Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government News Your Rights Online

Hosting a Highly Inflammatory Document? 471

IndianaKim writes "I have been asked if I can host or assist in hosting a highly inflammatory document that reflects poorly on a Police Department. I want to help, but I also do not want the headache and possible subjection to search warrants and/or illegal searches. The document is so inflammatory that it could interest the FBI and DoJ and cause them to investigate the government officials involved. I live in the same county, but not the same city, and therefore could be subject to a search (legal or not) by some of these government agencies. I have been asked to host it on a server outside of the US. At this time, I do not have the ability to do that, but I could set it up if I needed to. My question is: would you host it if you were asked? How would you go about protecting the document and yourself?"
This discussion has been archived. No new comments can be posted.

Hosting a Highly Inflammatory Document?

Comments Filter:
  • I know where . . . (Score:5, Informative)

    by arizwebfoot ( 1228544 ) * on Friday May 15, 2009 @07:59PM (#27974367)
    Wikileaks dude
  • Assuming you & your friend are aware or desire that once this hits the internet it is forever online for all to see, you have friends across the pond [wikileaks.org]. Yes, this is foreign hosting.

    Assuming the document is small, you could install Xerobank [xerobank.com] (formerly TorPark) and create an account on Wikileaks and upload it to Wikileaks through the Tor onion router. Your anonymity would be assured in a hilariously sound manner.

    Your website need do nothing more than link to Wikileaks and ponder how it got there.

    That would be my plan of action. I would also be careful with all the machines/devices used to transfer that file.

    Depending on how important/inflammable this document is, I might look into buying a cheap 20GB laptop hard drive, installing ubuntu, going to a star bucks, doing the above and then "disposing" of the drive and all media so that there are no questions. Sorry to sound like Harvey Keitel on Pulp Fiction but ... when you're dealing with serious stuff ...

    My question is: would you host it if you were asked? How would you go about protecting the document and yourself?

    It depends on who is asking me. There are maybe 5 or 6 people in my life that if they approached me with this request and said it was serious and said it had to be me hosting it, I would do it no questions ask. I would not read the document, I would stop them from explaining to me what is the document, I would do it and give them the link. I would then go directly to my lawyer and have a small chat with him. Then I would grab a glass of Chivas Regal and put on a record and take the battery out of my cell phone and relax.

  • Re:Slashdot it (Score:1, Informative)

    by Anonymous Coward on Friday May 15, 2009 @08:13PM (#27974499)

    net cafe hundreds of miles away using an onion routing anonymizing proxy. Problem solved.

    Bad idea. Most cyber cafes i've seen have cctv.

  • by Anonymous Coward on Friday May 15, 2009 @08:15PM (#27974525)

    That's a terrible idea, print is traceable.

  • HavenCo (Score:2, Informative)

    by slashqwerty ( 1099091 ) on Friday May 15, 2009 @08:17PM (#27974549)
    HavenCo [wikipedia.org] used to host anything but child porn. They have a few more restrictions now but I think they would have no issue host criticism of a police department. They are based out of Sealand, an independent micronation sitting on a former World War II Maunsell Sea Fort [wikipedia.org].
  • by fm6 ( 162816 ) on Friday May 15, 2009 @08:19PM (#27974579) Homepage Journal

    Good point about "the professionals". For one thing, Wikileaks is smart enough not to go to Slashdot for legal advice. They'd go to a lawyer, who'd tell you that local authorities can hold a local person accountable for web content, regardless of where it's hosted.

  • by Daemonax ( 1204296 ) on Friday May 15, 2009 @08:20PM (#27974589)
    Isn't this slashdot article enough to cause problems for you? If corrupt police suspect you have information that could harm them, then what is to stop them from causing problems for you? They're already corrupt aren't they?

    I would say put it on wikileaks as fast as you can.

    I'm not a lawyer though, so perhaps there are reasons to not do this? Perhaps contact a lawyer first. Give them a copy of the documents.
  • by rcw-home ( 122017 ) on Friday May 15, 2009 @08:23PM (#27974619)

    Your anonymity would be assured in a hilariously sound manner.

    That's assuming there's nothing in the document itself that only a particular author would write. That's how they ended up identifying the unibomber.

  • by Anonymous Coward on Friday May 15, 2009 @08:25PM (#27974635)
    You could use an existing laptop with an os installed on a flash drive or a live cd, buy a cheap $10 usb wifi adapter and chuck both the cd + wifi in the trash for about $20. Just a fyi ;)
  • by geekboy642 ( 799087 ) on Friday May 15, 2009 @08:27PM (#27974663) Journal

    Print is only technically traceable. Your local PD will not have access to a database that links the inkjet patterns to your name. If, in fact, such a mythical database even exists (doubtful, requires competence from the government and honesty from corporations), it is not a simple matter to perform a lookup. GP's suggestion is near perfect.

