Tag Archives: tor

New Hampshire Library Victorious In Internet Privacy Debate

Lebanon, New Hampshire- The Lebanon Library Board of Trustees upheld their decision to continue running a Tor node at the Kilton Library at its meeting Tuesday night, and the node was turned back on shortly after the meeting. Controversy surrounding the node and the library’s support of Tor, stemming from an email sent by the Department of Homeland Security to local law enforcement, led to a temporary shutdown of the node.

The board’s decision to ultimately keep the node turned on was made after several area residents expressed their views on the importance of Tor and internet privacy and vocalized praise for the library’s Tor support.

During the board meeting, ACLU of New Hampshire executive director Devon Chaffee explained how Tor is used. The Tor browser “is a piece of software, free and open source, that helps people protect their privacy and anonymity online by obscuring personally identifiable information,” she said. Tor accomplishes this by bouncing traffic off of a network of relay nodes, which was what Kilton was asked to run.

In June, the trustees voted to allow Kilton Library to run one of these nodes. The nodes serve as an important function to allow Tor users to preserve their anonymity. The Kilton Library, with the help of the Library Freedom Project (LFP), became the first public library in the United States to offer a relay node.

Kilton’s running of the node was part of a larger initiative to encourage libraries nationwide to support Tor and relay nodes as a “powerful symbolic gesture demonstrating our commitment to a free internet, but also a practical way to help the Tor network, and an excellent opportunity to help educate our patrons, staff, boards of trustees, and other stakeholders about the importance of Tor.”

Kilton Library was chosen partly because of steps that the library had already made to protect patron privacy. According to LFP, Kilton IT librarian Chuck McAndrew runs the library computers on GNU/Linux distributions. “Most library environments run Microsoft Windows, and we know that Microsoft participated in the NSA’s PRISM surveillance program. By choosing GNU/Linux operating systems and installing some privacy-protecting browser extensions too, Chuck’s helping his staff and patrons opt-out of pervasive government and corporate surveillance.”

Just over a month passed before an agent at the Department of Homeland Security in Boston discovered Kilton Library’s support of Tor. DHS notified the Lebanon Police Department of the project, and a meeting between city officials, the board of library trustees and law enforcement was held to discuss the risks of running a node.

[RELATED: NH Library Suspends Tor Support Following Email From DHS]

Law enforcement and Lebanon Deputy City Manager Paula Maville made comments regarding the possibility of criminal exploitation of Tor. The library decided to pause the pilot project and hold another meeting to decide whether or not to turn it back on or keep it off.

Ahead of Tuesday’s meeting, a rally was held outside of Lebanon Public Library where activists held signs cheering Kilton’s support of Tor while rebuking DHS’s involvement. Lynette Johnson, a former librarian, told Truth In Media’s Annabelle Bamforth at the rally that “librarians really think about [protecting patron privacy] almost like a doctor-patient confidentiality.”

Public comment consisted almost entirely of support for Kilton Library’s relay node. The first person to speak, an elderly man named Lloyd, said that he worked for the government in the past and urged that DHS be kept as far away from Tor as possible.

Another man, a resident of Orange, New Hampshire who identified himself as an employee in the information technology field for several years, pointed out that U.S. intelligence agencies have more tools than ever before to gather information and opined that the debate should not be around whether or not the government has a harder time catching criminals, but around whether or not a relay node is a proper library function.

A woman born in Colombia spoke up passionately in support of privacy and freedom of speech, describing her previous job as a social worker in Colombia amidst violent conflict and explaining that she had seen many atrocities. “Freedom of speech isn’t part of their democracy there,” she said.

One after another, area residents shared their thoughts on the importance of internet privacy and why tools such as Tor should be embraced and not subjected to blind fear.

Following public comment, the board acknowledged that Tor could be exploited by criminal operations, but not any more than other online tools. The board made a decision to turn the node back on and maintain their original vote to support Tor by hosting the node.

Following the decision, Bamforth interviewed LFP’s Alison Macrina and Tor Project’s Nima Fatemi- who helped introduce the node to Kilton Library and have provided education about online privacy tools- about the library’s decision.

“We’re absolutely thrilled,” Macrina said following the meeting. “This is a public referendum about privacy and free speech, and I couldn’t think of a better place to have it happen. There was a reason why we chose Kilton as our pilot project. We knew that New Hampshire, the Live Free Or Die state, was the right place for this. This is the best thing that could have happened. The whole world came out in favor of Kilton doing the right thing, which they’ve just done, and it’s no better demonstrated than by the response of the community which was just overwhelming- I was crying, especially when the woman from Colombia spoke.”

“We actually made a joke, Libe Free or Die,” added Fatemi, a Tor Project member and partner in the LFP’s relay node project. “We’re definitely overwhelmed by the support of the community. It’s unbelievable, I was basically speechless.”

