Author Topic: [alpha] "Going Dark" ** FBI: Going Dark:  (Read 4046 times)

0 Members and 1 Guest are viewing this topic.


  • Guest
[alpha] "Going Dark" ** FBI: Going Dark:
« on: September 07, 2012, 17:56:49 PM »
[alpha] "Going Dark" ** FBI: Going Dark: Law Enforcement Problems in Lawful Surveillance

In the next upcoming EMails you will find some Informations about FBI Tactics and Movements in the Internet, also called "going dark".

The upcoming document is about Cybersecurity Problems faced by the FBI and some hints how to get in touch with them and solve em.

But take a look by yourself finding out what the government is doing to get access to more data.

##To The Global Intelligence Files##


  • Guest
Re: [alpha] "Going Dark" ** FBI: Going Dark:
« Reply #1 on: December 12, 2012, 10:20:42 AM »
I will add the context of this Document for you all.


Cyber Activity Alert 
Albany Division

29 June 2011
(U//LES) Going Dark: Law Enforcement Problems in Lawful Surveillance 
(U) Overview
(U//LES) ‘Going Dark’ is a Law Enforcement (LE) initiative to address the gap between the
legal authority and practical ability of LE to conduct lawfully-authorized electronic surveillance. 
Problems highlighted by the Going Dark initiative include LE’s difficulty in receiving
information from some technology companies, and criminal’s use of advanced technologies and
techniques that can complicate carrying out of lawfully-authorized court orders to conduct
electronic surveillance.
(U) This Situational Information Report (SIR) is being provided to state and local Law
Enforcement Officers (LEO) in response to questions asked about the Going Dark initiative. The
intent of this document is to explain basic information on the initiative and a small sampling of
the technologies and techniques that may pose problems during lawfully-authorized electronic
surveillance. This product reflects the views of FBI Albany on problems state and local LE may
encounter and has not been vetted by FBI Headquarters.

(U) Law Enforcement Sensitive: This information is the property of the FBI and may be distributed to
state, tribal, or local government law enforcement officials with a need-to-know.  Further distribution
without FBI authorization is prohibited.  Precautions should be taken to ensure this information is stored
and/or destroyed in a manner that precludes unauthorized access.   
(U) Warning: This is an information report, not finally evaluated intelligence.  It is being shared for
informational purposes but has not been fully evaluated, integrated with other information, interpreted,
or analyzed.  Receiving agencies are cautioned not to take actions based solely on this raw reporting
unless the information is independently verified.  A presumption of innocence still exists for any person
being reported on in this report. 
(U) Note: This product reflects the views of FBI Albany and has not been vetted by FBI Headquarters.


(U) Details
(U) There are many sophisticated technologies and techniques that can complicate lawfully-
authorized electronic surveillance.  Additionally, it is possible to use these technologies and
techniques in tandem, for instance, a criminal may encrypt their web traffic and use a proxy
server to hide their location.
(U) Compliance Issues
(U//LES) LE’s ability to monitor sophisticated technologies is complicated by the companies that
sell the technologies. Some companies are unable to comply with LE requests for lawful
intercepts due to a lack of knowledge regarding LE authority, a belief that they are not subject to
the laws providing LE intercept authority, or a lack of technical capability to provide the
requested information.  Due to the Internet and the ease with which consumers are able to
purchase/use items from around the world, other companies are sometimes located outside the
United States and not subject to US electronic surveillance legislation.  Additionally, some
companies simply do not keep the documentation necessary to comply with legal requests, either
because they are not aware of the requirements or because they purposely seek to protect privacy
or impede LE activities.
(U) Hiding Data 
(U//LES) Encryption is one of the most common techniques and it is extremely difficult for LE
to decrypt information without cooperation.  Encryption is the process of applying an algorithm
to a set of data that alters the data into an unrecognizable format.  Only users with the decryption
keys are able to decrypt the data.  Through the use of hardware and software-based encryption,
consumers are able to use encryption to secure individual files, hard
drives, removable media (CDs, USB sticks, etc.), e-mails, instant
messages, text messages and even phone calls.  Encryption can be
achieved through a wide variety of software and smartphone
applications, that are typically user friendly.  LE may be able to
decrypt some data without cooperation due to poor user practices,
including notes and e-mails containing passwords, and decryption
keys contained in computer memory (RAM); however, frequently LE
receives encrypted data, but has no way to decrypt it. 

