IRS Claims They can Read Your E-Mail Without a Warrant; They Can’t (Unless You Let Them)

The Internal Revenue Service (IRS) believes that they can read your e-mails without acquiring a warrant:

The Internal Revenue Service (IRS) has claimed that agents do not need warrants to read people’s emails, text messages and other private electronic communications, according to internal agency documents.

[…]

In a 2009 handbook, the IRS said the Fourth Amendment does not protect emails because Internet users “do not have a reasonable expectation of privacy in such communications.” A 2010 presentation by the IRS Office of General Counsel reiterated the policy.

It’s fortunate that we live in a world where what the IRS thinks and what is actually true are two different things. While the Fourth Amendment doesn’t offer any protection from warrantless searches OpenPGP does. Enigmail is a plugin for Thunderbird that lets you easily encrypt your e-mail with Pretty Good Privacy (PGP). By encrypting your e-mail you can ensure only the intended recipient(s) can read it. Even if the IRS obtains a warrant to copy your e-mails from your service provider’s servers it won’t do them any good because they won’t be able to read those e-mails.

The IRS, or any other state agency, can only read your e-mail if you let them.

Bitcoin’s Rapid Rise in Value

Anybody that has been paying attention to Bitcoin as of late is aware of the crypto-currency’s sudden, massive increase in value compared to the dollar. Proponents of Bitcoin are pointing to this climb as proof that the currency is a real contender in the currency market and detractors have been saying that the rise is a bubble that is bound to burst. As an advocate of crypto-anarchism I have a keen interest in crypto-currencies, which offer a means for individuals to perform transactions in a fairly anonymous way. With that said I don’t see how this rapid growth in Bitcoin’s value is anything but a bubble. Rapid rises in value, such as a 50% increase in a 48 hour period, tend to be followed by a rapid drop in value. There are many potential reasons for this. Players of the stock market will sometimes perform what is called a pump and dump. Through various methods these players will artificially increase the price of a held stock and sell it when they predict the game is up and the price will soon fall. I wouldn’t be surprised if we later find out that somebody was performing a pump and dump style game with Bitcoin.

The part of me that wants to see crypto-currencies become pervasive wants to see Bitcoin continue to increase in value. Unfortunately the cynical asshole side of me is fairly certain that Bitcoin is in for a major drop in value at some point in the future (it may be tomorrow or it may not happen for a while). I am going to put myself on record saying that Bitcoin will experience a rather notable period of devaluation compared to the dollar. Since Bitcoin is established I don’t believe the devaluation will be as severe as the last period but I believe it will bit harsh enough to create a great deal of butthurt for those who have recently entered the Bitcoin market.

With that said, I base this prediction entirely on a consultation I had with Odin and a ghost claiming to be Ludwig von Mises. Anybody who has studied Norse mythology knows that Odin likes to fuck with people and the apparent ghost of Mises had a very minor, and potentially fake, German accent leading me to doubt its claim. Take my prediction with a grain of salt and wash it down with copious amounts of alcohol.

Violent Criminals are Trying to Recruit Potential Computer Experts

One of the most violent gangs in the United States has begun actively recruiting individuals who show a high aptitude in computer skill. I would advise parents to talk with their children and warn them against joining the ranks of psychopaths such as the National Security Agency (NSA) and Department of Fatherland Motherland Homeland Security (DHS):

The secretary of that agency, Janet Napolitano, knows she has a problem that will only worsen. Foreign hackers have been attacking her agency’s computer systems. They have also been busy trying to siphon the nation’s wealth and steal valuable trade secrets. And they have begun probing the nation’s infrastructure — the power grid, and water and transportation systems.

So she needs her own hackers — 600, the agency estimates. But potential recruits with the right skills have too often been heading for business, and those who do choose government work often go to the National Security Agency, where they work on offensive digital strategies. At Homeland Security, the emphasis is on keeping hackers out, or playing defense.

“We have to show them how cool and exciting this is,” said Ed Skoudis, one of the nation’s top computer security trainers. “And we have to show them that applying these skills to the public sector is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took top spots at the Virginia Governor’s Cup Cyber Challenge, a veritable smackdown of hacking for high school students that was the brainchild of Alan Paller, a security expert, and others in the field.

