Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

No More Hiding on the Internet- Patent #6,974,978 to the NSA

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
buzzsaw_23 Donating Member (631 posts) Send PM | Profile | Ignore Tue Sep-27-05 06:43 PM
Original message
No More Hiding on the Internet- Patent #6,974,978 to the NSA
NSA patent can locate Internet users
By UNITED PRESS INTERNATIONAL
Published September 22, 2005


WASHINGTON -- Internet users thinking they can hide anonymously may soon get an awakening.
    
    On Sept. 20 the United States awarded patent 6,974,978. The patent was filed on December 29, 2000 by Stephen Mark Huffman and Michael Henry Reifer, with the assignee being United States of America as represented by the director of the National Security Agency.

   
    According to the patent's abstract, the invention is a "Method for geolocating logical network addresses on electronically switched dynamic communications networks, such as the Internet, using the time latency of communications to and from the logical network address to determine its location.

http://www.wpherald.com/storyview.php?StoryID=20050922-024816-1505r
Printer Friendly | Permalink |  | Top
Mr Rabble Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:47 PM
Response to Original message
1. They have been doing this for years.
Its about time it was patented.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Tue Sep-27-05 08:35 PM
Response to Reply #1
20. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
BigBearJohn Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:47 PM
Response to Original message
2. It had to happen sooner or later
Printer Friendly | Permalink |  | Top
 
ret5hd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:48 PM
Response to Original message
3. seems to me to be easy to defeat...
program an IP stack to randomly vary latency.

not a tech guru, just talkin' out my ass.
Printer Friendly | Permalink |  | Top
 
Canuckistanian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:50 PM
Response to Reply #3
4. You can program latency?
I thought it was just a function of delays between servers and terminals.
Anyone know if this can be done?
Printer Friendly | Permalink |  | Top
 
ret5hd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:53 PM
Response to Reply #4
5. what i was specifically referring to...
was the latency between your box and the server serving your box, and you would only be able to affect the replys FROM your box TO that box, which might do no more than "confuse" the issue for a while.
Printer Friendly | Permalink |  | Top
 
Davis_X_Machina Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:53 PM
Response to Reply #4
6. Worst case you can run packets...
...through long physical conductors with a significant velocity factor.

Maybe there's a future for coax yet! 10baseT forever!
Printer Friendly | Permalink |  | Top
 
Canuckistanian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:56 PM
Response to Reply #6
8. You'd need very long conductors
Velocity factors don't make that much difference to the average user.
Printer Friendly | Permalink |  | Top
 
Davis_X_Machina Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:23 PM
Response to Reply #8
15. You have no idea...
...how much surplus RG-58 I got in the basement. Seems IT bought a bargeload, on the assumption that "this unshielded stuff will never catch on".

:-)
Printer Friendly | Permalink |  | Top
 
SpiralHawk Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 08:30 PM
Response to Reply #15
19. "Homeland Security" will be along momentarily, Davis, to...
confiscate your private stash...

Printer Friendly | Permalink |  | Top
 
slampoet Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:16 PM
Response to Reply #4
13. Variable rate digital delays have been in audio applications for decades
Why not this.
Printer Friendly | Permalink |  | Top
 
TheWraith Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:55 PM
Response to Original message
7. I'm not sure how this would be particularly reliable.
Latency can be a tremendously variable thing. A dialup connection can have 200ms more lag than a cable connection next door. Cellular wireless or satellite connections can range from 500 up to 1000 ms or higher.

Not to mention the fact that data can often go hundreds or even thousands of miles out of its way from the nodes that it's assigned to: I'm in western New York state, and my ISP's data link is in the middle of Colorado. My last ISP was in Georgia. I'm not saying that it's impossible, just that I can't see this being hugely practical.
Printer Friendly | Permalink |  | Top
 
DS1 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:58 PM
Response to Original message
9. Ok everyone, just start typing very slowly
Signed, Neil
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 06:59 PM
Response to Original message
10. Not new (been around for a bit) and easy to thwart/fake. nt
Printer Friendly | Permalink |  | Top
 
GOPAgainstGW Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:19 PM
Response to Reply #10
14. Agree!
Printer Friendly | Permalink |  | Top
 
Zynx Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:01 PM
Response to Original message
11. IOW, IP traces? *chuckles*
Printer Friendly | Permalink |  | Top
 
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:08 PM
Response to Original message
12. I could easily patch tcp stack of a router to introduce random latency...
Edited on Tue Sep-27-05 07:17 PM by benburch
But that would not defeat this practice!

A random latency introduced at one place can be factored out by looking at enough repetitions.

I looked at this effect years ago when I was doing security and cryptographic work for Zenith.
Printer Friendly | Permalink |  | Top
 
SlowDownFast Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 07:39 PM
Response to Original message
16. Tor. Onion routing.
Edited on Tue Sep-27-05 07:40 PM by utopiansecretagent
The solution: a distributed, anonymous network

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you—and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going.




To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through servers on the network. The circuit is extended one hop at a time, and each server along the way knows only which server gave it data and which server it is giving data to. No individual server ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.



Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each server sees no more than one hop in the circuit, neither an eavesdropper nor a compromised server can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.

For efficiency, the Tor software uses the same circuit for connections that happen within the same minute or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.



Read more about Tor and it's history and development. Open source code available for examination.

http://tor.eff.org/

Electronic Frontier Foundation - Defending Freedom in the Digital World:
http://www.eff.org/
Printer Friendly | Permalink |  | Top
 
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 08:07 PM
Response to Reply #16
17. I run a tor router node...
Just because I'm such an evil bastard.
Printer Friendly | Permalink |  | Top
 
SlowDownFast Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-27-05 08:23 PM
Response to Reply #17
18. Good for you, benburch!
Edited on Tue Sep-27-05 08:26 PM by utopiansecretagent
The more folks who host Tor router nodes, the stronger the anonymity of Tor. It is growing, from my understanding.

You do internet privacy and those who value it a noble service!

Thanks!

:toast:
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sun May 05th 2024, 03:53 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC