course evaluation room for attestations: 03.05.051 iLab Threat - - PowerPoint PPT Presentation
course evaluation room for attestations: 03.05.051 iLab Threat - - PowerPoint PPT Presentation
course evaluation room for attestations: 03.05.051 iLab Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt
iLab
Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de
Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München
Closing event – 15ss
You may not be interested in surveillance, but surveillance is interested in you
CC-BY-SA 3.0 Andreas Preuß
IEEE Spectrum 2007: The Athens Affair.
IEEE Spectrum 2007: The Athens Affair.
View on security
- 1. communication
- 2. software stacks
- 3. physical security
Outline
Classification of actors Threat actors Attack systems Examples Systematic defence
submarinecablemap.com
Eve
lifewinning.com/submarine-cable-taps
Mallory
Burglar
Jack Bauer
Outline
Classification of actors Threat actors Attack systems Examples Systematic defence
High end
◮ Five eyes ◮ Israel ◮ China ◮ Russia ◮ France
Commercial variants
arms dealers
Mercenaries
law suits, high profile business deals
attacker resources ./ money ./ target value
Scale
Outline
Classification of actors Threat actors Attack systems Examples Systematic defence
TOP SECRET//COMINT//NOFORN
RAMPART-A Typical Operation
A B C D
International Cable
USA Country X
Processing Center Access Point Partner Analysts
NSA Network
E
SECRET//COMINT NETWORK
◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems
)
'
- TOP SECRET//$1
//REL USA, AUS, CAN, GBR, NZL
(TS//51//REL) Change the query to search for the last 3 Months and click SUBMIT
..
Stlector Prollle search
Seied:or Pl'oflle ~h~me
:Mttlcatlon: Selectors S<iector Ploflle [·-
- -:o>gnal.ccm<goo;je>)
20111110 [3 OD:OO:OO
v
End D.to: 'bd>y
~
Yeste«Jay <oi) Add @ Remove ~
c ..
,.,.,.
1hl< -
- ~d
- e n - t i f- i ~ -
~ -
m
- ._
L [J El ._.-~-
" O!"
·gmaf .c
- :n
[J E t:l
skypeM~
googlo skypeMaJ'blcM
sk.ypeM~l:.*.enskyper.,.lbken
~
gmo
l . comgoogle Quiet Add: I Ercer ~
- r
rrore- seleclot!
sep~rate.:1
by (OO!mst and ht enter Authority Filtus 1hi:>Month Parcrreters LMt Nonlh Parilmetefs l 0ay Par<meters 2 t»ys ParM'let«s 3 ~
5.,.,.
P¥.snetus. 1 Oays P.v~s 140ays Pararwet.:
ers J M>tth
- 3r...w
6Monlhs l v~-~ v
7 ~
I >
:~._-.~
~;t· · •n•·•
- .-
- . .. .. . .
.. - .
ll
SPIEGEL ONLINE
Outline
Classification of actors Threat actors Attack systems Examples Systematic defence
“I hunt sys admins”
◮ router ◮ look for successful logins ◮ admin ◮ personal webmail/facebook ◮ quantum
GCHQ attack on Belgian ISP Belgacom
German satcom provider Stellar
Attacks on standards
◮ Dual_EC_DRBG ◮ IETF
BSI report on German steel mill
Outline
Classification of actors Threat actors Attack systems Examples Systematic defence
Operational security
◮ get a strategy ◮ unlinkability, compartmentalization ◮ paranoia doesn’t work retroactively
Endpoint security requires control.
Debian reproducible builds
QubesOS
Applications
◮ OTR ◮ Textsecure, Redphone, Signal ◮ Tor
Hide metadata
Development
◮ LANGSEC ◮ OWASP ◮ ENISA
Operations
◮ diceware ◮ don’t store plaintext ◮ logging ◮ defence in depth
Attack surface
Endpoints
◮ browsers, drivers, . . . ◮ AMT/IPMI
tracking devices with audio functionality
◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries