Symposium on the Global Information Infrastructure:
Information, Policy & International Infrastructure
Cambridge, MA, January 28-30, 1996
by Paul A. Strassmann, US Military Academy, West Point; and Senior Advisor, SAIC
and William Marlow, Senior Vice President, Science Applications International Corporation (SAIC)
Quoted portions are excerpted from Raph Levien's Remailer List.
The ContextBy far the greatest threat to the commercial, economic and political viability of the Global Information Infrastructure will come from information terrorists. Information terrorism has ceased to be an amateur effort and has migrated into the hands of well organized, highly trained expert professionals. Information terrorist attacks can be expected to become a decisive element of any combined threat to the economic and social integrity of the international community. Nations whose life-line becomes increasingly dependent on information networks should realize that there is no sanctuary from information-based assaults. Commercial organizations, especially in telecommunications, finance, transportation and power generation offer choice targets to massive disruption.Information terrorism, as a particularly virulent form of information warfare, is a unique phenomenon in the history of warfare and crime. For the last two hundred years the theory of warfare has been guided by "force-exchange" equations in which the outcome was determined by the rate of attrition of each opposing force. In information attacks these equations do not apply because the attacker remains hidden and cannot be retaliated against. Since biblical times, crimes have been deterred by the prospects of punishment. For that, the criminal had to be apprehended. Yet information crimes have the unique characteristic that apprehension is impossible, since even identification of the criminal is not feasible. Information crimes can be committed easily without leaving any telltale evidence such as fingerprints, traces of poison or bullets.
Changes Introduced By Anonymous Re-MailersThe introduction of Anonymous Re-mailers into the Internet has altered the capacity to balance attack and counter-attack, or crime and punishment. The widespread use and easy access to acquiring the capacity to launch anonymous messages and software has so far not received adequate attention from a policy and legal standpoint. This topic is sufficiently technical that it has been largely avoided by experts who have so far concentrated on debating social, legal, political and economic consequences of the Global Information Infrastructure. Yet, unless there is a thorough understanding of the technologies that make the Anonymous Re-mailers sources of a pathological danger, there is little hope that effective preventive measures and safeguards can be put in place.In many respects, the avoidance of technical discussions about some of the pathological aspects of the Internet remind me of the state of medical diagnosis prior to the recognition that bacteriology, prophylactics and inoculation can be only applied following the acceptance of rigorous, analytic and experimental disciplines.
Our AgendaThe purpose of this paper is to bring to the attention of policy-makers some of the relevant facts about Anonymous Re-mailers. All of the material quoted here comes from public sources which are easily accessible to anyone. The wide-spread current uses of Anonymous Re-mailers should be sufficient warning that this topic cannot be considered any more as something hidden, confidential or inappropriate for public discussion.We find many similarities in the initial denials to the threats from AIDS by the medical and public health establishment. We are dismayed by the avoidance of a candid assessment by public officials about the vulnerability of the Global Information Infrastructure to destructive information epidemics. The purpose of this paper is to increase the awareness of potentially deadly risks that may inhibit the potential gains from the creation of a global information community.
What Is A Re-Mailer?A re-mailer allows anyone to post messages to newsgroups or to individuals while remaining anonymous. The identity of the sender is hidden from the recipient and remains practically untraceable.An anonymous re-mailer is a program that runs on a computer somewhere on the Internet. When you send mail to the re-mailer address, the re-mailer takes your name and your address off of the mail message and forwards it to its next destination. The recipient gets mail that has no evidence of where it originally came from, at least not in the headers. You might give away your secret identity in the body of the message, but that would be the sender's own fault. Anonymous re-mailers can be "chained" so that a message is passed on from one anonymous re-mailer to another, in two or more separate anonymous "hops" as a way of making physical tracing or monitoring increasingly difficult. One of the most prominent anonymous re-mailers is <anon.penet.fi> is in Finland. It is frequently used by the Russian (ex-KGB) criminal element. <Anon.penet.fi> assigns a numeric identification to each address from which it receives mail. Internet recipients can reply to that secret number. <anon.penet.fi> will also assign to them another anonymous number, and then forward the reply. This creates a double-blind situation where two people could have an ongoing exchange and never know who the other person was. This method of communication is favorite for engaging services of cybercriminals and for authorizing payment for their acts through a third party. <Anon.penet.fi> can be also used to post a message to Usenet as well. The message can be read by thousands of people, and anyone can send an anonymous reply to the secret Finnish identity. The readers of this paper can easily avail themselves of these services without any special training. Detailed instructions for the use of a remailer service are usually included in the "help" software posted in the remailer's files. For example:
Cyberpunk re-mailers allow a person to send mail with no trace of identity. To
use a re-mailer simply do the following:
André Bacard's anonymous re-mailer FAQ is an excellent nontechnical
introduction.
For a different take on Net anonymity, see L.Detweiler's home page.
Tools
Where Do You Find Re-Mailers?Computers that offer remailing capabilities are operated by individuals or organizations as a public service, almost always at no charge because it costs so little to set one up. They are available globally. We offer a partial list of re-mailers:
$remailer{"extropia"} = "<remail@extropia.wimsey.com> cpunk pgp special"; Role Of EncryptionFor added protection, users of Anonymous Re-mailers tend to encrypt their messages just in case one of the remailing links are compromised. PGP (Pretty Good Privacy) encryption is favored because it is freely available and easy to use. A typical digital signature would look like this:-----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMPDy4WV5hLjHqWbdAQEqYwQAm+o313Cm2ebAsMiPIwmd1WwnkPXEaYe9 pGR5ja8BKSZQi4TAEQOQwQJaghI8QqZFdcctVYLm569I1/8ah0qyJ+4fOfUiAMda Sa2nvJR7pnr6EXrUFe1QoSauCASP/QRYcKgB5vaaOOuxyXnQfdK39AqaKy8lPYbw MfUiYaMREu4= =9CJW -----END PGP SIGNATURE----- For responses the sender will choose a passphrase. This phrase will be used to encrypt messages sent back to you. The encryption will be single-key encryption, not PGP's normal public-private key encryption. The reason for this is that public key encryption is usually not necessary in such cases. Single-key encryption does not require a database (such as in the widely used <anon.penet.fi> database for mapping aliases onto addresses), thus increasing the security of communications among anonymous users. When a recipient responds to the e-mail, his response will be encrypted with the sender's pass-phrase. The sender can read the response by saving it to a file and using PGP on it. PGP will ask for the passphrase, enter the sender's reply, which will make it possible for the recipient to see the response to the e-mail. This feature allows both parties to be securely encrypted, protecting privacy and anonymity in both directions.
How Reliable Are The Re-Mailers?The knowledge about the characteristics, reliability and trustworthiness of re-mailers is widely distributed through various bulletin boards. These are consulted by persons deeply immersed in Internet-related developments. There is an agile and very active global community that keeps track of the average latency time, uptime of frequently used re-mailers. They post their findings, which in many cases is superior to what a commercial customer is likely to find out about their own data center performance, or about the service quality offered by Compuserve, America-On-Line of Prodigy. Here is an excerpt from such a bulletin:hacktic remailer@utopia.hacktic.nl **** ******* 7:10 99.85% c2 remail@c2.org -.-++ ++-.-+ 2:10:42 99.83% rmadillo remailer@armadillo.com +++++ ++++++ 37:03 99.69% flame remailer@flame.alias.net ** * ******* 14:55 99.64% mix mixmaster@remail.obscura.com _ _-__...-++ 17:40:48 99.21% amnesia amnesia@chardos.connix.com -+ +--+--- 2:04:43 99.20% ecafe cpunk@remail.ecafe.org ## ##-## #-- 1:26:54 99.06% extropia remail@extropia.wimsey.com .- -.----_. 13:48:11 99.04% replay remailer@replay.com + +** ***** 5:36 98.84% shinobi remailer@shinobi.alias.net -- -- - - + 54:43 98.78% spook remailer@valhalla.phoenix.net * ***** - * 35:07 98.36% vishnu mixmaster@vishnu.alias.net ** #-*# 7:44 98.20% bsu-cs nowhere@bsu-cs.bsu.edu # # ##.# 28:07 97.78% gondolin mix@remail.gondolin.org - --_.---- 9:45:55 97.62% wmono wmono@valhalla.phoenix.net ** * * 12:23 97.57% hroller hroller@c2.org #*+### -.. # 1:37:24 96.71% ford remailer@bi-node.zerberus.de ._...--._. 21:21:22 95.83% portal hfinney@shell.portal.com ########*# 27:36 95.55% alumni hal@alumni.caltech.edu # # * + 25:47 95.29% penet anon@anon.penet.fi . -- -- 13:55:20 87.78% rahul homer@rahul.net +* *+**+* # 4:34 93.71% robo robo@c2.org #-## 5:59 27.86% History key # response in less than 5 minutes. * response in less than 1 hour. + response in less than 4 hours. - response in less than 24 hours. . response in less than 2 days. Specialization Of ServicesThe operators of various re-mailers are specialized in that they cater to select communities of Internet dwellers. They offer unique services to customers who are seeking different degrees of anonymity. Cognoscenti in the field can readily identify remailers who offer meets diffferent tastes and preferences. Here is an example of remailer characterizations:
<cpunk> A major class of remailers. Supports Request-Remailing-To: field.A fascinating example of specialization is a re-mailer service advertising the capacity to defeat "traffic analysis" used by intelligence agencies. All mail to each destination is first sent through <remail@sitename> which is a standard "cypherpunk" re-mailer with PGP with a few added features. The outgoing mail is not forwarded immediately upon receipt. Outgoing messages are stored in a pool until five minutes after each hour, when all messages in the pool are re-transmitted in a random order, ignoring the order in which they came in. Each message from the re-mailer is sent through a random path of other re-mailers in the re-mailernet. This usually involves between five to 20 "hops" from one re-mailer to another. In each case care is taken for at least one of the "hops" to be in a country with especially relaxed laws concerning electronic messages. Such measures would greatly complicate any tracing that may be contemplated by a law-enforcement agency.
