189 points

Fuck this human

Tldr; Asshole used encrypted everything and Tor to create and spread csam. Government isn’t disclosing how they caught him

permalink
report
reply
107 points

If you distribute encrypted materials you also need to distribute a means of decryption. I’m willing to bet a honeypot was used to trick him into distributing his csam right to the government hinself.

permalink
report
parent
reply
50 points

True. Or it could have been a backdoor in his phone, or the full running browser in his sim card, or the backdoor into his CPU chips… Maybe they do old fashioned police work for these cases and only use the pegasus spyware for others?

Pretty silly to do anything illegal on a computer when we know how flawed they are, imo

permalink
report
parent
reply
1 point
*

Hey, could I get some info on the

Full running browser in his SIM card

Thing?

I’m quite curious and haven’t been able of finding anything on the internet about it

permalink
report
parent
reply
95 points
*

Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

permalink
report
parent
reply
11 points

Well it probably wasn’t a Vic Mackey-style rubber hose attack, because it sounds like this chump is getting hauled into court.

permalink
report
parent
reply
-8 points

Tor was created by NSA, half of Tor servers are run by NSA, not that secure

permalink
report
parent
reply
24 points

Tor was created by the NRL, which is a part of the US Navy and Marine Corps.

permalink
report
parent
reply
8 points

Tor was created by the Naval Research Labs, and was released to the public because it is secure.

The problem is that if it’s only the CIA or DIA using it, it’s easy figure out who is using it and where. Make it global and now there is a lot of noise to separate out.

permalink
report
parent
reply
-66 points

Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

permalink
report
parent
reply
37 points

we’re talking about encryption here, not…that. please get your mind out of the gutter

permalink
report
parent
reply
81 points

He didn’t use encrypted everything. He had a public telegram group chat in which he stored a lot of his material. Which, as many people in the comments on the article pointed out, is not encrypted, but is presented by telegram as if it is. That’s likely how they caught him.

permalink
report
parent
reply
6 points
*

To be clear, it’s encrypted*.

* If you enable it

permalink
report
parent
reply
19 points

Recent events have taught me that only individual chats are encrypted*. Group chats don’t have that feature.

permalink
report
parent
reply
13 points

Telegram groups are not E2E.

Chats are encrypted, but the servers hold the encryption keys (I believe).

There are one-to-one chats that are full e2e, but you have to enable it. And it has all sorts of compromises.

Qualifier: this is as dicumented by telegram. Since it’s not open source, we can’t really verify it

permalink
report
parent
reply
9 points

There is no point in encrypting a public group chat since anyone can join and decrypt it anyway.

permalink
report
parent
reply
1 point

AFAIK chat contents are stored unencrypted on the server.

permalink
report
parent
reply
4 points

They got it by running a honeypot exit node like they always do

permalink
report
parent
reply
2 points

It’s better they don’t disclose it and catch more people doing the same.

I’m all for transparency but if that means less caught child molesters, I’m ok with a little obfuscation, even from the fucking pigs.

permalink
report
parent
reply
2 points

my guess is that a large number of tor exit nodes is run by government agencies.

permalink
report
parent
reply
1 point

.onions: am i a joke to you?

permalink
report
parent
reply
1 point

Certainly some are. How many is an entertaining question.

permalink
report
parent
reply
110 points

This whole thing is horrifying, but the last paragraph is especially disturbing:

Since Herrera himself has a young daughter, and since there are “six children living within his fourplex alone” on Joint Base Elmendorf-Richardson, the government has asked a judge not to release Herrera on bail before his trial.

Even more disturbing is it said he was also producing content.

permalink
report
reply
-12 points

Where is the police brutality when you need it?!

permalink
report
parent
reply
1 point

As satisfying as it may seem we can’t do this. No group no matter how heinous should be abused by the police. Don’t give the pigs an inch.

Let him be convicted then see what gen pop has to say about it.

permalink
report
parent
reply
95 points

Does this go to show that authorities needing backdoors to everything in order to do their jobs is actually kind of nonsense?

permalink
report
reply
62 points

The article is exaggerating the guy’s setup way too much. Opsec doesn’t end at the application level… The OS (the most popular being in bed with US), ISP, tor nodes, Honeypot VPNs, so on and so on could leave a trail.

Using telegram public groups and obfuscating a calculator as a password protection layer is hillbilly level of security.

And i’m glad these fuckos don’t have the knowledge to go beyond App developers marketing.

permalink
report
parent
reply
5 points

Goes beyond the OSI model, too. Someone has to pay for that VPN, and there has to be an entry point to getting BTC, using a 2nd hand laptop where they can prove you bought it off of someone off of Craigslist, etc.

permalink
report
parent
reply
5 points

Mullvad let’s you write down an account number on a piece of paper and mail it in with cash and they’ll activate it.

permalink
report
parent
reply
2 points

Yup, every time I read about something like this, I look at what I’m doing and it’s way overkill, and I have nothing to hide. I’m guessing there are plenty of sickos that don’t get caught because they practice half-decent opsec, but there are a ton that don’t.

permalink
report
parent
reply
36 points

Yeah, it does. Perfect opsec is impossible even with encryption.

permalink
report
parent
reply
68 points
*

Heard about a guy doing insane opsec when selling on the dark web (darknet diaries podcast).
In the end he got busted because a trusted member if his operation got lazy and ignored his rules

Edit: This guy was essentially
Leeching internet via a directional antenna from a neighbour that was significantly away
Not allowing any visitor in with a cell. You had to keep it outside
All drug related actions are done in a cleaned down room.
Tripple sealing dark marketplace orders, wiping everything down with corrosive fluids to destroy any sort of dna material
Not going to the same post office in (I believe 6 months) and only sending of 3-6 shipments at once

I hope I got it correctly. Please go listen to the episode: https://darknetdiaries.com/episode/132/

permalink
report
parent
reply
35 points

Reminds me of the lulzsec leader dude who exposed himself by logging into IRC once without tor on.

