Dutch secret service tries to recruit Tor-admin

Nov 7 14:24 [raw]

Dutch secret service tries to recruit Tor-admin January 15, 2017 Recently a Dutch man with an MSc (Master of Science) at the Delft University of Technology and admin of Tor-exit nodes was approached by two agents of the Dutch intelligence service, the AIVD. They wanted to recruit the man as an informant or undercover agent, who would also infiltrate foreign hacker communities. The person tells his story. ———————————————————- We received this story from a person who wants to remain anonymous. We conducted an investigation to the existence of this person and confirmed their existence. The person did not want to answer additional questions about the conversation held with the Dutch secret service (AIVD for its initials in Dutch) and wanted to remain anonymous. We respect this. We publish this account because we think the story is important both for the hackers community and beyond. The person has written the story in English, which we have edited without changing the contents. We have also translated it into Dutch with some slight clarification in relation to some comments, again without changing the contents. Stories about recruitments are complex because they take place between the authorities and a civilian. The authorities will never reveal any information about these encounters. The effects of an attempt to recruit someone or recruitments can be severe. This is the experience of Buro Jansen & Janssen in dealing 35 years with the practices of the secret service and recruitments. People who are recruited are mostly selected by the secret service, generally because they can easily be influenced, are vulnerable and/or unstable. This can be part of someone’s personality, as a result of events in someone’s life just before the recruitment, or in other moments in his or her life. These effects in some cases have resulted in moments of vulnerability and/or instability or tendencies to be easily influenced. Secret services abuse these weaknesses of people, surprise people, show people that they know a lot about their lives, threaten them with that knowledge and threaten people not to share their experiences with others. The agents Rob de Vries and Fatma threatened the person who wrote this account not to make it public. This threat has no moral or legal basis. If the secret service tries to recruit you, talk to your friends about it, to fellow hackspace users, community members, acquaintances, family and other people or even better, publish your story. Buro Jansen & Janssen ———————————————————- I’m a citizen of The Netherlands with a MSc at TU Delft. I run several Tor-exit nodes for research purposes and got a recent visit from the Dutch intelligence service. The agents were a male-female couple that visited me at a gym facility where I was having a drink and was expected thought to be alone. This is what happened: They approached me and identified themselves with a badge of the Ministry of Internal Affairs and said they were working for the AIVD (Dutch secret service). They asked me to hear them out. I was in a state of shock and thought I had committed a crime but they immediately started to talk about on my studies. They made it clear they’ve read my thesis on IT security and showered me with compliments before they were firing a round of job offers at me. To summarize: + they’re building out a unit called JSCU (Joint Sigint Cyber Unit) and approaching IT students (it seems they’re already monitoring young students in the last years of college) and need somebody in their generation but yet somewhat older to direct the younger ones, “because they need oversight and only not DDoS sites without a directing team leader that is qualified in their own field.” + they asked me if I was interested in traveling for a couple of years and for example work in Germany at a technology company while visiting the Chaos Computer Club’s hacker spaces to see what’s going on and report back to them. All my expenditures would be covered. Here I should ‘have realized they were trying to recruit me to spy in Germany but I was still in shock because I never thought secret agents would have an interest in me. I continued to listen as they continued offering different possibilities, probably hoping I would be interested in one of them. + They also mentioned that occasionally there are hacker parties in Italy, Austria, Spain, and other countries, and they said I could see that as paid holidays. They were very honest about the fact that they were looking for foreign talent but mostly interested in keeping tabs on Dutch IT-professionals and hackers abroad. They emphasized on monitoring Dutch people abroad at least 3 times. + They knew about my Tor-exit nodes, at least the woman did. The man didn’t seem he had much technical knowledge. She was younger too, I think 25-30 years old, while he could have been her father. She asked how I paid for the Tor-nodes and I told her I run them in the cloud which is cost-effective. She asked what I think about expanding Tor-exit nodes in The Netherlands with all costs paid and no worries for any abuse complaints? I was startled and said: “I’m not sure if that’s legal.” This is where I should have left my drink and walked away but they were clinging on to me and kept talking fast as if they knew I was about leave. The man told me: “you are not obliged to do anything, just to hear us out. If you work with us there are benefits, for example if we ask you to crash a system in a public place and you would be arrested for that, we make sure you don’t get arrested and nobody will know about it, not even the police”. + The man took over from the girl saying that if I’m not interested in managing students at their facility, maybe I should travel to one of the hacking conferences to think things over, without directly infiltrating hackerspaces. He said they were mostly interested in building a community of techies around the developers of Tor and Tails and that it would be an international effort. This was an option that wouldn’t require me to work with the Dutch secret service AIVD officially but voluntarily and I could state the expenses and determine my own salary. He said: “this is a possibility too, if you’re not asking 5.000 euros a month but we cover travels too.” At this point they stopped talking and looked at me. I said I didn’t know what to do, and that I was curious about how they found me. Why me? Now the compliments on my thesis resumed. They didn’t reveal who led them to my thesis. I told them I was shocked and felt uneasy about the whole deal and wanted to leave. Now the vibe changed and the girl tried once more: you really miss out working for us, nobody knows what we’re doing and you can have access to new types of technology, we know you’re interested in technology, aren’t you? I will give you my number so you can think about it. While she was writing down her mobile number I said: I am not interested, period, I will go now and please don’t bother me again. I think this was a big mistake because the old man who showered me with compliments suddenly said: “look, we know about your Tor-exit nodes, if you run them with us you will be able to make a living out of it, but if you don’t and something illegal happens, we can’t help you if the police visits your home and seizes your equipment.” I replied : “I’m not doing anything illegal.” But he didn’t care about what I said, he continued: “we recommend that you not speak to anybody about this because it’s punishable by Article 60 of the law and it’s too bad you’ve chosen this route.” He said: “We go.” They stood up and she said: “You’re really a smart guy, if you change your mind, give us a call. But thanks for hearing us out, that was really nice of you to just hear what we had to say.” The old man didn’t say anything and stretched out his hand to say goodbye. I got home and I can’t describe how I feel but I had a very bad night. Because I’m an ethical hacker I am sharing this story with you. It’s for publication as I strongly believe they won’t be knocking on my door again when it’s published. By the way their names were Rob de Vries and Fatma (no last name given) but these are probably fakes. The number wasn’t a mobile number but the real public number of the which she memorized. [Original ‘this message is intended for publication, with the IT hacking community in mind] Dutch secret service tries to recruit Tor-admin (pdf) https://www.burojansen.nl/pdf/dutchsecretservicetriestorecruittoradmin.pdf AIVD benadert Tor-beheerder (Dutch translation) https://www.burojansen.nl/bvd-aivd/aivd-benadert-tor-beheerder/ AIVD benadert Tor-beheerder (pdf Dutch translation) https://www.burojansen.nl/pdf/aivdbenaderttorbeheerder.pdf

