How Tor Users Get Caught By Saying Too Much

Mental Outlaw
25 Jan 202413:41

Summary

TLDRThe video script discusses the common obsession with low-level technical details in digital security, such as VPNs and anonymizing networks, which often distracts from the real issues. It highlights that hackers are usually caught not due to technical flaws but by oversharing personal information. Examples include the cases of Sabu and Jeremy Hammond from the hacking group LulzSec, who were doxed and caught due to excessive personal disclosures in IRC chats rather than any technical missteps.

Takeaways

  • 🔒 The obsession with low-level technical details often distracts from more critical operational security (opsec) practices.
  • 🗣️ Excessive talking and sharing personal details, rather than technical mistakes, is what usually leads to hackers getting caught.
  • 🕵️‍♂️ High-profile malware cases like Pegasus and Stuxnet were traced back to human error in communication, not technical flaws.
  • 📡 Users of the Tor network got caught due to operational mistakes, such as logging into IRC channels without a proxy to hide their IP address.
  • 🎭 'Sabu' from Anonymous was doxed and caught due to his careless online behavior, including frequent mentions of a personal website with real-life details.
  • 🔗 The overlap of hacker aliases and revealing personal information led to Jeremy Hammond's identification and arrest.
  • 🌐 Technical configurations like using Tor or a VPN are less important than ensuring one's personal details and operational methods are not exposed.
  • 🤐 The importance of silence and discretion in communications cannot be overstated, as every detail shared can be a potential lead for investigators.
  • 📜 Historical arrest records and political affiliations, when shared carelessly, can provide law enforcement with enough information to identify and locate an individual.
  • 💬 Even within trusted groups, it's crucial to avoid sharing specific details about one's technical setup or personal life that could compromise security.
  • 📍 The script emphasizes that operational security is more about being cautious with the information one shares rather than the specific tools or technologies one uses.

Q & A

  • What is the main concern expressed in the transcript about people who want to improve their digital security?

    -The main concern is that people often obsess over low-level technical details, such as the trustworthiness of anonymizing networks or the security of different operating systems, rather than focusing on operational security (opsec).

  • What is the common mistake made by hackers that leads to their capture according to the transcript?

    -The common mistake is not a technical one but rather saying too much, which can lead to their identification and capture.

  • Can you provide an example of how hackers were caught due to their own mistakes, as mentioned in the transcript?

    -Hector Monsegur, known as Sabu, was caught because he logged into an IRC channel without using a proxy, exposing his IP address, and also because he frequently mentioned a personal website with his real information.

  • What was the significance of the personal website 'pvt.org' in the context of Sabu's capture?

    -The website 'pvt.org' was significant because it contained Sabu's real name, phone number, and email, which could be easily found through a whois search, aiding in his identification.

  • How did Jeremy Hammond's involvement with anarchist groups contribute to his capture?

    -Hammond's involvement with anarchist groups was a mistake because he mentioned it in IRC chats, which allowed the FBI to collaborate with the Chicago PD to find information about his past arrests and activities.

  • What is the importance of not revealing personal details or political affiliations during operational activities?

    -Revealing personal details or political affiliations can compromise ops security by providing law enforcement with additional information that can be used to identify and locate an individual.

  • Why is it a mistake to discuss technical setup details like using a VPN or specific hardware during operations?

    -Discussing technical setup details can give away too much information about how an operation is conducted, which can be used by law enforcement to narrow down suspects and gather evidence.

  • What is the analogy made in the transcript between the Miranda Rights and operational security?

    -The analogy is that just as the Miranda Rights advise you to remain silent to prevent self-incrimination, operational security requires minimizing the information shared to prevent identification and capture.

  • What is the takeaway message from the transcript regarding the focus of digital security?

    -The takeaway message is that focusing on operational security, such as not revealing too much information, is more important than obsessing over specific technical tools or systems.

  • How does the transcript suggest that the use of multiple identities can be compromised?

    -The use of multiple identities can be compromised when those identities overlap, as seen with Jeremy Hammond, where he used different usernames in the same chat, revealing his connections to various hacker aliases.

  • What is the relevance of the indictment details for Jeremy Hammond mentioned in the transcript?

    -The indictment details are relevant because they show how Hammond's own words in IRC chats, revealing personal and operational details, were used as evidence against him by the FBI.

Outlines

00:00

🔒 The Pitfalls of Obsessing Over Technical Details in OpSec

The first paragraph discusses the common mistake of focusing too much on low-level technical details in digital security, such as trusting certain anonymizing networks or the debate over VPN usage and operating systems. It emphasizes that hackers are rarely caught due to technical flaws but rather from revealing too much information. The paragraph uses the example of Hector Monsegur, known as Sabu, who was caught due to not masking his IP address and sharing personal details on a website, leading to his identification and subsequent cooperation with the FBI.

05:00

🕵️‍♂️ The Consequences of Oversharing in Hacking Communities

The second paragraph delves into the story of Jeremy Hammond, another hacker who was caught not because of technical errors but due to oversharing personal information. Despite not making obvious technical mistakes during his involvement with the hacking group LulzSec, Hammond's multiple hacker aliases were linked through his excessive communication in IRC chats. His arrest history and political affiliations were mentioned, which the FBI used to corroborate his identity and activities, highlighting the importance of maintaining separate identities and being cautious with the information shared online.

10:03

🗣️ The Importance of Silence in Maintaining Operational Security

The third paragraph underscores the critical role of discretion in operational security (opsec). It points out that even with sophisticated tools, revealing personal details or operational methods can lead to identification and capture. The example of Hammond continues, illustrating how he disclosed too much about his current operations, such as using Tor and an Apple laptop, which the FBI confirmed during surveillance. The paragraph concludes by drawing a parallel between the Miranda Rights and the need for silence in online chats, especially when engaging in illicit activities, to prevent self-incrimination.

Mindmap

Keywords

💡Digital Obsc

Digital Obsc is a term that refers to the practice of using digital tools and techniques to obscure one's identity or activities online. In the video, it is mentioned that many people who wish to improve their digital obsc are overly concerned with technical details, which can detract from more important aspects of operational security (opsec).

💡Anonymizing Network

An anonymizing network is a system designed to protect the identity of its users by hiding their IP address or other identifying information. The script discusses the obsession with whether certain anonymizing networks like Tor can be trusted, highlighting the focus on technical aspects of digital security.

💡VPN

A VPN, or Virtual Private Network, is a service that creates a secure, encrypted connection over the internet, often used to protect privacy and bypass geographic restrictions. The video script mentions debates over whether to use a VPN with Tor, indicating a common concern about the best practices for maintaining online privacy.

💡Opsec

Opsec, short for operational security, refers to the measures taken to protect sensitive information from being discovered by unauthorized parties. The video emphasizes that obsessing over technical details can overshadow the more critical aspects of opsec, such as being careful with the information one shares.

💡Zero Day

A zero-day vulnerability is a security flaw in software that is unknown to the software's developers, and thus, unpatched. The script points out that hackers are rarely caught due to zero-day exploits in systems like the Linux kernel, suggesting that other factors are more commonly at play in their apprehension.

💡Pegasus

Pegasus is a highly sophisticated form of malware reportedly used for surveillance purposes. The video script uses Pegasus as an example of advanced malware that, despite significant resources, was not the downfall of those involved but rather the result of someone saying too much.

💡IRC

IRC, or Internet Relay Chat, is an online chat system that was widely used in the past for real-time communication. The script mentions IRC as a platform where hackers, such as Sabu and Jeremy Hammond, made the mistake of revealing too much information, leading to their identification and capture.

💡Doxxing

Doxxing is the act of publicly revealing someone's personal information without their consent. In the video, it is mentioned that Sabu was doxxed by former members of Anonymous, which contributed to his eventual arrest by the FBI.

💡FBI

The FBI, or Federal Bureau of Investigation, is the principal federal law enforcement agency of the United States. The script describes how the FBI was able to apprehend hackers like Sabu and Jeremy Hammond through surveillance and the use of informants.

💡Mitigation

In the context of the video, mitigation refers to the process of reducing the risk or impact of a potential threat. The script suggests that being quiet and not revealing too much information is a more effective mitigation strategy for maintaining opsec than focusing on technical tools.

💡Miranda Rights

Miranda Rights, or Miranda warning, is a legal warning that police officers in the United States must inform a suspect of before starting an interrogation while the suspect is in police custody. The video script uses the Miranda warning as an analogy to stress the importance of being cautious with one's words, as anything said can be used against them.

Highlights

The obsession with low-level technical details such as the trustworthiness of anonymizing networks often fuels endless online debates.

Being aware of different technologies and experimenting with them for educational purposes is sensible, but overemphasis on technicalities can be counterproductive.

Hackers are rarely caught due to complicated technical mistakes; instead, it's often due to oversharing information.

State-sponsored malware like Pegasus and Stuxnet are developed with intelligence gathered from information leaks, not just technical prowess.