  • by Emnar ( 116467 ) on Friday May 15, 2009 @08:30PM (#27974691)

    Depending on how important/inflammable this document is, I might look into buying a cheap 20GB laptop hard drive, installing ubuntu, going to a star bucks, doing the above and then "disposing" of the drive and all media so that there are no questions.

    For this to work you would also have to change your wireless interface's Ethernet MAC (hardware) address. By default this is a vendor-specific code that is probably unique enough that it could be used to link you to the upload. This would require that (a) the coffee shop kept some kind of long-term logging on their wireless device, (b) the authorities were able to trace the upload to the coffee shop, and (c) the police had some kind of suspicion of you already. All are improbable, but none are impossible.

    Most wireless cards will let you change the hardware address. I'll leave instructions for how to do that to the enterprising googler.

    The alternative is to use a cheap throwaway laptop with wireless, or a disposable wireless ethernet card.

    (Yes, it's paranoid, but so is the original question.)

  • Re:Use Tor (Score:4, Informative)

    by FooAtWFU ( 699187 ) on Friday May 15, 2009 @09:24PM (#27975117) Homepage
    Image file metadata for the standard formats can be erased with a good lightweight image-manipulation tool (on Windows, look for IrfanView - I'd be sure to install all the plugins just in case, too, in case one of them supports a different metadata type, et cetera). There's probably more specialized tools as well. Google it up, schmucks.

    .doc has a Microsoft "remove hidden data" widget, and you can look at a variety of the properties directly, but I still wouldn't trust it. Try text, .rtf, maybe HTML? where you can scan the entire file as ASCII and see exactly what's in there.

  • by norculf ( 146473 ) on Friday May 15, 2009 @09:50PM (#27975309) Journal
    You can't tell a story like that and then NOT tell us what you did to piss them off.
  • by unlametheweak ( 1102159 ) on Friday May 15, 2009 @10:09PM (#27975469)

    It appears as if you haven't RTFM (read the Slashdot help section here), nor did you do any thoughtful research to back your claim.
    Scientologists Force Comment Off Slashdot [slashdot.org]

    Slashdot Management certainly tries to be as open as possible with regards to posting, but there are forces outside of its control.

  • by JWSmythe ( 446288 ) <jwsmythe@nospam.jwsmythe.com> on Friday May 15, 2009 @10:24PM (#27975573) Homepage Journal

        I really don't want to tell. ... I guess I should.

        My dad was a strong candidate for a senior county level elected position.

        The incumbent was well rooted in the "good ol' boy" system. He was close friends with the local judges, sheriff, and most of the deputies. This was very apparent during campaign season. You could spot the who's who of local politics at various fundraisers and political events.

        That rolled downhill to absorb quite a few other law enforcement people to do "a favor" for them. There was at least one state police officer involved, who later went to jail on bribery and corruption charges. One deputy involved also went away on bribery and corruption charges. Both of those happened after I moved away. I don't keep up with their news much, but a friend told me, and sent the newspaper clippings.

        Local police were very friendly with the sheriff's department, as the cities generally didn't have the required manpower at all hours, so through city and county agreements, all of their jurisdictions overlapped. A city police officer from three towns over had arresting powers in any city in the county as well as the unincorporated areas.

        When I mentioned that the deputy didn't have anything to hold me on, he didn't. He was actually being a good cop, and didn't want to put his ass on the line for something stupid that he had no knowledge of. The local PD wanted me, but were busy with something else.

        By distracting my family with the harassment, I believe they hoped my dad would drop out of politics. They couldn't harass him directly, because they knew he wouldn't screw up. I was a teenager, I'm more likely to do something stupid.

        For example, late one night I was driving out of a town towards home. It was a 4 lane divided highway, with only a few cars on the road. I saw a car going the other way, and didn't pay much attention. About a minute later, he had turned around, and was tailgating me. I wasn't sure if it was someone looking for trouble, or a cop, so I drove carefully, expecting them to hit me eventually. After 3 miles of tailgating, it turned out to be a deputy. After a patdown and search of my car, I was given a "careless driving" ticket, that was thrown out when I showed up in court. What if I had floored the gas to get away? I wasn't sure if I should run or not. If I had, that could have been reckless driving, evading law enforcement, blah, blah, blah. a whole stack of misdemeanor charges to put me in jail for a while. I got lucky.

  • by Lillesvin ( 797939 ) on Friday May 15, 2009 @10:34PM (#27975637) Homepage

    Well, "they" didn't identify the Unabomber - his brother did, because he recognized his writing style in his published manifesto, which in turn resulted in the forensic investigation and comparison of his manifesto to some earlier stuff that he'd written. The method is called stylometry [wikipedia.org] (or stylometrics) and is used widely in forensic linguistics, but it's still only an indicator of authorship - not proof.

