TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

FBI operated 23 Tor-hidden child porn sites, deployed malware from them

222 pointsby _qik1over 8 years ago

24 comments

klodolphover 8 years ago
I feel like people are getting mad at the FBI for not pulling the trolley car lever in the right way, which is a valid thing to be mad about, but I believe the FBI made the right choice.<p>First, let&#x27;s not rely too heavily the analogies with drugs or prostitution. The differences between CP and drugs &#x2F; prostitution are too large to ignore anyway.<p>CP consumers are often producers as well. That&#x27;s a fact—you want CP, so you make some yourself and swap it with others to get more. This isn&#x27;t universal but it&#x27;s common enough that you should know about it. So the visitors to the CP web site are not all just consumers of CP but many of them are producers as well. This is relevant because you have to weigh the damage of distributing CP against the benefit of catching people who produce CP. People have stated that distribution revictimizes the children, but I would weigh that against the ability to catch people who were either producing their own or at least supporting other producers of CP.<p>So the FBI discovers this server, operates it for less than 30 days with a Tor exploit, and catches 200 people using the site. Yes, the FBI was complicit in the distribution of CP, but rephrased as a trolley car problem, this is basically like <i>not</i> pulling the lever, allowing the distribution to continue for a short time, and using that to catch 200 consumers—and how many of them are producers? You can pull the lever now and stop the distribution of CP, or you can let the trolley barrel down the tracks for a short time and save all these people somewhere else.<p>(People are saying that the exploit may have done damage to other police investigations from other countries—I don&#x27;t see any evidence that the exploit damaged the computer, merely that it leaked information about the computer.)
评论 #12932355 未加载
评论 #12932318 未加载
评论 #12933580 未加载
评论 #12932515 未加载
评论 #12932693 未加载
评论 #12933101 未加载
评论 #12934271 未加载
评论 #12932289 未加载
评论 #12932350 未加载
vilhelm_sover 8 years ago
This is about the Freedom Hosting hack in 2013. In 2013 Wired wrote<p>&gt; On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle [<a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2013&#x2F;09&#x2F;freedom-hosting-fbi&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2013&#x2F;09&#x2F;freedom-hosting-fbi&#x2F;</a>]<p>However, as far as we know, unlike the more recent Playpen thing, in the Freedom hosting case the FBI did not actually serve child pornography, they just displayed an error message. I don&#x27;t see anything in this article that suggests otherwise.
评论 #12933706 未加载
评论 #12932225 未加载
CurtMonashover 8 years ago
I think there&#x27;s a rather extreme hierarchy of wrongs here.<p>1. The crime that utterly dwarfs all others is involving children in the making of child porn.<p>2. After that, the crimes that dwarf all the rest are those that provide financial or practical support to child porn makers. Consuming child porn is generally regarded as one of those, and I&#x27;m fine with that categorization.<p>3. I&#x27;m sorry, but violating a victim&#x27;s theoretical privacy by distributing the images a little further doesn&#x27;t seem to be nearly as big a deal as helping to prevent the next live video of child porn from being made.<p>I&#x27;m usually regarded as being pro-privacy, but privacy is not something to be a rabid extremist about. Preventing physical sexual abuse of children, on the other hand, is a fine area for extremism.
评论 #12932581 未加载
评论 #12932575 未加载
评论 #12934337 未加载
Zuiderover 8 years ago
This is less like a drug or prostitution sting where the mark is arrested before the contraband can be consumed, and more like a hired hitman sting where the victim is actually murdered.<p>From a moral point of view, Child pornography is de-ontologically wrong. Nothing can justify its existence. Even if such a sting managed to shut down the entire industry, it would be moot to attempt to argue for its moral goodness in consequentialist terms.<p>The FBI could have used other means to establish criminal intent in the visitors to the websites along with the fact that they had used Tor to search out and visit those websites in the first place. They could have made prospective viewers engage in a series of incriminating acts such as requiring them follow a series of links with the promise of finding the material, or making them refresh the page. There was no need to provide the actual offensive material in order to make a solid case.
评论 #12932606 未加载
评论 #12932396 未加载
评论 #12934456 未加载
omribahumiover 8 years ago
I once experimented with a Tor router on a VM that isolated another VM&#x27;s internet connectivity.<p>The idea was |Stealth VM| --&gt; |Tor router VM| --&gt; |Virtual Box NAT|<p>The Tor router VM was running redsocks[0] to route all TCP traffic through tor&#x27;s socks proxy interface. The stealth VM also used tor&#x27;s DNS service.<p>That way, even if the stealth VM is compromised, it can&#x27;t access the internet directly.<p>[0] <a href="http:&#x2F;&#x2F;darkk.net.ru&#x2F;redsocks&#x2F;" rel="nofollow">http:&#x2F;&#x2F;darkk.net.ru&#x2F;redsocks&#x2F;</a>
评论 #12933324 未加载
评论 #12934514 未加载
unethical_banover 8 years ago
My example of an analogy would be like taking over a drug house and putting GPS in each shipment, but still allowing the drugs to get sold and consumed.<p>I&#x27;m not sure whether this is OK or not.
评论 #12931719 未加载
评论 #12931836 未加载
评论 #12932294 未加载
评论 #12932275 未加载
评论 #12932240 未加载
chickenbaneover 8 years ago
I have no love for those who visit child porn on Tor, but in general I am now very wary of the FBI. I can&#x27;t help but feel it&#x27;s a powerful organization that&#x27;s slowly turning into a dark oppressive one. The power grab from the CIA for the Petraeus affair. Using the sensitive nerve of terrorism to demand Apple unlock a phone. Throwing a last-minute wrench in the Clinton campaign. This is not going to end, especially under Trump.