Fatemi noted that “what happened with the police department and DHS was a huge case of miseducation. Part of the reason we picked libraries because libraries are central to the communities. If we help give them enough resources, then they can teach, educate the communities around them- including law enforcement.”

This article has been updated to properly identify that a relay node is running at Kilton, not an exit relay.

NH Library Suspends Tor Support Following Email From DHS

A small public library in New Hampshire has recently become the backdrop of a conflict brewing between internet privacy advocates and law enforcement, as city officials and police have taken aim at a project providing privacy-protecting measures to public libraries.

The Kilton Public Library, located in Lebanon, New Hampshire, became the first library in the United States to offer a relay node for Tor, an anonymous internet browsing service.

“The library allowed Tor users around the world to bounce their Internet traffic through the library, thus masking users’ locations,” according to ProPublica.

The Concord Monitor reported that Kilton Library did not offer the Tor browser, but it was “was using a portion of its infrastructure to handle traffic for Tor.”

The introduction of the Tor relay node at Kilton Library, which was announced in late July, was part of a larger initiative launched by the Library Freedom Project (LFP). LFP, based in Boston, advocates for a “privacy-centric paradigm shift in libraries” by working with librarians across the United States and providing them with information about “surveillance threats, privacy rights and responsibilities, and digital tools to stop surveillance.”

One of these digital tools is the relay node, which allows Tor users to preserve their anonymity. LFP is striving to provide relays to libraries nationwide. Currently, there are about 1,000 Tor relay nodes around the world.

LFP’s Alison Macrina visited Kilton Library in the spring and offered a privacy training session. After receiving approval from the library board, she also assisted the library in establishing a Tor relay node.

A little more than a month passed before a special agent within a Department of Homeland Security office in Boston caught wind of LFP’s progress and relayed it to New Hampshire law enforcement. The information was then given to a sergeant at the Lebanon Police Department.

According to ProPublica, DHS spokesman Shawn Neudauer said the DHS agent was offering “visibility/situational awareness” to the proper authorities.

A meeting occured soon after the DHS alert, and police and city officials discussed the possibility that Tor could be abused by criminals.

Lebanon Police Lt. Matthew Isham, expressing worry over Kilton’s new Tor service, said that “for all the good that a Tor may allow as far as speech, there is also the criminal side that would take advantage of that as well,” and “we felt we needed to make the city aware of it.”

Lebanon Deputy City Manager Paula Maville echoed Isham’s concerns and said that Tor’s potential association with criminal operations resulted in “concern from a public relations perspective and we wanted to get those concerns on the table.”

Following the meeting, the library agreed to put Kilton’s the project on hold. “We really weren’t anticipating that there would be any controversy at all,” said Lebanon Public Libraries director Sean Fleming.

“Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization,” explains Tor Project’s overview of the service.

The decision to pause the relay node precedes a scheduled Sept. 15 meeting, where the library board of trustees will vote on whether or not to continue the service. Local activists have organized a rally, scheduled before the meeting, to show support for Kilton Library’s staff and to call attention to the issue of internet privacy and preserving free speech online.

Ross Ulbricht Set to Appeal Life Sentence in Silk Road Conviction

NEW YORK CITY – Ross Ulbricht, the convicted founder of the Silk Road online marketplace, will appeal his two life sentences, according to court documents filed on Thursday. Ulbricht was sentenced on five different counts in late May – one for 20 years, one for five years, one for 15 years and two for life, with no possibility of parole.

Ulbricht’s attorney Joshua Dratel spoke with TruthInMedia about the decision to appeal. ​

“The sentence is unreasonable, unjust and unfair, and based on improper considerations that have no basis in fact or law. Of course we will appeal the verdict and the sentence.”

In February, the Silk Road trial concluded as the jury reached a verdict of guilty on seven charges related to distributing narcotics, fraudulent documents, money laundering, and continuing a criminal enterprise. The jury took just three hours to convict Ulbricht on all charges.

At least 97 friends and family members of Ulbricht wrote to the judge asking for the most lenient sentence possible. Ulbricht himself wrote the judge asking her to give him 20 years so he might still have his old age.

Throughout the trial and sentencing, Ulbricht’s attorney objected to the judge’s decisions regarding witnesses, evidence, and other facts they say were kept from the jury. One point of contention comes from the discovery that two former federal agents are accused of stealing hundreds of thousands of dollars during their investigation of the Silk Road. The two defendants are Carl Force, a former special agent for the Drug Enforcement Administration (DEA), and Shaun Bridges, a former Secret Service special agent. Force and Bridges were assigned to a task force based in Baltimore investigating Silk Road. Force was the lead investigator working undercover, and Bridges was a computer forensics expert working on the case.

