Hosting a Highly Inflammatory Document? 471
IndianaKim writes "I have been asked if I can host or assist in hosting a highly inflammatory document that reflects poorly on a Police Department. I want to help, but I also do not want the headache and possible subjection to search warrants and/or illegal searches. The document is so inflammatory that it could interest the FBI and DoJ and cause them to investigate the government officials involved. I live in the same county, but not the same city, and therefore could be subject to a search (legal or not) by some of these government agencies. I have been asked to host it on a server outside of the US. At this time, I do not have the ability to do that, but I could set it up if I needed to. My question is: would you host it if you were asked? How would you go about protecting the document and yourself?"
I know where . . . (Score:5, Informative)
1. Upload to Wikileaks with Xerobank 2. Link to It (Score:5, Informative)
Assuming the document is small, you could install Xerobank [xerobank.com] (formerly TorPark) and create an account on Wikileaks and upload it to Wikileaks through the Tor onion router. Your anonymity would be assured in a hilariously sound manner.
Your website need do nothing more than link to Wikileaks and ponder how it got there.
That would be my plan of action. I would also be careful with all the machines/devices used to transfer that file.
Depending on how important/inflammable this document is, I might look into buying a cheap 20GB laptop hard drive, installing ubuntu, going to a star bucks, doing the above and then "disposing" of the drive and all media so that there are no questions. Sorry to sound like Harvey Keitel on Pulp Fiction but
My question is: would you host it if you were asked? How would you go about protecting the document and yourself?
It depends on who is asking me. There are maybe 5 or 6 people in my life that if they approached me with this request and said it was serious and said it had to be me hosting it, I would do it no questions ask. I would not read the document, I would stop them from explaining to me what is the document, I would do it and give them the link. I would then go directly to my lawyer and have a small chat with him. Then I would grab a glass of Chivas Regal and put on a record and take the battery out of my cell phone and relax.
Re:Slashdot it (Score:1, Informative)
net cafe hundreds of miles away using an onion routing anonymizing proxy. Problem solved.
Bad idea. Most cyber cafes i've seen have cctv.
Re:I know where . . . (Score:1, Informative)
That's a terrible idea, print is traceable.
HavenCo (Score:2, Informative)
Re:I know where . . . (Score:5, Informative)
Good point about "the professionals". For one thing, Wikileaks is smart enough not to go to Slashdot for legal advice. They'd go to a lawyer, who'd tell you that local authorities can hold a local person accountable for web content, regardless of where it's hosted.
Isn't this slashdot article... (Score:5, Informative)
I would say put it on wikileaks as fast as you can.
I'm not a lawyer though, so perhaps there are reasons to not do this? Perhaps contact a lawyer first. Give them a copy of the documents.
Re:1. Upload to Wikileaks with Xerobank 2. Link to (Score:4, Informative)
That's assuming there's nothing in the document itself that only a particular author would write. That's how they ended up identifying the unibomber.
Re:1. Upload to Wikileaks with Xerobank 2. Link to (Score:4, Informative)
Re:I know where . . . (Score:3, Informative)
Print is only technically traceable. Your local PD will not have access to a database that links the inkjet patterns to your name. If, in fact, such a mythical database even exists (doubtful, requires competence from the government and honesty from corporations), it is not a simple matter to perform a lookup. GP's suggestion is near perfect.
Re:1. Upload to Wikileaks with Xerobank 2. Link to (Score:5, Informative)
For this to work you would also have to change your wireless interface's Ethernet MAC (hardware) address. By default this is a vendor-specific code that is probably unique enough that it could be used to link you to the upload. This would require that (a) the coffee shop kept some kind of long-term logging on their wireless device, (b) the authorities were able to trace the upload to the coffee shop, and (c) the police had some kind of suspicion of you already. All are improbable, but none are impossible.
Most wireless cards will let you change the hardware address. I'll leave instructions for how to do that to the enterprising googler.
The alternative is to use a cheap throwaway laptop with wireless, or a disposable wireless ethernet card.
(Yes, it's paranoid, but so is the original question.)
Re:Use Tor (Score:4, Informative)
Re:I know where . . . (Score:1, Informative)
Re:I know where . . . (Score:2, Informative)
It appears as if you haven't RTFM (read the Slashdot help section here), nor did you do any thoughtful research to back your claim.
Scientologists Force Comment Off Slashdot [slashdot.org]
Slashdot Management certainly tries to be as open as possible with regards to posting, but there are forces outside of its control.
Re:I know where . . . (Score:5, Informative)
I really don't want to tell. ... I guess I should.
My dad was a strong candidate for a senior county level elected position.