uniclaudeover 8 years ago
&gt; <i>a Tor exploit of some kind to force the browser to return the user’s actual IP address, operating system, MAC address, and other data. As part of the operation that took down Playpen, the FBI was then able to identify and arrest the nearly 200 child porn suspects.</i><p>So, is getting someone arrested as easy as spoofing their network information and visiting those sites? I can already imagine trolls using this to have people swatted.
评论 #12932241 未加载
ikeboyover 8 years ago
It seems like this was related to their seizure of Freedom Hosting, and that they only hosted them for 30 days or less, reading the linked affidavit.<p>So they seized an onion hosting provider that had 23 cp sites, they ran those sites for a few weeks, then shut them down.
sschuellerover 8 years ago
Isn&#x27;t the whole issue the exploitation of children? As in the FBI should be going after the creators and distributors not become a distributor.
评论 #12932169 未加载
zarothover 8 years ago
I think the clear differential here is that compromising the server and tracking its users while it was in operation by Freedom Hosting would perhaps be &quot;OK&quot; but confiscating the server, moving it to HQ, and then operating the site themselves is decidedly not.<p>Keep in mind, you can&#x27;t just pause the site and expect your targets not to notice, they had to actively maintain the site (and consider what that means) to keep their targets coming back. It&#x27;s disgusting and disturbing. And if it&#x27;s what we know about it, it&#x27;s also just the tip of the iceberg.<p>At least with Fast &amp; Furious I think it was real criminals running the guns and just a failure to intervene. I think a failure to intervene here would be seen as unacceptable as well. But here we have way more than failure to intervene, they effectively provided the guns and helped run them across the border.
aezellover 8 years ago
This is the same as cops offering to sell drugs or sex and then busting the buyers.
评论 #12931508 未加载
评论 #12931533 未加载
评论 #12931615 未加载
评论 #12931506 未加载
lightedmanover 8 years ago
IOW the FBI is directly responsible for the spread and proliferation of child pornography. They&#x27;ve hurt more people than they&#x27;ve rescued.<p>Time to charge the FBI with aiding and abetting. Period. Equal treatment under the law. Period.
评论 #12933078 未加载
smailiover 8 years ago
<i>That NIT, which many security experts have dubbed as malware, used a Tor exploit of some kind to force the browser to return the user’s actual IP address, operating system, MAC address, and other data.</i><p>That&#x27;s quite the exploit.
MichaelBurgeover 8 years ago
I understand the ban on child porn is justified via the interstate commerce clause:<p><i>Federal jurisdiction is implicated if the child pornography offense occurred in interstate or foreign commerce. This includes, for example, using the U.S. Mails or common carriers to transport child pornography across state or international borders. Additionally, federal jurisdiction almost always applies when the Internet is used to commit a child pornography violation. Even if the child pornography image itself did not traveled across state or international borders, federal law may be implicated if the materials, such as the computer used to download the image or the CD Rom used to store the image, originated or previously traveled in interstate or foreign commerce.</i><p><a href="https:&#x2F;&#x2F;www.justice.gov&#x2F;criminal-ceos&#x2F;citizens-guide-us-federal-law-child-pornography" rel="nofollow">https:&#x2F;&#x2F;www.justice.gov&#x2F;criminal-ceos&#x2F;citizens-guide-us-fede...</a><p>Theoretically, would a general citizen be exempt from the ban if he manufactured his own CD-ROMs, and his own CPUs in-state?<p>It might be illegal for them to operate the sites for extended periods of time. It doesn&#x27;t seem illegal for them to deploy malware as part of an investigation. I&#x27;m looking at (f) here:<p><a href="https:&#x2F;&#x2F;www.law.cornell.edu&#x2F;uscode&#x2F;text&#x2F;18&#x2F;1030" rel="nofollow">https:&#x2F;&#x2F;www.law.cornell.edu&#x2F;uscode&#x2F;text&#x2F;18&#x2F;1030</a><p>So the worst that could happen is that the evidence gets thrown out. If they weren&#x27;t going to otherwise be able to nab the person, the worst that could happen is they lose the case.
评论 #12931576 未加载
评论 #12931431 未加载
评论 #12931918 未加载
评论 #12932222 未加载
eeZah7Uxover 8 years ago
50 comments and nobody pointed out that the honeypot sites would attack visitors regardless of their citizenship.<p>Given that 95% of people in the world are not from US, how many visitors were police officers from other countries, conducting their own investigation?
评论 #12931911 未加载
评论 #12932226 未加载
评论 #12932259 未加载
antoineMoPaover 8 years ago
When I have debates about encryption and surveillance, CP &amp; terrorism are arguments that are difficult to address. I think this solves a part of the problem.
forthwoartover 8 years ago
&gt; FBI opreated 23 Tor-hidden child porn sites Uh, what? I don&#x27;t think the end justifies the means here
评论 #12931502 未加载
评论 #12931491 未加载
apiover 8 years ago
Doesn&#x27;t this show that yes you can do police work in the post crypto age?
评论 #12931255 未加载
评论 #12932322 未加载
评论 #12931258 未加载
stewartjarodover 8 years ago
I read this title and said &#x27;What the fuck&#x27;
cloudjackerover 8 years ago
Forget the Firefox Tor browser, use Whonix<p>Two Virtual Machines, the one you actually use for browsing and stuff only connects through the gateway virtual machine.<p>If an exploit breaks out the firefox skin, it is just in the host VM, if it somehow breaks out of the host VM it is in the gateway VM.<p>We could keep going down possibilities, but we are far removed from attack vectors that actually exist.
draw_downover 8 years ago
When you gaze long into the abyss, the abyss gazes also into you.
dsfyu404edover 8 years ago
Shit, if they keep going at this rate pretty soon they&#x27;re gonna need to start worrying about ant-trust laws.
nameisuover 8 years ago
GREAT MOVE