eon on Mon, 25 Jun 2001 21:24:11 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Nettime-bold] FBI Subpoena Targets Name.Space "LokMail" Users


False Sense of Security:
Who's Watching the Watchman?

FBI Subpoenas Lok Technology
over Name.Space "LokMail" Users

New York, June 25, 2001

Privacy and security based technology is
only as good as those humans who you
trust to administer it. With a growing
number of web based encrypted email
services now available, individuals need
to be aware of who's behind the
so-called 'secure' or 'private' mail
services.  Users can easily be lulled
into a false sense of security by using
encrypted email, not knowing that their
traffic may be monitored by the FBI. 
Even if the contents of messages are
encrypted, the sender and recipient are
'in the clear' and recorded in the mail
server's transaction logs.  Email
surveillance is not necessarily about
the contents of the messages so much as
who sends email to whom, when, how
often, etc.  Encryption can not mask the
exchange of messages between parties,
only its contents.


----illustration-----
Example of maillog transaction log showing 'traffic'
between "someone@somewhere.online" and "someone.else@anotherplace.online":

Jun 25 02:19:31 server sendmail[16910]: CAA16910:
from=<someone@somewhere.online>, size=265, class=0, pri=30265, nrcpts=1,
msgid=<Pine.NEB.4.05.10106250219160.16907-100000@mail.server.somewhere>,
proto=ESMTP, relay=localhost [127.0.0.1]

Jun 25 02:19:31 server sendmail[16912]: CAA16910:
to=<someone.else@anotherplace.online>, ctladdr=<someone@somewhere.online>
(1001/1000), delay=00:00:00, xdelay=00:00:00, mailer=esmtp,
relay=mail.info.war. [209.48.2.38], stat=Sent (CAA15362 Message accepted
for delivery

----------------------

One such provider of an encrypted
webmail service is Name.Space, who
launched the "LokMail" brand of secure
webmail, along with its inventor, Simon
Lok, back in 1999, the first web mail
solution to use PGP (Pretty Good
Privacy) strong encryption.  To its
users, Name.Space has pledged a strict
privacy policy, that logs and data on
its servers are not disclosed, sold, or
otherwise made available to any third
parties, and that law enforcement must
use due process to gain access to data. 
Large corporations such as Disney have
come out publicly against Name.Space
because of its strict privacy policies.
Now, Name.Space is confronted with a
situation where it needs to take
measures to enforce that policy, which
may have been breached several weeks ago
by one of its contractors.

It has been learned that the FBI has
allegedly served a subpoena on
LokTechnology, (the owners of the
'lokmail.net' domain, and who provide
the "LokMail" technology to a server
owned by Name.Space), possibly to monitor
the mail traffic on the server.  The
problem is, Lok Technology does not own
the server or the users that are named
on the subpoena, Name.Space does.  Lok
Technology only controlls the domain
name 'lokmail.net', that presently
directs traffic to the server owned by
Name.Space.

During the weekend of April 27, 2001
Simon Lok, author of the "LokMail"
encrypted web-based email software,
dialed in to the Name.Space internal
network in order to access the LokMail
server owned and operated by Name.Space.
 He then proceeded to compress selected
email traffic logs, and transfer them to
his computer at Columbia University. 
The transfer was discovered in progress
by Paul Garrin, when he noticed
extremely high bandwidth utilization on
the Name.Space network monitor.  At
first it looked like a 'flood', a
typical 'denial of service' attack. Paul
opened a control connection to the
LokMail server and displayed the active
processes, showing that user 'simon' was
logged in and an 'sftp' transfer was in
progress to an IP address located at
Columbia U. Upon closer examination it
was discovered that the file consisted
of mail traffic logs from the weekend of
April 20, 2001, the time of the FTAA
demonstrations in Quebec City, Canada.

"Strange, I thought" said Paul Garrin
when he wondered what the purpose was
for downloading such a huge amount of
data, which was incidentally clogging up
the T1 line and slowing down traffic to
other sites hosted on the network. 
Immediately it seemed that something was
wrong, especially since Simon was not
scheduled to do any maintenance or
emergency repairs to the server, and he
was not authorized to download
transaction logs that contain the
senders and recipients of the mail sent
to and from the server. "I took
immediate action to stop the transfer"
Garrin said, "and proceeded to terminate
Simon's login session and change the
password".  A short while later, as
server logs indicate, Simon made several
attempts to reconnect to the network but was
refused as the password had been changed
by Paul.

"I expected that if what Simon was doing
was important, he would have contacted
me about regaining access to the server,
but since he never said a word, although
as the logs show, he made several
attempts to re-establish his connection,
I thought it was even more strange"
Garrin said.  Apparently Simon gave up,
accepting only a portion of the download
that may have made it to his computer, and
walked away quietly, never mentioning
anything about his access being
terminated.