Why Re-Mailers?E-mail is as fast and casual as a voice phone call, but can be stored and retrieved with infinitely greater efficiency than paper letters or taped conversations. An e-mail message can be re-broadcast the world over, by anyone who comes across a copy of the transmission. Parts of any message can be extracted, edited and easily modified. Meanwhile, the e-mail address of the originator remains a label of its origin. If the storage of that message is not protected - and it rarely is - it can be accessed by anyone who takes the trouble to rummage through any of the many archived computer records that may have received such message. A casual e-mail exchange, with an identifying address, can be then used to compromise the originator. As e-mail traffic takes over an ever increasing share of personal communications, inspection of e-mail traffic can yield more comprehensive evidence than just about any wire-tapping efforts. E-mail-tapping is less expensive, more thorough and less forgiving than any other means for monitoring personal communications. Without protection of privacy, browsing through e-mail archives would become the preferred way for gathering evidence in law enforcement cases. It would also be used as the favorite means for collecting incriminating statements by lawyers engaged in civil litigation.In casual e-mail exchanges it is easy to make an error. When the message is archived it could be used to haunt a person for decades afterwards. A message intended for a particular individual may be passed on to hundreds or even thousands of others. Unless its origin is anonymous, all e-mail can be traced through identifying addresses that preserve the name of the originator - as well as the names of those who forwarded it - wherever the message traversed. Unless a message is handled anonymously, a trace is left about everyone who received it or passed it on. It would be like a letter that not only identifies the name and address of its author, but also fingerprints of anyone who ever touched it. It is one of the fundamental strengths of the Internet that it offers an almost universal capacity for free expression of ideas. A person's opinions can be sent anywhere in the world in a matter of minutes, with the originator's name displayed at the top. Is it consistent with the rights to individual privacy and freedom of expression to have one's name clearly associated with a message than may be easily disseminated to unintended recipients? The issues here are the rights to the freedom of speech and to the rights to personal privacy. Having the right to free speech may work well in the case of verbal expression, but it may cease to have its intended purpose in face of retaliation that may take place decades later. In a system that theoretically can have infinitely large memory and indefinitely long remembrance, the freedom of expression and become abused and perverted by a government that does not respect individual rights. With the widespread acceptance of Internet-mediated communications it was recognized that the simplest way of securing privacy is through anonymity. That's how anonymous re-mailers came into being. Given the technical characteristics of Internet, there is nothing to prevent anyone to set up a private (or public) anonymous remailing service. Any attempt to prohibit or regulate the use of anonymous re-mailers is technically unfeasible. In a democratic society it becomes politically unacceptable to suppress remailers as potential sources of criminal acts. Such absolute prohibitions would never pass through a legislative process in a free society.
ConclusionAnonymous re-mailers are here to stay. Like in the case of many virulent diseases, there is very little a free society can do to prohibit travel or exposure to sources of infection. The best one can do is to start treating the pathologies inherent in the Internet in the same way as we have learned to deal with infectious epidemics. That calls for constructing new institutions and processes that are analogues to inoculation, immunization, prophylactics, clean water supply, sewers, hygiene, early detection of outbreaks of diseases, quarantine, the offices of health examiners, the Center of Disease Control and the World Health Organization.The introduction of most of these restrictive means, imposed mostly by government, were often opposed by those who saw in public health injunctions infringement of individual rights. In due course an informed electorate found it expedient to accept most of the sanitary measures for disease control a bargain that was well worth it. The history of public health teaches us that suppression of any disease must be preceded by a thorough understanding of its behavior, its method of transmission and how it creates its own ecology. As in the case of smallpox, yellow fever, flu epidemics, AIDS or malaria, it will take disasters before the public may accept that some forms of restrictions on the electronic freedom of speech and privacy may be worthwhile. It was the purpose of this paper to explain the characteristics of anonymous remailers as one of the potential sources of infectious threats to the well-being of our information-based civilization. We trust that this will be seen as a useful contribution to an already raging debate of how to find a balance between the desirable and the dangerous.
Paul@Strassmann.com and William_Marlow@cpqm.saic.com will be pleased to respond to identifiable commentators on the points of view expressed herein.
|