Hector Monsegur, aka Sabu, was caught due to a technical slip-up and revealing personal details on a personal website.

Sabu's case illustrates the importance of not correlating personal information with hacking activities.

Jeremy Hammond's arrest was facilitated by his overlapping hacker identities and excessive information sharing in IRC chats.

Hammond's political affiliations and personal history were used against him, highlighting the risk of sharing personal beliefs in operational contexts.

Technical mistakes are less common reasons for getting caught compared to operational security failures like revealing too much about one's methods and tools.

The importance of treating all online communications as if they are monitored by law enforcement to maintain operational security.

The Miranda Rights illustrate the principle that only information that can be used against you will be remembered and used in court.

The transcript emphasizes that operational security is more about discretion and less about the specific tools or technologies used.

Sharing technical setup details like using Tor or a VPN can be as damaging as revealing personal information.

The transcript suggests that operational security is better served by silence and discretion rather than technical complexity.

The value of maintaining separate identities and not correlating personal information with operational activities in the context of hacking.

The transcript provides real-world examples of how information disclosed in online chats can be used for doxing and legal prosecution.

The importance of not discussing personal legal history or political affiliations that could compromise one's operational security.

The transcript concludes that in the context of operational security, the principle of 'less said, better secured' holds true.

Transcripts

play00:00

so many people who want to improve their

play00:03

digital obsc spend way too much time

play00:06

obsessing over low-level technical

play00:09

details like whether or not tour or some

play00:12

other anonymizing network can be trusted

play00:16

and I think that this kind of obsession

play00:18

over the technical details is what fuels

play00:21

these endless online conversations I see

play00:24

about whether or not you should use a

play00:26

VPN together with t or whether one

play00:30

operating system is going to be you know

play00:32

more secure give you better opsc over

play00:34

another or even whether you should use

play00:38

libbre booted Hardware you know an open-

play00:40

Source bios on Hardware that's a decade

play00:44

old for certain operations and of course

play00:47

it makes sense to at least be aware of

play00:51

these different Technologies and to

play00:53

experiment with them for educational

play00:55

purposes or to possibly even learn how

play00:57

they work to work them into your

play01:00

operations and improve your opsec but if

play01:03

we look at ways that hackers actually

play01:06

get caught you know the mistakes that

play01:08

they made and thus what details should

play01:12

really be obsessed over there's rarely a

play01:17

complicated technical mistake at play

play01:21

it's almost never a zero day in the

play01:25

Linux kernel that gets them caught it's

play01:28

never the Intel management it's almost

play01:30

never a flaw with tour's protocols or

play01:34

someone's encryption being broken but

play01:37

what is always involved is someone

play01:40

saying too much and even in these

play01:44

extreme cases where you know a lot of

play01:46

money and resources are thrown into

play01:50

creating some Advanced malware like

play01:52

Pegasus or even something like stuck net

play01:55

where you know the state is deploying

play01:58

malware and in information leak somebody

play02:01

saying too much is what ultimately leads

play02:04

to that malware's Target being picked

play02:08

and in the case of stuck net

play02:10

intelligence was actually gathered about

play02:12

the target which was Iran's nuclear

play02:14

program and the Machinery involved with

play02:18

that enrichment

play02:19

process prior to the malware being

play02:22

developed that intelligence helped them

play02:24

develop the malware because then they

play02:26

knew you know what machines were going

play02:27

to be used and so they could make them

play02:29

malware to attack those devices

play02:32

directly so let's look at some examples

play02:35

of how tour users hackers that were

play02:38

using tour got caught so this is Hector

play02:42

moniger also known by his hacker name

play02:46

saboom who was a member of anonymous and

play02:49

the founder of another hacking group

play02:52

called LC that was a pretty notorious

play02:55

hacker group that was active in the

play02:57

early

play02:58

2010s so he had actually gotten doxed by

play03:03

members of back trays who were former

play03:05

members of anonymous prior to his FBI

play03:09

arrest but Sabu was under FBI

play03:12

surveillance at this time and so that's

play03:14

why backra actually took down uh their

play03:17

docks that or at least the links to the

play03:19

docs that they had published um because

play03:23

you know he once mistakenly logged into

play03:26

an IRC Channel where he was discussing

play03:29

operations with other hackers without

play03:31

using a proxy to mask his real IP

play03:33

address so this exposes his IP and then

play03:38

of course the FBI can get his name from

play03:41

that but what also aided the FBI in

play03:44

Catching Sabu and back Trace in doxing

play03:47

him in the first place was his frequent

play03:50

mentions of a personal website that he

play03:53

had in the early 2000s called pvt. org

play03:58

where he had his real name and F phone

play03:59

number and email listed in the contact

play04:01

information for the domain so anybody

play04:05

could have just done a who is on pvt.