The incumbent was well rooted in the "good ol' boy" system. He was close friends with the local judges, sheriff, and most of the deputies. This was very apparent during campaign season. You could spot the who's who of local politics at various fundraisers and political events.
That rolled downhill to absorb quite a few other law enforcement people to do "a favor" for them. There was at least one state police officer involved, who later went to jail on bribery and corruption charges. One deputy involved also went away on bribery and corruption charges. Both of those happened after I moved away. I don't keep up with their news much, but a friend told me, and sent the newspaper clippings.
Local police were very friendly with the sheriff's department, as the cities generally didn't have the required manpower at all hours, so through city and county agreements, all of their jurisdictions overlapped. A city police officer from three towns over had arresting powers in any city in the county as well as the unincorporated areas.
When I mentioned that the deputy didn't have anything to hold me on, he didn't. He was actually being a good cop, and didn't want to put his ass on the line for something stupid that he had no knowledge of. The local PD wanted me, but were busy with something else.
By distracting my family with the harassment, I believe they hoped my dad would drop out of politics. They couldn't harass him directly, because they knew he wouldn't screw up. I was a teenager, I'm more likely to do something stupid.
For example, late one night I was driving out of a town towards home. It was a 4 lane divided highway, with only a few cars on the road. I saw a car going the other way, and didn't pay much attention. About a minute later, he had turned around, and was tailgating me. I wasn't sure if it was someone looking for trouble, or a cop, so I drove carefully, expecting them to hit me eventually. After 3 miles of tailgating, it turned out to be a deputy. After a patdown and search of my car, I was given a "careless driving" ticket, that was thrown out when I showed up in court. What if I had floored the gas to get away? I wasn't sure if I should run or not. If I had, that could have been reckless driving, evading law enforcement, blah, blah, blah. a whole stack of misdemeanor charges to put me in jail for a while. I got lucky.
Re:1. Upload to Wikileaks with Xerobank 2. Link to (Score:5, Informative)
Well, "they" didn't identify the Unabomber - his brother did, because he recognized his writing style in his published manifesto, which in turn resulted in the forensic investigation and comparison of his manifesto to some earlier stuff that he'd written. The method is called stylometry [wikipedia.org] (or stylometrics) and is used widely in forensic linguistics, but it's still only an indicator of authorship - not proof.
In the Unabomber case, they had two sets of texts, the manifesto written by the Unabomber and the texts written by Ted Kaczynski, hence it was relatively easy to compare the two sets and see if there was reason to believe the author of both sets to be the same. In this case, you'll have a single text by an unknown author... What will you compare it to first when you have no suspect or suspected texts? Exactly... This document will have to mean the end of the world before they start trawling the web for random texts and comparing. Mind you, these stylometric comparisons must be verified by a human, even though a lot can be automated with principal component analysis.
I'd say that the author can feel pretty safe, as long as he/she isn't a well-known author and/or uses linguistic constructions specific for his/her dialect or regiolect. Remove all meta-data from the file (e.g. go with plain text or HTML as suggested (far) above) and publish to wikileaks through Tor from a public hotspot. At least, that's what I'd do. I don't know about Brian Boitano, Buddha, Muhammed or Jesus.
Oh, and yes, I am a linguist. :)
outsourcing with impunity (Score:2, Informative)
Re:Right, that worked well for him (Score:4, Informative)
Martin Luther [wikipedia.org] (with special attention to the 95 theses)
Martin Luther King, Jr. [wikipedia.org]
Re:I know where . . . (Score:3, Informative)
You must not live in the midwest (or the south) where the local cops can (and will) do whatever they can get away with, esp. in small towns and out in the county. It can be as simple as, "We knew your daddy and he was a bad apple."
Here in Kansas City we had a sheriff whose son pleaded guilty to indecent liberties with a child as well as child rape.
The "law" is only as fair as those who enforce it.
Re:Host it or don't. (Score:2, Informative)
If you choose to stand up to things you don't like, you still have the choice of tactics in how to make your stand. Part of that it figuring out how to either 1) continue to remain alive and free, or 2) make it expensive for the opposition to kill or imprison you.
If I were given some hot data -- say, a copy of the "torture photos" that have made Obama lose his testicles (or perhaps to display that he never really had any) [axisoflogic.com] -- I would keep in mind that in order to get the information out there, I don't have to arrange for permanent hosting. I just get it out to a bunch of different places long enough for the Streisand Effect [wikipedia.org] to work its magic.
My suggestion:
Re:Use Tor (Score:3, Informative)
All .onion addresses are like that. It is associated to the public key of the site's private key, so that it cannot be spoofed.