Then he folded instantly and became an informant for the FBI to stay out of jail lol.

In the end its really about tradeoffs. You can’t be an expert in everything so you need a team if you want to do anything big, but Cyber criminals are still criminals. They don’t trust each other which is what ultimately leads to their downfall even if they do all the implementation and tech part right.

permalink
report
parent
reply
9 points

That’s sounds mostly correct.

His relative also admitted their involvement and flipped on him which destroyed the narrow avenue he had to throw out the original evidence for the warrant.

Of course we only ever hear the cases of people who get caught. If he relative hadn’t gotten lazy he may never have been caught.

The lesson there is not to involve other people.

permalink
report
parent
reply
-2 points

Just exterminate all statists within 52’000 km and donezo

permalink
report
parent
reply
64 points
*

The Ars article seems to suggest that they were able to crack his phones pretty easily, which is a bit scary. I don’t see anything about a computer.

Although it doesn’t appear he was actually using any encryption apps to store material; rather, he used a fake calculator app as password protection. Obviously not the brightest bulb in the drawer.

permalink
report
reply
64 points

The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have “created his own public Telegram group to store his CSAM.” He also joined “multiple CSAM-related Enigma groups” and frequented dark websites with taglines like “The Only Child Porn Site you need!”

My guess would honestly be Telegram. For starters, they aren’t end-to-end encrypted by default, you have to turn it on. The only end-to-end encryption that Telegram offers is their “secret chats” which are only available between two users. Groups are not encrypted.

permalink
report
parent
reply
19 points

So telegram’s delusional propaganda did something good for once?

permalink
report
parent
reply
5 points

What propaganda?

That groups aren’t encrypted is documented. If you don’t know that, it’s because you didn’t bother to see how it works.

permalink
report
parent
reply
30 points

The Ars article seems to suggest that they were able to crack his phones pretty easily

Android uses data at rest encryption, which isn’t really useful without a lockscreen PIN/password since data gets decrypted after you unlock your screen the first time after each boot

Although it doesn’t appear he was actually using any encryption apps to store material; rather, he used a fake calculator app as password protection. Obviously not the brightest bulb in the drawer.

Agreed, he probably felt safe enough “hiding” the files. Definitely not the sharpest tool in the shed, which is great because fuck this guy

permalink
report
parent
reply
18 points

I honestly don’t think he really had any opsec apart from those few applications, look at what tools he was using, what a joke. Fake calculator app to store files are great to protect from your parents, not the FBI.

He was clearly using Android and I bet he was using the stock rom, kyc sim card, and not even a vpn behind tor.

Don’t get me wrong, I’m very happy and relieved he was caught, but if he had done serious research and did a better opsec, it wouldn’t have been so easy for the authorities to get him

permalink
report
parent
reply
8 points

actually using a vpn with tor is not a good idea: https://support.torproject.org/faq/faq-5/

permalink
report
parent
reply
14 points

true but only if you do : tor > vpn

if you do : vpn > tor in this order, it’s way more resistant, because if the onion node is compromised, it’s the vpn’s ip address that is exposed, not yours

permalink
report
parent
reply
6 points
*

Phones are horseshit for OPSec, always. Every darknet admin and their dog know that.

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
51 points
*

It seems irrelevant whether this person is using encrypted channels if they failed to maintain anonymity. If they distributed material and leaked any identifying info (e.g. IP address), then it would be trivial for investigators or CIs to track them down.

permalink
report
reply
18 points

Likely, data may have been encrypted but he may have leaked compromising metadata. Even more likely it was bad operation security linking a personal identity to his anonymous persona.

I’m always thankful for incompetent criminals.

permalink
report
parent
reply
8 points

Thankfully it seems pretty unrealistic that someone addicted to CSAM would maintain perfect OpSec over a lifetime of abuse.

permalink
report
parent
reply
15 points

In the list of apps he was using I don’t see any mention of a VPN. How much you want to bet he raw dogged it with encrypted apps over the clearnet so it was trivial to leak his real IP address

permalink
report
parent
reply
6 points

He posted the AI filth to a “public server”, so I’m willing to bet his plan was just full of holes. I don’t mind pedos getting taken down, buy I do mind encrypted software being owned by the government - any government.

permalink
report
parent
reply
12 points

It sounds like he created material, not only AI but actual children then distributed it. The tools to track down the creators of CASM is only getting better.

A single legal image of any of those children posted to social media is going to allow algorithms to make the match and its routine detective work from there.

It only takes one child to talk. No amount of encryption is going to stop that.

permalink
report
parent
reply
6 points

i watched some documatnary about hackers, and usually, they catch them because they talk way to mouch about themselves.

permalink
report
parent
reply
12 points

Bad OPSEC is what that’s called.

permalink
report
parent
reply
2 points

thanks!

permalink
report
parent
reply
3 points

This dude wasn’t a hacker by any stretch

permalink
report
parent
reply
2 points

But when you do anything illegal like this, you need to act like one.

permalink
report
parent
reply
1 point

i believe thats a given…

permalink
report
parent
reply
1 point

All this is obvious.

Since nobody pressures Signal and Wire in Europe, it really seems to me that the pressure is mostly applied to those who do have the ability to spy upon their users.

That would be too optimistic about humanity, but maybe not. What if.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 4.9K

    Posts

  • 87K

    Comments