play04:08

org and get sabo's docs which is

play04:11

probably what back trce ended up doing

play04:13

to uh get his docs and of course they

play04:15

had uh tons of screenshots from IRC

play04:18

chats where he's just saying too much

play04:21

you know he's giving away a lot of

play04:22

information about where he lives and

play04:25

things that he does so that they're able

play04:27

to correlate that with the who is D

play04:29

details um so yeah

play04:31

obviously Sabu leaking his IP that was a

play04:35

big fail since the fbii just got his

play04:38

info from the ISP but the who is docs

play04:41

and Sabu talking about this website in

play04:43

IRC corroborates that IP address

play04:47

evidence and it gets twice as much

play04:49

surveillance sent to you twice as fast

play04:52

and it's pretty much over once close

play04:56

surveillance starts because the FBI I

play05:00

once they surveilled him quickly

play05:02

realized that Sabu was taking care of

play05:05

his two young cousins and so they were

play05:08

able to use that against him when the

play05:10

FBI raided his house apparently

play05:13

according to him they didn't bust down

play05:15

his door do anything crazy like that

play05:17

they basically just knocked on the door

play05:19

and told him to cooperate with them or

play05:21

he was going to go to jail for life and

play05:23

the state would take his younger cousins

play05:26

away and so SAU became

play05:30

informant and this led to others in his

play05:33

ring like Jeremy Hammond to get caught

play05:37

now what's interesting about Hammond is

play05:39

apparently he didn't make any technical

play05:42

mistakes like signing on to IRC without

play05:46

using a proxy at least not during his

play05:49

involvement with LC but again he talked

play05:53

too much and he let these various

play05:57

identities you know various hacker

play05:59

identi ities overlap so you can see that

play06:02

he's got numerous hacker

play06:04

aliases in his indictment but there were

play06:08

multiple incidents in recorded IRC chats

play06:12

and you should be assuming that any

play06:14

every IRC Chaz

play06:16

recorded where he would have one

play06:19

username but then he would respond to

play06:21

another or he would use another username

play06:24

and then tell people that he's this user

play06:26

as well the whole point of using

play06:29

multiple identities is to reduce how

play06:32

much someone knows about you so if you

play06:34

let those identities overlap then that's

play06:36

going to unravel all of your efforts uh

play06:39

so we can see here I mean this is a

play06:41

perfect example of saying too much um so

play06:44

this is the indictment for uh Jeremy

play06:47

Hammond and it says in a chat with

play06:50

covert witness one this would be Sabu

play06:53

honor about July 21st 2011 an individual

play06:57

using the Alias and our chaos later

play07:01

identified as the defendant Jeremy

play07:03

Hammond told Sabu that he had been

play07:06

arrested for weed and did two weeks in

play07:09

county jail and then later in that same

play07:12

chat the individual said don't tell

play07:13

anyone cuz it could compromise my

play07:16

identity but I am on probation I've done

play07:19

time before though it's all cool so

play07:23

quick tip if you've got to tell somebody

play07:26

not to tell anybody else that's

play07:29

something that you shouldn't be telling

play07:31

that person in the first place because

play07:34

they could be an informant as you see

play07:37

here uh but regardless of who you're

play07:39

talking to this kind of information you

play07:41

know saying that uh you got arrested for

play07:45

weed and that you're on probation stuff

play07:48

could very likely be used by a civilian

play07:51

to get your docks it can definitely be

play07:54

used by an FBI agent obviously here it

play07:56

was used by the FBI to get his docks um

play07:59

um so you got to be aware when

play08:02

conducting these kinds of operations

play08:04

really you've got to assume that every

play08:06

single chat is going to be read by an

play08:10

FBI agent at some point uh and we can

play08:13

also see that uh Hammond when he used

play08:18

the Alias

play08:21

subg was telling Sabu that he was

play08:24

involved with these Anarchist groups uh

play08:28

he described him self as an anarchist

play08:32

communist and said that he supported the

play08:35

anarchist movement and that he was also

play08:37

involved in militant anti-racist groups

play08:41

now obviously this was another huge

play08:44

mistake because the FBI were able to

play08:46

talk with the Chicago PD to get

play08:49

information about Hammond's arrest for

play08:52

involvement and various Anarchist

play08:54

protest and involvement in the hacking

play08:57

of a white supremacist site years prior

play09:01

and that's something that he wasn't even

play09:02

charged for that's just something where

play09:05

you know they had his details because I

play09:06