With military exercises like NetWars, the competition, the first in a series, had more the feel of a video game. Mr. Paller helped create Cyber Aces, the nonprofit group that was host of the competition, to help Homeland Security, and likens the agency’s need for hackers to the shortage of fighter pilots during World War II.

The job calls for a certain maverick attitude. “I like to break things,” Mr. Berman, 18, said. “I always want to know, ‘How can I change this so it does something else?’ ”

Between drones and these types of competitions it appears that the United States government is continuing its track record of exploiting young children by making war feel like a video game. What the government recruiters don’t talk about are the harsh realities of war. In the case of computer security working for the government means working for the entity that is actively trying to suppress free speech on the Internet. This entity has continued to push legislation such as the Stop Online Piracy Act, Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, and Cyber Intelligence Sharing and Protection Act. In addition to pushing destructive legislation this entity has also actively worked against free speech by seizing domain names of websites it finds undesirable (without any due process, of course). This entity has even go so far as to relentlessly pursue an individual for being a proponent of free speech and free information. By every definition of the word the United States government is a terrorist organization.

If you or somebody you know is an upcoming computer expert I urge you to urge them to work on projects that help protect Internet users from the psychopaths in the United States government. The Tor Project and I2P are always looking for more developers. Those of us that want to preserve free speech, free information, and privacy online need more advocates of cryptographic tools such as OpenPGP, Off-the-Record Messaging, and encrypted voice communications. Young computer savvy individuals should work on becoming experts in such technology, encourage their friends to use such technology, and work on the next generation of such technology.

Fortunately, for those of us that work against the United States government’s continuous attempts to censor the Internet, most people described by the state as computer hackers are not fond of authority and are therefore more likely to pursue non-state employment instead of working for the monster that labels them criminals.

State Surveillance is the Problem, Crypto-Anarchism is the Solution

It’s a new day, which means the state must be planning to expand its surveillance system:

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

The state can’t help but expand its automated surveillance capabilities as automated surveillance systems allow the state to keep more of its stolen wealth for itself. Needless to say we’re not going to see a reduction in the amount of spying the state does on us but we can avoid Big Brother’s gaze. It really is time to start participating in crypto-anarchism. Encrypting e-mail, using anonymizers, accessing information through location hidden services, and performing transactions with crypto-currencies should be standard practice. In fact parents should be teaching their children how to use these technologies at an early age (because we know the state’s indoctrination centers won’t). If you don’t know how to use these technologies you should learn.

I’m Giving a Presentation on Tor in Apple Valley, Minnesota

Tomorrow (March 20th, 2013) at 18:00 (although the talk probably won’t start until 18:30 or 19:00) I will be giving an introduction to Tor in Apple Valley, Minnesota. The event will be held at Rascal’s Bar and Grill located at 7721 147th Street West. My plan is for the event to be an introduction to Tor, specifically what it is, why it’s important, and how to use it. If anybody reading this blog is interested in attending feel free to join us.

3D Printed Firearm Technology Will Begin Advancing Quickly

I think we’re going to see a rapid advancement of 3D printed firearm technology now that Cody Wilson, the crypto-anarchist who is working to develop printable firearms while bypassing potential copyright laws, has a Type 7 Federal Firearms License (FFL):

On Saturday, Defense DistributedAmerica’s best-known group of 3D gunsmiths—announced on Facebook that its founder, Cody Wilson, now has a federal license to be a gun manufacturer and dealer. The group published a picture of the Type 7 federal firearms license (FFL) to prove it.

“The big thing it allows me to do is that it makes me manufacture under the law—everything that manufacturers are allowed to do,” he told Ars. “I can sell some of the pieces that we’ve been making. I can do firearms transactions and transport.”

Cody isn’t planning to stop with a simple manufacturing license though:

Currently, Wilson said he will not actually begin manufacturing and selling guns until he receives an “add-on” to his FFL, known as a Class 2 Special Occupational Taxpayer (SOT), as licensed under federal law (PDF). This would allow him to manufacture and deal a broader range of firearms under the National Firearms Act. The Class 2 SOT would grants Wilson the ability to manufacture, for example, a fully-automatic rifle. Wilson applied for the SOT on Saturday and expects to receive approval within a few weeks.

