course evaluation room for attestations: 03.05.051 iLab Threat - - PowerPoint PPT Presentation

course evaluation
SMART_READER_LITE
LIVE PREVIEW

course evaluation room for attestations: 03.05.051 iLab Threat - - PowerPoint PPT Presentation

course evaluation room for attestations: 03.05.051 iLab Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt


slide-1
SLIDE 1

course evaluation

room for attestations: 03.05.051

slide-2
SLIDE 2

iLab

Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München

Closing event – 15ss

slide-3
SLIDE 3

You may not be interested in surveillance, but surveillance is interested in you

CC-BY-SA 3.0 Andreas Preuß

slide-4
SLIDE 4

IEEE Spectrum 2007: The Athens Affair.

slide-5
SLIDE 5

IEEE Spectrum 2007: The Athens Affair.

slide-6
SLIDE 6

View on security

  • 1. communication
  • 2. software stacks
  • 3. physical security
slide-7
SLIDE 7

Outline

Classification of actors Threat actors Attack systems Examples Systematic defence

slide-8
SLIDE 8

submarinecablemap.com

slide-9
SLIDE 9

Eve

lifewinning.com/submarine-cable-taps

slide-10
SLIDE 10

Mallory

slide-11
SLIDE 11

Burglar

slide-12
SLIDE 12

Jack Bauer

slide-13
SLIDE 13

Outline

Classification of actors Threat actors Attack systems Examples Systematic defence

slide-14
SLIDE 14

High end

◮ Five eyes ◮ Israel ◮ China ◮ Russia ◮ France

slide-15
SLIDE 15

Commercial variants

slide-16
SLIDE 16
slide-17
SLIDE 17

arms dealers

slide-18
SLIDE 18

Mercenaries

law suits, high profile business deals

slide-19
SLIDE 19
slide-20
SLIDE 20

attacker resources ./ money ./ target value

slide-21
SLIDE 21

Scale

slide-22
SLIDE 22

Outline

Classification of actors Threat actors Attack systems Examples Systematic defence

slide-23
SLIDE 23

TOP SECRET//COMINT//NOFORN

RAMPART-A Typical Operation

A B C D

International Cable

USA Country X

Processing Center Access Point Partner Analysts

NSA Network

E

SECRET//COMINT NETWORK

slide-24
SLIDE 24
slide-25
SLIDE 25

◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems

slide-26
SLIDE 26

)

'

  • TOP SECRET//$1

//REL USA, AUS, CAN, GBR, NZL

(TS//51//REL) Change the query to search for the last 3 Months and click SUBMIT

..

Stlector Prollle search

Seied:or Pl'oflle ~h~me

:

Mttlcatlon: Selectors S<iector Ploflle [·-

  • -:o>gnal.ccm<goo;je>)

20111110 [3 OD:OO:OO

v

End D.to: 'bd>y

~

Yeste«Jay <oi) Add @ Remove ~

c ..

,.,.,.

1hl< -

  • ~d
  • e n - t i f- i ~ -

~ -

m

  • ._
L ~ -~ L ~W~

L [J El ._.-~-

" O!"

·gma

f .c

  • :n

[J E t:l

google

skypeM~

googlo skypeMaJ'blcM

sk.ypeM~l:.*.en

skyper.,.lbken

~

gmo

l . com

google Quiet Add: I Ercer ~

  • r

rrore- seleclot!

sep~rate.:1

by (OO!mst and ht enter Authority Filtus 1hi:>Month Parcrreters LMt Nonlh Parilmetefs l 0ay Par<meters 2 t»ys ParM'let«s 3 ~

5.,.,.

P¥.snetus. 1 Oays P.v~s 140ays Pararwet.:

ers J M>tth

  • 3r...w

6Monlhs l v~-~ v

7 ~

I >

:~._-.~

~;

t· · •n•·•

  • .-
  • . .. .. . .

.. - .

ll

SPIEGEL ONLINE

slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29

Outline

Classification of actors Threat actors Attack systems Examples Systematic defence

slide-30
SLIDE 30

“I hunt sys admins”

◮ router ◮ look for successful logins ◮ admin ◮ personal webmail/facebook ◮ quantum

slide-31
SLIDE 31

GCHQ attack on Belgian ISP Belgacom

slide-32
SLIDE 32

German satcom provider Stellar

slide-33
SLIDE 33

Attacks on standards

◮ Dual_EC_DRBG ◮ IETF

slide-34
SLIDE 34
slide-35
SLIDE 35

BSI report on German steel mill

slide-36
SLIDE 36

Outline

Classification of actors Threat actors Attack systems Examples Systematic defence

slide-37
SLIDE 37

Operational security

◮ get a strategy ◮ unlinkability, compartmentalization ◮ paranoia doesn’t work retroactively

slide-38
SLIDE 38

Endpoint security requires control.

slide-39
SLIDE 39

Debian reproducible builds

slide-40
SLIDE 40

QubesOS

slide-41
SLIDE 41

Applications

◮ OTR ◮ Textsecure, Redphone, Signal ◮ Tor

slide-42
SLIDE 42

Hide metadata

slide-43
SLIDE 43

Development

◮ LANGSEC ◮ OWASP ◮ ENISA

slide-44
SLIDE 44

Operations

◮ diceware ◮ don’t store plaintext ◮ logging ◮ defence in depth

slide-45
SLIDE 45

Attack surface

Endpoints

◮ browsers, drivers, . . . ◮ AMT/IPMI

tracking devices with audio functionality

◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries

slide-46
SLIDE 46
slide-47
SLIDE 47

Believe nothing. Research everything.