(U//LES) Steganography is a tool that physically embeds a set of data
within another set of data.  Methods exist to embed data inside of
digital images and may allow for steganography to be applied to
streamed content, like videos, music, and phone calls.  The existence
of the embedded data is invisible to a user unless the LEO has special
training in what indicators to look for, and even if LE knows about
the data, it may be impossible to retrieve the embedded data.
(U//LES) Some Voice over Internet Protocol (VoIP) services encrypt
voice traffic.  The use of these technologies means that criminals
carry on phone conversations that LE has difficulty intercepting, and
even if the calls are intercepted, LE some data may be encrypted
and unable to be analyzed.

(U) Hiding Originator Information
(U//LES) When encryption and steganography is deployed, LE can determine who the sender
and receiver is, however, there are technologies and techniques that prevent LE from
determining who sent and/or received the information.  A Proxy server is an intermediary for
another computer to connect to the Internet.  Typically, the destination computer only sees that
the request came from the proxy server and does not know who originated the request.  To find
both the destination and originator information, LE must identify and work with the proxy server
owner, who could be in another country, and are frequently unwilling to cooperate with LE
requests.  Proxy servers may or may not keep log files that can aid Law Enforcement in
determining where the traffic originated.  The
Onion Router (Tor) is a sophisticated network of
proxy servers that allow Internet users to route
their traffic through multiple intermediaries (Tor
nodes), completely masking the originating
computer.  Tor is specifically designed so that no
single computer in the chain knows both the
destination and origination information, and the
Tor network is comprised of multiple home and
business users throughout the world, making it
almost impossible to find the originating and/or
destination computer. 
(U//LES) While not always considered Going
Dark issues, the following are worth mentioning
due to their use in recent local cases and the
difficulties they caused investigators.
(U//LES) Anonymous remailers prevent the
identification of an e-mail writer, allowing the writer to send an e-mail without any originating
information.  The program accepts the properly formatted e-mail and forwards it to the recipient
without any information about the sender.  Some remailers will forward the e-mail at a random
date and time, up to seven days after the writer hits “send” to prevent anyone from using the
date-time stamp to identify the sender.  Many of these services do not keep log files, which can
make it impossible to trace the e-mail back to the sender.
(U//LES) Communication companies offer phone number spoofing and voice changing services,
which allow callers to mask their identities. When a phone number spoofer is used, the
application/service hides the number of the caller and provides false caller identification
information.  Some applications allow the caller to choose what number they want displayed,
which makes it easy to impersonate another person or company.
(U//LES)  FBI Albany is interested in information regarding criminal use of sophisticated
tradecraft to counter LE activity.   


(U) This report has been prepared by the Albany Division of the FBI. Comments and queries may be addressed to
the Albany Field Intelligence Group at (518) 465-7551.


  • Guest
Re: [alpha] "Going Dark" ** FBI: Going Dark:
« Reply #2 on: October 23, 2013, 16:16:01 PM »
Topic is a bit old but in the view of NEW NSA Surveillance exposings by Ed Snowden I want to give some heads up on the FBI issue of the leake Document to find here:

"Going Dark Lawenforcement Problems in a Lawful Surveillance"

The Leaked FBI Document is talking baout Surveillance that us not ever possible in a "Lawful Surveillance"

So that´s where Programs like PRISM or XKEYSCORE come to action to assist the FBI Aegnts to bypass "Lawenforcement Problems in a Lawful Surveillance"?

Slide A PRISM 2013 April

Closer View on Slide A - FBI Involvement A

Slide B PRISM 2013 April

Closer View on Slide B - FBI Involvement B

Slide C PRISM 2013 April

Closer View on Slide C - FBI Involvement C


may the NSA the way to bypass the Law Enforcement Problems in Lawful Surveillance for the FBI?

What do you think?

(The Complete PRISM Slides)

Assange Distributes "Alpha-Cipher" Editorial then Retracts for Unknown Reason

Started by Fantasio

1 Replies
Last post July 25, 2014, 19:52:25 PM
by mayya
Dark day for gay rights

Started by von

0 Replies
Last post December 16, 2013, 12:23:10 PM
by von
candle in the dark

Started by Ginny

0 Replies
Last post May 05, 2014, 10:31:48 AM
by Ginny
The Dark Side Of Chocolate

Started by TrxiZ

2 Replies
Last post February 27, 2013, 17:03:57 PM
by TrxiZ