The primary advantage a manufacturing license has in regards to creating printable firearms is that it allows Cody to work on the project openly while legally seeking investors. In other words it keeps the state off of his back for a while. If Cody can build and test printable machine guns the technology of printable firearms in general is likely to advance leaps and bounds very quickly.

The United States is Opening All Financial Data to Spy Agencies

Things are about to get even more Orwellian in this country:

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters.

The proposed plan represents a major step by U.S. intelligence agencies to spot and track down terrorist networks and crime syndicates by bringing together financial databanks, criminal records and military intelligence. The plan, which legal experts say is permissible under U.S. law, is nonetheless likely to trigger intense criticism from privacy advocates.

Welcome to the United States where your every move is watched by the state. News like this is the reason I laugh whenever I hear somebody say that the United States is the freest country in the world. The United States is a police state and like most police states most of the people living here don’t realize it’s a police state. Oh well, this is another reason to start looking into Bitcoin. There’s no reason the United States spy agencies need to know what you’re buying and selling and Bitcoin is an means of keeping those transactions private.

Nationalism on the Internet

Bruce Schneier has an interesting piece discussing the dangers of Internet nationalism:

For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering an awful lot of nationalism right now. We’ve started to see increased concern about the country of origin of IT products and services; U.S. companies are worried about hardware from China; European companies are worried about cloud services in the U.S; no one is sure whether to trust hardware and software from Israel; Russia and China might each be building their own operating systems out of concern about using foreign ones.

I see this as an effect of all the cyberwar saber-rattling that’s going on right now. The major nations of the world are in the early years of a cyberwar arms race, and we’re all being hurt by the collateral damage.

[…]

Nationalism is rife on the Internet, and it’s getting worse. We need to damp down the rhetoric and—more importantly—stop believing the propaganda from those who profit from this Internet nationalism. Those who are beating the drums of cyberwar don’t have the best interests of society, or the Internet, at heart.

Rampant nationalism online is an issue that has concerned me for some time now and it is one of the things that motivates me to push for Tor hidden services. I worry about a time when various states, in my case the United States government, being pursuing individuals who post things online that goes against the state’s desired message. If that day comes it will be important to be difficult, if not impossible, to track down. The future of the unconcealed web looks bleak but there is hope in anonymized networks such as Tor and I2P.

3D Printer Firearm Manufacture Moves to Bypass Censorship and Copyright of CAD Models

Last month DEFCAD was launched to host firearm related 3D printer models after Thingverse implemented site-wide censorship. Cody Wilson, the man behind Defense Distributed, is working on a new endeavor, a commercial version of DefCAD aimed at the free distribution of 3D models and bypassing copyright laws:

Wilson said DefCAD will become a for-profit corporation that will act as a one-stop search engine for “3D printable models” of just about anything. In other words, DefCAD hopes to be an expanded version of the physibles section on the Pirate Bay.

“It maintains all the present features but we step it up a notch,” Wilson told Ars. “The Pirate Bay has the right idea with physibles, but increasingly the fight is going to be about physical copyright—we want to build one of the tools early.”

And like the Pirate Bay, which has thumbed its nose at corporations, copyright, and the legal system for digital goods, Wilson suggests DefCAD would do the same for physical objects as much as possible.

[…]

“Help us turn DefCAD into the world’s first unblockable, open-source search engine for 3D printable parts,” Wilson narrates in the video. “There will be no takedowns. Ever.”

[…]

Wilson acknowledged that like the Pirate Bay, there are “contingency plans” to incorporate or move his operations to other countries not as affected by the DMCA. He specifically mentioned Slovakia, Russia and Singapore as “places we could go.”