believe he uh didn't mask his IP address

play09:09

the whole time when he was breaking into

play09:11

uh that white supremacist site he did

play09:13

make technical mistakes in the past but

play09:15

not you know so many when he was again

play09:19

involved with LC but a lot of the arrest

play09:23

information right typically arrest

play09:26

information and you know things that

play09:27

you're convicted of

play09:29

uh end up becoming public record which

play09:33

is why divulging this information about

play09:35

yourself which isn't even relevant to

play09:38

your current

play09:39

operations is such a grave error you

play09:42

know people who aren't even in law

play09:45

enforcement would have been able to dox

play09:47

him with this with all of these details

play09:50

plus introducing a bunch of political

play09:52

stuff or stating your strong political

play09:54

opinions when it's not necessary to your

play09:57

current operation in a group like this

play10:00

is a bad idea because it could set

play10:03

people with opposing opinions against

play10:05

you you know like these are

play10:06

controversial ideas like I guess you

play10:09

could consider L SEC an anarchist

play10:11

hacking group to some extent but as

play10:14

they've stated many times they mostly

play10:17

hacked for the lulls so telling people

play10:20

that you're a pot smoking

play10:24

anti-racist frean Anarchist that's

play10:27

currently on probation in the midwest in

play10:30

a hacker IRC channel is truly uh

play10:33

horrific opsac you know it doesn't

play10:35

matter if you always used a Quantum

play10:38

resistant VPN with t if the feds have

play10:41

your name and they know you're in

play10:43

Chicago then they can identify you as

play10:47

the guy with weed and the anarchist

play10:49

t-shirt getting lunch out of a dumpster

play10:52

now in addition to giving away too many

play10:55

details about his personal life and past

play10:59

operations he had taken part in Hammond

play11:03

was giving away too many details about

play11:05

how he was conducting his current

play11:07

operations with lolx so for example he

play11:11

stated on

play11:13

IRC that all of his connections were

play11:17

being made over tour over the tour

play11:20

Network and he even complained about

play11:23

stuff like YouTube being really slow

play11:25

over

play11:26

tour he also said that used an Apple

play11:30

laptop so of course during the

play11:32

surveillance phase the FBI confirmed

play11:35

that he was sending all of his traffic

play11:37

through tour and that the MAC address of

play11:39

his computer matched to an Apple

play11:43

computer it's not necessary to

play11:46

divulge those details to anyone you know

play11:49

even the people who you're working with

play11:51

in your current operation don't need to

play11:53

know that you use a Mac or that you're

play11:56

always using tour or tour with a VPN or

play11:59

residential proxies or whatever it

play12:00

doesn't matter you really should treat

play12:04

your IRC chats or any online chats for

play12:08

that matter like you're talking directly

play12:10

to the police after you've been

play12:12

mirandized especially if you're engaging

play12:14

in this kind of activity um and you know

play12:17

speaking of that like if you ever paid

play12:19

attention to the wording of the Miranda

play12:22

Rights and I'm sure that other countries

play12:24

have a similar version of this but here

play12:25

in the states when the cops arrest you

play12:28

before questioning they tell you that

play12:32

you have the right to remain silent

play12:34

everything you say can and will be used

play12:37

against you in a court of law what that

play12:40

means is the only things you say that

play12:44

are going to be written down and

play12:46

remembered by the cops and used are

play12:49

things that can be used against you in

play12:51

court not for you which is why a good

play12:55

lawyer is going to tell you to not say

play12:57

anything after you've been mirandized

play12:59

you know even if you say something that

play13:01

might exonerate you later on something

play13:03

that makes sense to you know like oh I

play13:06

wasn't there it wasn't me that statement

play13:08

isn't going to be written down it's not

play13:10

going to be remembered by the people

play13:11

talking to you and it's not going to be

play13:13

used in court right un not unless

play13:16

somehow your lawyer can get a recording

play13:18

of that and try to get it entered into

play13:20

evidence the cops and the da certainly

play13:22

AR going to enter it into evidence if it

play13:25

makes you seem not guilty uh so yeah

play13:28

it's turns out when it comes to obac

play13:31

Simply shutting the up is so much

play13:34

more important than what VPN proxy or

play13:38

operating system you're using

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
CybersecurityOPSECAnonymityHackingVPNSurveillanceSabuHammondIRCPrivacy
هل تحتاج إلى تلخيص باللغة الإنجليزية؟