"I was surprised since Simon and I
seemingly had mutually strong
convictions toward protecting the users'
privacy, a passion we shared that led us
both to collaborate on building a system
that we could trust and that users could
trust, the project that became known as
'LokMail'.  It baffled me to think or
even to imagine that Simon would be
capable of violating that trust that we
worked so hard to build and to extend to
users by offering strong encryption over
the web, for free".  It especially hit
hard because Name.Space, and Lok
Technology, a recently funded venture
co-founded by Lok and Garrin, were in
the process of negotiations for
upgrading the users on the Name.Space
owned and operated LokMail v1 server, to
the new system, owned by Lok Technology.
 One of the key concerns for Garrin was
that the users be notified of the change
in policy that would come along with
retaining the "@lokmail.net" address,
since the "lokmail.net" would transition
to the new server owned by Lok
Technology, likely under a different
privacy policy. The incident with the
maillogs from the weekend of April 20
cast a spectre over the deal because it
was clear that whatever policy Lok
Technology would publish may be dubious
at best, especially if Simon had
downloaded the mail logs with the intent
of ascertaining the traffic on the
lokmail server from the April 20th
weekend, possibly to hand over to the
FBI.

On Wednesday, June 22 Jostein Algroy,
Name.Space COO presented Lok Technology
with Name.Space's business proposal,
which contained an outline for the
transition of the domain 'lokmail.net'
back to Lok Technology, so they could
direct the traffic to their new server,
once the Name.Space users had been
notified of the changes in service and
policies that accompanied keeping their
"@lokmail.net" email address.  It asked
that Lok Technology supply a copy of
their privacy policy for review by the
Name.Space users so they could decide
whether to sign on with Lok Technology
and keep their "@lokmail.net" addresses,
or to stay on the Name.Space operated
server under a different domain, with the same
strict privacy policy Name.Space offers,
under which users originally signed up.

The response from Lok Technology's John
Miller was: "Lok Technology has no
interest in pursuing a business
relationship with Name.Space". 
Following that was a message stating
that the DNS mapping for 'lokmail.net'
will be re-directed to the new Lok
Technology server in a few days, totally
cutting off service to the Name.Space
owned server that has responded to the
"lokmail.net" domain since 1999.   Simon
Lok then chimed in with an email touting
the solution as "just send me the list
of usernames on the machine and we'll
forward them back to the v1.server". 
Garrin responded that Simon's solution
was unacceptable-- and for good reason:
by channeling the v1 usernames through
the new servers owned by Lok Technology,
the traffic logs are written on the Lok
Technology owned servers, giving them
ongoing surveillance capabilities on the
v1	server's users without having to
get them from Name.Space!  That's the
same type of info that was contained in
the mail server logs that Simon
attempted to download in April, except
in this case he wouldn't NEED the access
to the Name.Space owned server because
the logs would naturally end up on HIS
system if he fowarded the mail for the
users on the v1 system.  In addition,
the full list of usernames would no
longer be confidential should they be
handed over to Lok.

"When I found out that the FBI had
served Lok Technology a subpoena, it all
began to make sense to me", Garrin said,
drawing a parallel to the Seattle Indy
Media Center's encounter with the FBI
regarding alleged posting of information
stolen from a Canadian Police car during
the FTAA protests in Quebec City.  "The
only problem in this case is, they
served it to the wrong people, since
Name.Space owns the server and the users
accounts on it, Not Lok Technology."

The Seattle IMC is currently fighting a
court order that asks it to turn over
server logs for a period during the FTAA
protests, the weekend of April 20, 2001.
The court order was prompted by the following
two posts:
 http://montreal.indymedia.org/front.php3?article_id=514
 http://montreal.indymedia.org/front.php3?article_id=515

Two people were arrested in Quebec
charged with mischief and theft, Martin
D'anjou and Patrick Blanger, who are
set to go to trial in September.

It's not known whether or not the
subpoena issued to Lok Technology is
related to the arrests in Quebec, or
if it is meant to find out about any
anti-globalization activists who may
have accounts on the LokMail server.

Paul said that he doesn't blame Simon
if he got scared and acted irrationally
when the FBI reached out to him,
especially because Simon's PhD scholarship
depends on the security clearance he
holds, with his research work sponsored
by the US Navy.  Loss of his clearance
could mean the end to his PhD, something
that Simon is unlikely to risk should
that be the case if he didn't help the
FBI with what they want. "I really hope
for his sake that he didn't do anything
improper or illegal", Paul said.  When
confronted with his attempted download of
the mail logs, Simon denied that he was
taking the data to hand it to the FBI,
and instead claimed that he wanted
to analyze it to see how much bandwidth
was being consumed by the mail traffic
on the server, an explaination that
Garrin met with skepticism.

Garrin states that Name.Space will
comply if served with a subpoena,
provided that proper due process is
followed, and cause is shown. "What I
won't do", Garrin said, "is allow our
users to believe that their traffic data
is safe when indeed it's in fact being
recorded beyond our network and our
control, which would be the case if Lok
Technology forwards the mail through
their system".  There's no telling who
will get access to our users' email
transaction data, or whether Lok
Technology will protect that data to the
degree that Name.Space does, to the
fullest extent of the law.  "Recent
events call this into question and I'm
not prepared to leave anything to chance
at this moment" Garrin concluded, "and I
will err on the side of caution, until
all the facts are in".

--end


_______________________________________________
Nettime-bold mailing list
Nettime-bold@nettime.org
http://www.nettime.org/cgi-bin/mailman/listinfo/nettime-bold