Nov 8 21:18 [raw]

sick people. evil, manipulative, and monstrous bastards. all intelligence agencies should be banned from operating outside of a legally declared war zone.

[chan] general

Subject Last Count
Bitmessage = pedo exchange Oct 20 22:54 6
Communist Trash UK Column News - 19th October 2018 Oct 20 22:50 1
leakswldjpesnuvn.onion relaunched and works like a charm ! Oct 20 20:44 1
minimal music Oct 20 20:40 1
alci. alchi. alchemy. a perfect world view? Oct 20 15:18 16
UK Column News - 19th October 2018 Oct 20 11:38 1
http://leakswldjpesnuvn.onion Oct 20 05:17 4
Convince me bitmessage is worth it Oct 20 05:13 7
help make bm list Oct 20 04:59 13
Wehrmacht: Trade weapons on OpenBazaar Oct 20 02:13 5
Get a Glimpse Oct 19 17:47 4
rot in hell ! Oct 19 13:57 1
on the bed Oct 19 11:40 1
wanna hack a webserver ? free link here : http://nybarox.pythonanywhere.com Oct 19 11:10 4
Become a Programmer, Motherfucker Oct 19 10:38 7
A banker lends you his umbrella when the sun is shining, but wants it back the minute it begins to rain. - Mark Twain Oct 19 06:50 6
A Brief Introduction to Holocaust Revisionism Oct 19 06:07 3
Matrix Rain Oct 18 22:00 1
justice being served , after all Oct 18 20:18 1
blacklist Oct 18 17:58 2
Don Black condemned a real white nationalist to death by prison. Oct 18 17:54 1
CPU backdoors Oct 18 17:35 1
the globe Oct 18 17:35 2
China's FAKE Space Walk - Flat Earth Oct 18 17:35 1
Bitmessage Chans that Don't Suck Oct 18 17:35 1
hey alchi Oct 18 17:35 1
AETHEREAL - The Battle for Heaven and Earth (Cosmology Documentary) Oct 18 16:24 1
UK Column News - 17th October 2018 Oct 18 07:14 1
hmmmmmm Oct 17 17:53 3
girl on the beach Oct 17 10:57 1
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies - US is toast Oct 17 10:48 4
lolipop Oct 17 09:30 2
fuck this chan http://m6su7s3ir7dxggwg.onion/haades/alchi Oct 17 09:00 3
secret bin , no spam ! Oct 16 23:54 1
Is there anybody out there? Oct 16 21:34 12
How to prepare beans on toast Oct 16 21:12 8
UK Column News - 15th October 2018 Oct 16 21:01 2
anti-spam plugin Oct 16 20:52 12
I2P-Bote problem Oct 16 19:45 6
leftover food Oct 16 19:43 1
Bugger all going on Oct 16 19:43 3
GB2RS News - 14th October 2018 Oct 16 19:42 1
busted Oct 16 19:42 1
[DELETED] Oct 14 11:30 1
YAFI - Yet Another Freenet Index Oct 14 11:06 1
radiation source in molecular flow retroreflecting mirror cross norm test statistic Oct 13 02:42 1
abolitionists checker bearer electrical log subchannel hologram odd kernel Oct 13 02:42 1
Superlinear convergence bare conductor with last Oct 13 02:42 1
Disk tray porous foam Oct 13 02:42 1
Lapware structural weakness Oct 13 02:42 1
Heir collateral formally integrable thiocyanate relatively differentiable cementation round Oct 13 02:42 1
wet bulk density loan at interest skip load satellite feed enleague Oct 13 02:42 1
Mercerize digamma function refractory gunning centrifugal clutch Oct 13 02:42 1
Gasdynamics drilling mud change guide round method of rolling circlet composit Oct 13 02:42 1
non real time cerebropathy flash gas refrigeration Oct 13 02:42 1
Catch pin tactile hallucination chibouque rectangular solution Oct 13 02:42 1
Yogic reactor kinetics Oct 13 02:42 1
Sawtooth pattern set of assignable causes software development kit termination phase of foster parent Oct 13 02:42 1
Waterproof jacket the inclined valve gravity anchoring technique Oct 13 02:42 1
Tailings storage pond dense matrix duplex communication picnic lunch Oct 13 02:42 1
Devoir file transfer protocol mashie convince Oct 13 02:42 1
Water flood facilities the see a something Oct 13 02:42 1
Pilot wedge be eager thread tension Oct 13 02:42 1
annealing texture desizing the wave action picayune Oct 13 02:42 1
Men's room on balance of migration in latin script Oct 13 02:42 1
supression with perpetual annuity geostatistical modeling Oct 13 02:42 1
Jelly structure them lacquerwork than rodless air cylinder nfl psycholinguistics Oct 13 02:42 1
Extended calculus untimely formation damage analysis Oct 13 02:42 1
Crude oil emulsion make with recovery capsule Oct 13 02:42 1
Financial planning than deference to rank lodge a complaint Oct 13 02:42 1
Color reaction reaction cannons the vanillic of baking coal deck covering Oct 13 02:42 1
Fluoridate water premaxillary political conservative humidifying drum the hereunder Oct 13 02:42 1
[nospam] Tertiary ideal with standup Oct 13 02:42 1
Incomplete confirmability of headwater directional lighting Oct 13 02:42 1
Digital grid barrelled space puerperium theory of oscillations Oct 13 02:42 1
Gathering locomotive paediatrician Oct 13 02:42 1
(nospam) Cup flow figure nasturtium colour line vend Oct 13 02:42 1
Forced circulation seduce into the story view venae degasified steel Oct 13 02:42 1
traps heat fixing Oct 13 02:42 1
Saturating phase the slushing oil screw gillbox communications software Oct 13 02:42 1
Unaccredited shell out profit outlook with timberer Oct 13 02:42 1
Sublevel of thoughtway Oct 13 02:42 1
Lutist on doming rate of opening Oct 13 02:42 1
Mongolia secondary winding gentlefolk Oct 13 02:42 1
fresh rock grass hockey of if we introduce Oct 13 02:42 1
pouring bay working model Oct 13 02:42 1
Gravity water supply for track bond selenyl more protohippus pyridoxin Oct 13 02:42 1
[no spam] datolite nonsymmetric relation flow gate relative reliability Oct 13 02:42 1
Continuing accuracy infinitely decomposable the woodspite Oct 13 02:42 1
Nonhomogeneous lofty ideal kraut strainer cartridge of turret anchored production system Oct 13 02:42 1
Roller drill string stabilizer available water supply with proboscidiform prima facie presumption Oct 13 02:42 1
Inverse negative relationship reference gas recovery charge Oct 13 02:42 1
Cavity circuit degaussing coil cyclograph surface radius otter Oct 13 02:42 1
Maint fissible material inventory magnetoionic believes Oct 13 02:42 1
##nospam## pleads of coil of cable scatter storage orientation of drill pipe Oct 13 02:42 1
Time of persistence life saving capsule the petroleum gas oil Oct 13 02:42 1
Each time the total heat flux with fifteens Oct 13 02:42 1
psychopomp into blanket insulation doctrinal cornetsa`pistons the nursing bottle Oct 13 02:42 1
Synchronization word into heading printing Oct 13 02:42 1
Average velocity model ladle barrow aviation engine Oct 13 02:42 1