The commercial DefCAD site is up and looking for crowd sourced funding. While I admit that this venture may not turn out and there is always the chance that this endeavor is a scam I believe Cody had demonstrated his sincerity by setting up DefCAD.org and developing a 3D printable AR-15 lower. Due to those facts alone dropped them $50.00 because I believe in the cause. I, like Code, am a crypto-anarchist and believe a world where voluntary interactions, not coercive interactions, are the norm:

So what’s Wilson’s endgame? He describes himself as a “crypto-anarchist” who follows the teachings of 19th-century French anarchist philosopher Pierre-Joseph Proudhon.

“I believe in revolution—not the capital-R ‘Revolution,’ but I’m all for the next thing,” Wilson said. “No one can imagine the end of neo-liberal democracy. I don’t believe in socialism from above, but socialism from below. It doesn’t matter what it is, the point is that it’s not imposed. It will be what it needs to look like. [Society will be] based not on coercion but cooperation—I’m a desperate romantic. If any of these things are possible, I don’t want to believe in anything else. I want to see if these are real and can work.”

His viewpoint isn’t that dissimilar from my own:

The revolution won’t be violent, it won’t involve fighting in the streets, it won’t involved people rising up and overthrowing the governments of the world. What the revolution will involve is the continuous decentralization of power. Technology will continue to evolve in a manner that empowers individuals to separate themselves from their rulers. Powerful corporations who have enjoyed protection from competition through the state’s decrees will lose their power as an ever growing number of people are able to replicate their goods from the safety of their own homes. Enforcing patents and regulations will become impossible. As people begin to fabricate needed goods themselves the large corporations and the state will bring in less wealth. People will no longer be forced to buy goods from politically connected corporations or pay sales tax to the state.

3D printers stand to be one of the greatest tools ever devise for stripping power from the handful of centralized entities that currently hold it. The state’s laws become more and more irrelevant as people become less and less reliant on it and its cronies. Gun control laws would be meaningless in a world where any individual can easily fabricate whatever firearm they want. Wealth raked in through sales tax would dwindle as individuals are able to make needed goods themselves. Couple 3D printer technology with anonymizing tools such as Tor and you have a world where information cannot be censored, tied to any specific individuals, and goods can be shipped from designers to customers free of the state’s watchful eye.

We will not achieve liberty, in the firearms community or in general, through political involvement. Begging those in power to cede their power is a foolhardy strategy that is doom from the start. When you involve yourself in politics you involve yourself in a system that was designed and can be redesigned at any time by those currently in power. Playing outside of the political system allows you to play by your own set or rules. Instead of begging those in power for liberty you can develop ways to entirely bypass their tyranny. If you want to ensure the state cannot ban firearms, magazines, or other related accessories it would behoove you to do whatever is in your power to ensure 3D printer technology advances.

Tor Relay Update

Last week I mentioned that I purchased a Raspberry Pi specifically to use as a Tor relay. Two days ago I received the following e-mail:

Hello and welcome to Tor!

We’ve noticed that your Tor node christopherburg (id: 3F17 3F07 DDBB D8F6 34C7 9588 6F99 E808 1AE6 AB42) has been running long enough to be flagged as “stable”. First, we would like to thank you for your contribution to the Tor network! As Tor grows, we require ever more nodes to improve browsing speed and reliability for our users. Your node is helping to serve the millions of Tor clients out there.

As a node operator, you may be interested in the Tor Weather service, which sends important email notifications when a node is down or your version is out of date. We here at Tor consider this service to be vitally important and greatly useful to all node operators. If you’re interested in Tor Weather, please visit the following link to register:

https://weather.torproject.org/

You might also be interested in the tor-announce mailing list, which is a low volume list for announcements of new releases and critical security updates. To join, visit the following address:

https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce

Thank you again for your contribution to the Tor network! We won’t send you any further emails unless you subscribe.

Disclaimer: If you have no idea why you’re receiving this email, we sincerely apologize! You shouldn’t hear from us again.

As of this writing my relay has been running for 8 days, has sent 38.65 GB of data, and has received 38.10 GB of data. I’m happy that this thing has proven to be an effective relay. My next step is to pursue the development of a relay image that can be written to an SD card, plugged into a Raspberry Pi, and operate as a relay without requiring any additional (or, at least, significant) configuration.