way to know firsthand exactly what functions a
piece of software performs. This presents serious risks to
software users. (opensource.com)
(tails.boum.org)
Crypto-anarchy: Crypto-anarchy is an ideology
that strives to use encryption to build a world where
State institutions and economies can be subverted
by utilizing encryption techniques, and make room for
the development of commerce and the free spread of
information outside of State control. (Baker)
Cypherpunk: A subculture/the name for a participant
of said subculture that believes in using encryption
technology to protect privacy, perform online activism,
uphold the ideology of crypto-anarchy, and create an
online partition between the actions of individuals and the
authority of the government. (Baker)
10
and was known as the Office of Strategic Services, or the OSS. Its
purpose was to collect wartime data meant for military strategizing.
At the conclusion of World War II, the OSS was dismantled by
President Truman and replaced with a peacetime data-collecting
surveillance agency known as the Central Intelligence Group,
or CIG. This Agency was not long-lived, and with the passing of
the notorious National Security Act, the CIG was replaced by the
infamous CIA. It was understood by congress at the time that the
CIA would collect data as well as simply coordinating it, though
this was never stated outright. Therefore, the CIA was technically
allowed to collect clandestine data abroad, and broadly interpreted
the scope of their information gathering permissions to mean
that they had substantial authority. The National Security Act also
stated that the CIA was allowed to work with other Intelligence
Gathering Agencies (Surveillance networks) such as the FBI,
the primary function of which was to operate domestically. At
this point, however, the CIA was not allowed to operate against
American nationals, in the continental U.S. or in the U.S.s colonial
holdings. The ambiguous language of this bill left room for this to
be changed, though, and change it did. (Conrad, 968-971)
In 1974, the New York Times exposed the CIA for
undertaking a massive illegal domestic intelligence operation
(Conrad, 968) and, as a result, restrictions were placed on the
Central Intelligence Agency. This all changed in 1981, when
President Ronald Reagan instituted Executive Order 12,333, and
changed the way the CIA, and domestic surveillance in the U.S.,
operated forever. This Executive Order effectively unleashed
the CIA and gave them the power to investigate and gather
information on U.S. Citizens in the United States to an extent that
had never been seen before. (Conrad, 968) A Cornell Law Review
11
This Executive Order set a precedent for the collection
of information, and surveillance of, U.S. citizens that can be felt
today. This is the Executive Order that gives the NSA authority to
collect mass metadata from United States Citizens domestically.
This was the crucial turning point for mass surveillance in the
U.S. as we know it today. This was the point at which this specific
brand of Governmental overreach was written into law, called out
for being pretty much illegal, and kept in place anyway. It survives
to this day, and was amended by Bush in 2004 with another
Executive Order, which only expanded its reach further to allow for
the collection of all data, as long as it was in the name of national
defense. (Macaskill and Dance, Part 5) This means that even
when the PATRIOT Act expired in June of 2015, the collection of
mass data from U.S. citizens was still legally condoned before
its renewal, only it was legal for the CIA to conduct this mass
surveillance in addition to the FBI, if you recall, with whom they
are allowed to work.
In keeping with the trend of mass surveillance increasing
with every new wartime era, the newly-renewed PATRIOT Act was
introduced a month after 9/11 as the U.S. prepared itself to invade
Iraq. (Wikipedia) This Act expanded the FBIs ability to snoop into
12
the telephone, financial, and e-mail records of its citizens. The Act
was later amended such that the United States National Security
Agency (NSA) was no longer allowed to collect mass phone data
from private citizensinstead they have to go get it from the
phone company, a non-change to give the illusion of protecting
privacy. (Wikipedia)
The PATRIOT act was only the tip of the 2001 Surveillance
iceberg. But the true extent to which the Government, and
companies, such as Google, were collecting our data (with neither
our knowledge nor a warrant) would not become known until 2013
when NSA contractor Edward Snowden revealed the existence
of PRISM and the true power of the NSA to trample our privacy
rights was revealed. The PRISM program was established in
2007 and is what allowed the NSA to secretly collect Internet
communications from U.S. citizens. Though collection of Internet
data started six years earlier, it eventually reached a point where
it was such a massive Government program that the Government
made it an entirely new project. (Wikipedia)
13
Edward Snowden
A series of linguistic oversights by Congress, an illegal
Executive order that was updated later to be made more Illegal,
secret government surveillance programs... The history of U.S.
surveillance sounds more like an elaborate, Orwellian conspiracy
theory than a series of laws that were ratified and are routinely
justified as necessary under the guise of national security.
Luckily for us citizens, theres a counter-movement bent on
resisting mass surveillance, and it is no further away than the click
of a mouse.
14
15
16
17
Once you have downloaded the installer, Follow the
following steps:
Select Tails from the drop-down list labeled Step 1
Select Browse and choose the Tails file. Its extension is
.ISO
Select which usb stick you want to install Tails to
Select We Will Format as FAT32
18
Click Create
Once complete, look up the boot menu key for your
particular computer. You can search online for (your computer
model number and brand) boot menu key. Its usually F12, F1 or
F9.
Now, shut down your computer. Then, restart your
computer with the usb drive plugged in. Once your computer
monitor turns on, press the boot menu key. If the windows logo
appears, you have waited too long; restart and try again.
Once in the boot menu, change the boot priority so that the
usb drive boots first. This way, if you insert a bootable USB drive
(like tails), your computer will boot from the USB. If there isnt a
drive, you will boot from the Hard Drive normally.
Make sure whenever you are booted in tails to never
remove the usb drive!
Exit the boot menu. TAILS should start automatically. Once
TAILS desktop is visible, Select Applications/Tails/Tails Installer.
Insert the second usb drive into the computer. Select Install by
cloning. Choose the second USB stick from the Target Device
menu, and click Install Tails
Shut down the computer, remove the first usb stick, and
leave the second one plugged in. Now, Tails will start from the
second drive.
Enter your wifi password. If a popup offers to upgrade your
copy of tails, do so. When that is finished, Select Applications/
Tails/Configure Persistent Volume. Specify a passphrase, click
create, and voila! Your tails stick now will retain your personal
19
data. When in doubt, enable persistence for options you are not
sure of the nature of; they could come in handy. You are now
running Tails!
Once you have installed Tails onto one USB drive, you
can easily install it onto another by cloning it onto another USB
drive. This can be done by starting up a computer and running
tails. Then plug in an empty USB drive of sufficient size. Once the
computer is fully on, go to Applications> Tails>Tails Installer, and
you will be prompted to install Tails by cloning it onto the empty
USB drive you plugged in. Share it with your friends! (tails.boum.
org)
To use bitcoins, first you need a wallet. This is a place to
securely store your bitcoins. Online wallets are risky, because
the creator can simply go offline and steal the coins. Ideally, one
should use an offline wallet like Electrum or Mycellium, so only the
owner of a computer with the correct password can access the
coins.
Buying bitcoins can be done in a few different ways. Some
users link their bank account or credit card to an online exchange,
however this undermines the anonymity of the user. Moreover,
depending on the jurisdiction of the user and the exchange,
regulations by state and federal banking laws such as the USs
PATRIOT Act can delay and even prohibit users from using these
online exchanges. The alternative is to find an ATM or a vendor in
person. The easiest way to find bitcoin vendors is to use a site like
localbitcoins.com, which indexes a worldwide list of people selling
20
21
22
In order to access the Tor Server, one must download
the Tor browser. It works the same as any other internet browser
with the exception of the fact that it doesnt leave itself as open to
Mass Data collection. The download link for the Tor browser can
be found here: https://www.torproject.org/projects/torbrowser.html.
en#downloads .
The browser will allow a users Tor client to set up a circuit
of encrypted connections where information only travels in the
forward direction. This is what helps ensure that a users activity
on the Tor network stays encrypted- because the data is never
linked back to the computer from which it came.
The Homepage of the Tor browser offers some tips and
warnings for Tor users. For example, try not to torrent over the
Torr network, and dont open download files from the Tor browser
while still connected to the Internet. The Tor browser will warn you
before it automatically opens downloads on external applications.
THIS IS A SERIOUS WARNING. If you open a downloaded item
with an external application when connected to the internet,
it essentially defeats the purpose of using Tor at all as it will
reveal your non-Tor IP address and subvert the encryption and
the modicum of privacy that it provides. The full list of warnings
and hints can be found at: https://www.torproject.org/download/
download.html.en#warning .(Torproject.org)
The Tor network can also be accessed on mobile devices
such as smartphones by downloading an app called Orbot that
allows for connection between the mobile device and the Tor
network, the same way that the Tor browser would establish
such a connection on a computer. In order to view onion network
23
Clos1ng Th0ughts
When employing crypto-anarchist techniques its important
to remember that nothing will provide 100% privacy. The reach
of intelligence agencies and computer experts is too great, and if
they genuinely wanted to find out what a person was doing online,
they could. If there were enough encryption techniques, it would
take a long time and be expensive, but it is possible.
That being said, the Tor network and bitcoin are often
associated with the Deep Web and marketplaces that sell items
and services that the U.S. Federal Government considers illegal.
This guide in no way condones or encourages the use of these
marketplaces, nor the purchase of these items. This guide is
meant to empower users to protect their right to privacy and to
provide some means for resisting the abuse of State power that
The Surveillance Industrial Complex embodies.
I will leave you with this final thought: Just because 100%
privacy isnt guaranteed doesnt mean that theres no point. The
average user conducting routine online activity will benefit greatly
from using these encryption techniques and have a lot less of
their Internet activity causally monitored, collected, and indexed.
Encryption technique is constantly evolving, so I hope this
guide can offer one small step forward in the path towards State
resistance and subversion. Never stop resisting!
24
Works Cited
.Baker, Jennifer. Cypherpunk Rising: WikiLeaks, Encryption,
and the Coming Surveillance Dystopia. Plus Jacob Applebaum
Interview.Revolution News. N.p., 13 Mar. 2013. Web. 10 May
2016.
Bitcoin.Reddit.com. N.p., n.d. Web. 13 May 2016.
Bitcoin.Wikipedia. Wikimedia Foundation, n.d. Web. 09 May
2016.
Conrad, Sherri J. Executive Order 12,333: Unleashing the CIA
Violates the Leash Law.Cornell Law Review70.5 (1985): 96875.Http://scholarship.law.cornell.edu/. June 1985. Web. 30 Mar.
2016.
Crypto-Anarchy. N.p., n.d. Web.
Encryption and Security Protocols in a VPN. Retrieved 201509-23.
Federal Bureau of Investigation.Wikipedia.org. N.p., n.d. Web.
General Information.Tails. N.p., n.d. Web.
How Does Bitcoin Work?Bitcoin. N.p., n.d. Web. 12 May 2016.
MACASKILL, EWEN, and Gabriel Dance. NSA Files: Decoded
What the Revelations Mean For You.Theguardian.com. N.p., 1
Nov. 2013. Web. 30 Apr. 2016.
25
thanks
to my Crypto-Anarchist
friends,
Special
What Is Open
Source?Opensource.com.
N.p., n.d.
Web. 11
you
know
who
you
are
;)
May 2016.
26
K3EP R3SISTING