According to a press release from the Justice Department, Force “served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka ‘Dread Pirate Roberts.’” Force was authorized to communicate with Dread Pirate Roberts (DPR) online to gather information, but he allegedly went on to create several unauthorized, fictitious online identities.

“The Government’s efforts to keep the Carl Force scandal out of the public eye at trial is in itself scandalous,” said Joshua Horowitz, a defense attorney for Ulbricht. “The recently filed Complaint which names Carl Force as a defendant demonstrates that the Government’s investigation of Mr. Ulbricht lacked integrity, and was wholly and fatally compromised from the inside.””

Whether any of the latest revelations will have any effect remains to be seen.

 

 

Silk Road ‘Mastermind’ Ross Ulbricht to be Sentenced Friday Afternoon

NEW YORK CITY – On Friday afternoon, convicted Silk Road founder Ross Ulbricht will find out how many years he will spend in prison for his role in the Silk Road online marketplace. With federal mandatory minimum sentences, Ulbricht is facing at least 20 years in prison.

In February, the Silk Road trial concluded as the jury reached a verdict of guilty on seven charges related to distributing narcotics, fraudulent documents, money laundering, and continuing a criminal enterprise. The jury took just three hours to convict Ulbricht on all charges. Now, US District Judge Katherine Forrest will weigh the evidence and decide what length of sentence to give Ulbricht.

At least 97 friends and family members of Ulbricht have written to the judge asking for the most lenient sentence possible. (Ars Technica has posted the letters online along with the court filing of photos of Ulbricht and many family and friends.) Ulbricht himself wrote the judge asking her to give him 20 years so he might still have his old age. The 31-year old tech genius faces prison until at least his early 50’s.

Despite Ulbricht’s defense team continuing to argue that he was not the Dread Pirate Roberts mastermind, but instead was “left holding the bag”, Ulbricht told the judge: “Silk Road turned out to be a very naive and costly idea that I deeply regret.” This marks the first time the public is hearing from Ulbricht directly.

Ulbricht has received support from the Drug Policy Alliance’s nightlife community engagement manager Stefanie Jones. On the Drug Policy Alliance’s blog, Jones asks whether or not putting Ulbricht behind bars will accomplish anything. She says the Silk Road actually was a beneficial market for three reasons:

  • Silk Road reduced the potential violence associated with buying drugs.
  • It allowed for better knowledge about content and purity.
  • It encouraged harm reduction among users.

Will Judge Katherine Forrest take a similar view? Just ten days ago, she asked for a copy of the Silk Road website so she could perform searches for what products were available for sale. The government produced a fully functioning replica of the site from the server.

Although the charges Ulbricht was found guilty of in New York City do not include the controversial “murder-for-hire” charge, the accusation has still weighed heavily in this current trial. Ulbricht will eventually be tried on those charges in a Maryland court but that did not stop the government from mentioning chat logs that detail five murder-for-hire plots. Still, prosecutors filed no charges in New York, possibly indicating a lack of evidence.

Throughout the trial Ulbricht’s supporters, family, and defense team said they were being blocked at every turn. Witnesses were not allowed, evidence was removed from the record, and many believe the jury could not have possibly had a grip on the emerging technologies that played a large role in the trial- namely Bitcoin, the Tor Browser, and the Deep Web.

Another point of contention came in late March after two former federal agents were accused of stealing hundreds of thousands of dollars during their investigation of the Silk Road. The two defendants are Carl Force, a former special agent for the Drug Enforcement Administration (DEA), and Shaun Bridges, a former Secret Service special agent. Force and Bridges were assigned to a task force based in Baltimore investigating Silk Road. Force was the lead investigator working undercover, and Bridges was a computer forensics expert working on the case.

According to a press release from the Justice Department, Force “served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka ‘Dread Pirate Roberts.’” Force was authorized to communicate with Dread Pirate Roberts (DPR) online to gather information, but he allegedly went on to create several unauthorized, fictitious online identities.

“The Government’s efforts to keep the Carl Force scandal out of the public eye at trial is in itself scandalous,” said Joshua Horowitz, a defense attorney for Ulbricht. “The recently filed Complaint which names Carl Force as a defendant demonstrates that the Government’s investigation of Mr. Ulbricht lacked integrity, and was wholly and fatally compromised from the inside.””

Whether any of the latest revelations will have any effect remains to be seen. The fate of Ross Ulbricht now lies in the hands of Judge Katherine Forrest. Will the effects of this trial have a chilling effect on the internet and stifle new innovation, as some believe?

Ross Ulbricht will be sentenced in New York City at 1:30 pm EST. Derrick Broze will be attending the sentencing and will appear on RT America this evening to discuss the outcome. For the latest updates follow Broze on Twitter @DBrozeLiveFree