Thursday, April 26, 2012

FBI seizes server used to anonymize e-mail

The FBI recently seized an entire server that was used to anonymously make bomb threats against the University of Pittsburgh. The server was running Mixmaster, an anonymous remailer service, that was predominantly used by many civil and human rights groups. The shutdown of the server took out 300 email accounts, 50-80 email lists, and several websites. The organizations behind these accounts are not suspected of any wrongdoing.

“The FBI is using a sledgehammer approach, shutting down service to hundreds of users due to the actions of one anonymous person,” said Devin Theriot-Orr, a representative for one of the groups.

Here's a description of how the server works:
Anonymous remailers are used to send email anonymously, or pseudonymously. Like other anonymizing services such as the Tor network, these remailers are widely used to protect the identity of human rights activists who place themselves and their families in grave danger by reporting information about abuses. Remailers are also important for corporate whistle blowers, democracy activists working under repressive regimes, and others to communicate vital information that would otherwise go un-reported. 
The Mixmaster software is specifically designed to make it impossible for anyone to trace the emails. The system does not record logs of connections, details of who sent messages, or how they were routed.
As long as that's true, it makes you wonder why the FBI bothered to seize the server. In the meantime, these groups are doing a good job of making it seem like nothing more than an attack on free speech. You can read more about the seizure, the groups affected, and how the server works on Riseup Networks' website.

1 comments:

  1. A leap at the wheelApril 26, 2012 at 11:28 AM

    It is probably more accurate to state that no-one knows of a flaw in Mixmaster that permits discover of email traces. The system is not known to leak this information.

    In a sufficiently motivated investigation, like say this one, a much higher level of scrutiny will be applied. It's not uncommon for side channel attacks to be discovered in this way.

    ReplyDelete