    In the Unabomber case, they had two sets of texts, the manifesto written by the Unabomber and the texts written by Ted Kaczynski, hence it was relatively easy to compare the two sets and see if there was reason to believe the author of both sets to be the same. In this case, you'll have a single text by an unknown author... What will you compare it to first when you have no suspect or suspected texts? Exactly... This document will have to mean the end of the world before they start trawling the web for random texts and comparing. Mind you, these stylometric comparisons must be verified by a human, even though a lot can be automated with principal component analysis.

    I'd say that the author can feel pretty safe, as long as he/she isn't a well-known author and/or uses linguistic constructions specific for his/her dialect or regiolect. Remove all meta-data from the file (e.g. go with plain text or HTML as suggested (far) above) and publish to wikileaks through Tor from a public hotspot. At least, that's what I'd do. I don't know about Brian Boitano, Buddha, Muhammed or Jesus.

    Oh, and yes, I am a linguist. :)

  • by NicknamesAreStupid ( 1040118 ) on Friday May 15, 2009 @10:42PM (#27975683)
    The Russians can do this, no problem. Probably some Ukrainians could easily do it too. Both charge more than the Chinese, but doing it there might bring some problems with the CPC. Disclaimer: I would never intend to do anything illegal, immoral, unethical, illogical, politically incorrect, or bad by anybody's definition of the word. If this is in any way seemed or inferred to be one of the above, I disavow any knowledge of my actions and plead insanity. Good luck and I hope that you fuck them up really good. Oh, I didn't mean that.
  • by Patrick Lewis ( 30844 ) on Saturday May 16, 2009 @12:14AM (#27976187)

    Martin Luther [wikipedia.org] (with special attention to the 95 theses)

    Martin Luther King, Jr. [wikipedia.org]

  • by Nitewing98 ( 308560 ) on Saturday May 16, 2009 @12:48AM (#27976363) Homepage

    You must not live in the midwest (or the south) where the local cops can (and will) do whatever they can get away with, esp. in small towns and out in the county. It can be as simple as, "We knew your daddy and he was a bad apple."

    Here in Kansas City we had a sheriff whose son pleaded guilty to indecent liberties with a child as well as child rape.

    The "law" is only as fair as those who enforce it.

  • Re:Host it or don't. (Score:2, Informative)

    by Mr. Slippery ( 47854 ) <tms&infamous,net> on Saturday May 16, 2009 @01:03AM (#27976423) Homepage

    Either you stand up to things you don't like, or you remain silent forever. Good luck with your decision.

    If you choose to stand up to things you don't like, you still have the choice of tactics in how to make your stand. Part of that it figuring out how to either 1) continue to remain alive and free, or 2) make it expensive for the opposition to kill or imprison you.

    If I were given some hot data -- say, a copy of the "torture photos" that have made Obama lose his testicles (or perhaps to display that he never really had any) [axisoflogic.com] -- I would keep in mind that in order to get the information out there, I don't have to arrange for permanent hosting. I just get it out to a bunch of different places long enough for the Streisand Effect [wikipedia.org] to work its magic.

    My suggestion:

    • Take a nice drive to a different city. Pay cash for all gas and tolls. Do some touristy stuff while you're there -- if it comes up, don't deny you were there, but don't advertise it either.
    • With cash, buy a cheap wi-fi card (or USB interface) and hard drive to make your laptop clean, so the MAC address and any browser data won't be traceable to you later. Buy these at different places. Install the drive and wi-fi in your laptop and do a fresh install of your OS.
    • Find a place with free wi-fi. Use it. You want a small cafe or bar that's not going to have security cameras, not a franchise. Be bland and unrememberable.
    • Post the data to wikileaks [wikileaks.org], certainly. But that's a single point of failure. So also:
    • Post on indymedia [indymedia.org].
    • Set up a throw-away Gmail or Yahoo mail account. E-mail copies to journalists (including major bloggers).
    • Set up pages on Google Sites and any other free website provider you can find. (Use mailinator.com for registration.) Put the data up there. [google.com]
    • Post links to those pages on any blog that's remotely relevant.
    • Optional: with cash, buy a couple of SD cards. Make like Rodrigo Rosenberg [slashdot.org] and record a video of yourself explaining that if you disappear, it's because the spooks got you. Put a copy of the video and the data in question on the SD cards. Seal in envelopes marked "open only in the event of my death or disappearance." Mail to a few people you can trust (inside another envelope, so the attention-getting message isn't visible...). Works best if you have friends/family who are the sort who would engage in a bloody campaign of vengeance against your killers, but most of us would have to settle for something less dramatic.
    • Wipe the hard drive. Install bogus data on it so it looks boring. Dispose of it and the wi-fi card at an electronics recycling drop-off point.
    • Utterly and completely destroy whatever media originally held the data, and dispose of the remains at several different places.
  • Re:Use Tor (Score:3, Informative)

    by RPoet ( 20693 ) on Saturday May 16, 2009 @05:30AM (#27977433) Journal

    All .onion addresses are like that. It is associated to the public key of the site's private key, so that it cannot be spoofed.

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...