/ markdown / badopsec.md
badopsec.md
  1  ## 📚 Table of Contents
  2  
  3  1. [Here are some notable examples of bad Tor OPSEC](#here-are-some-notable-examples-of-bad-tor-opsec)
  4  * 1.1 [School Bomb Threats](#school-bomb-threats)
  5     * [Florida High School Student](#florida-high-school-student)
  6     * [Harvard Student Eldo Kim](#harvard-student-eldo-kim)
  7  * 1.2 [Silk Road Case](#silk-road-case)
  8  * 1.3 [LulzSec Hacking Group](#lulzsec-hacking-group)
  9  * 1.4 [General Bad OPSEC Practices](#general-bad-opsec-practices)
 10  
 11  3. [External Lists on GitHub](#a-few-lists-i-found-on-github)
 12  
 13  4. [Mullvad VPN: A Contrast in Security](#mullvad-vpn-a-contrast-in-security)
 14  
 15  5. [Final Thoughts](#final-thoughts)
 16  6. [References](#References)
 17  7. Back to [main guide](../README.md)
 18  
 19  # Here are some notable examples of bad Tor OPSEC:
 20  
 21  In short
 22  
 23  [You Didn't Have to Post That](https://www.youtube.com/watch?v=AkQaL9SU2BY)
 24  
 25  ### Harvard Student Eldo Kim
 26  
 27  Eldo Kim, a Harvard student, emailed bomb threats over Tor to avoid taking exams[^2]. His OPSEC mistakes were:
 28  
 29  1. Using the school network to access Tor
 30  2. Being the only Tor user on the network at the time of the threat
 31  3. Admitting to the crime when questioned by police
 32  
 33  ## Silk Road Case
 34  
 35  Ross Ulbricht, alleged operator of the Silk Road dark web marketplace, made several OPSEC blunders[^1]:
 36  
 37  1. Using his real name email ([email protected]) in forum posts seeking IT help
 38  2. Posting on Stack Overflow about Tor hidden services under a username later linked to Silk Road
 39  3. Mentioning Tor and Silk Road to customs officials when caught with fake IDs
 40  4. Failing to protect the real IP address of Silk Road servers
 41  
 42  ## LulzSec Hacking Group
 43  
 44  Members of the LulzSec hacking group made various OPSEC mistakes [^3] [^4]:
 45  
 46  1. Discussing operational activities in IRC channels
 47  2. Revealing personal information, allowing profiling
 48  3. Using stolen credit cards for purchases shipped to their own addresses
 49  4. Trusting individuals who were working with the FBI
 50  
 51  ## General Bad OPSEC Practices
 52  
 53  Other examples of poor OPSEC when using Tor include:
 54  
 55  1. Contaminating identities by not maintaining compartmentalization
 56  2. Failing to keep sensitive information confidential
 57  3. Using predictable naming conventions for usernames, code, and passwords
 58  4. Maintaining consistent working hours that can be traced to a specific time zone
 59  5. Leaving command-and-control servers unsecured, exposing sensitive data
 60  
 61  A few lists I found on github:
 62  
 63  https://github.com/jermanuts/bad-opsec 
 64  
 65  https://opsecfail.github.io/
 66  
 67  Another one I'd like to add is mullvad and it's features:
 68  
 69  ## Mullvad VPN: A Contrast in Security
 70  
 71  Mullvad VPN offers several features that prioritize user privacy and security:
 72  
 73  1. **Anonymous account numbers**: Mullvad generates random 16-digit account numbers, eliminating the need for personal information like email addresses or usernames.
 74  
 75  2. **Strong encryption**: Mullvad uses AES-256 encryption for OpenVPN and ChaCha20 for WireGuard connections.
 76  
 77  3. **No-logs policy**: Mullvad has a strict no-logs policy, verified by independent audits.
 78  
 79  4. **Lockdown mode**: This feature blocks internet connections not secured by Mullvad's servers.
 80  
 81  5. **DNS content blockers**: Users can restrict access to ads, adult content, malware, and more.
 82  
 83  6. **Open-source software**: Mullvad's commitment to transparency includes making their software open-source.
 84  
 85  7. **Use of cryptocurrency such as monero**: Mullvad can use monero which is a private cryptocurrency that can be mined on a persons node, they also take in cash payments or deposits in mail.
 86  
 87  However I'd like to point out that even with services like mullvad you'd still get caught on some circumstances even with a no log policy. Humans can deduce and figure stuff out on their own machines cannot and have to be guided. None of these tools are fullproof and the issue will exist between user and keyboard. 
 88  
 89  See also:
 90  
 91  [OPSEC-OSINT-Tools - OPSEC Toolkit (n.d.)](./opsec.md)
 92  
 93  ## References:
 94  
 95  [^1]: “Ross Ulbricht, a/K/a ‘Dread Pirate Roberts,’ Sentenced in Manhattan.” U.S. Department of Justice, 29 May 2015, www.justice.gov/usao-sdny/pr/ross-ulbricht-aka-dread-pirate-roberts-sentenced-manhattan-federal-court-life-prison
 96  
 97  [^2]: “Harvard Student Charged With Making Hoax Bomb Threat.” United States Department of Justice, 16 Dec. 2014, https://web.archive.org/web/20250710222935/https://www.justice.gov/usao-ma/pr/harvard-student-charged-making-hoax-bomb-threat
 98  
 99  [^3]: FBI. “Leading Member of the International Cyber Criminal Group LulzSec Sentenced in Manhattan Federal Court.” FBI, 27 May 2014, https://www.fbi.gov/contact-us/field-offices/newyork/news/press-releases/leading-member-of-the-international-cyber-criminal-group-lulzsec-sentenced-in-manhattan-federal-court.
100  
101  [^4]: Hope Trampski. “Hacktivism: The Short Life of LulzSec.” Purdue University cyberTAP, 5 Dec. 2024, https://web.archive.org/web/20250303215642/https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-short-life-of-lulzsec/.