iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr - - PowerPoint PPT Presentation

ilab
SMART_READER_LITE
LIVE PREVIEW

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr - - PowerPoint PPT Presentation

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt Mnchen Surveillance and operational security 14ws 1 lecture evaluation oral


slide-1
SLIDE 1

iLab

Countersurveillance Benjamin Hof hof@in.tum.de

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München

Surveillance and operational security – 14ws

1

slide-2
SLIDE 2

◮ lecture evaluation ◮ oral attestations in 03.05.051

◮ 2015-02-02 ◮ 2015-02-03 ◮ 2015-02-04

Register.

2

slide-3
SLIDE 3

CC-BY-SA 3.0 Andreas Preuß

3

slide-4
SLIDE 4

IEEE Spectrum 2007: The Athens Affair.

4

slide-5
SLIDE 5

submarinecablemap.com

5

slide-6
SLIDE 6

client the Internet server

6

slide-7
SLIDE 7

client BND, NSA server IX, submarine cables

6

slide-8
SLIDE 8

lifewinning.com/submarine-cable-taps

7

slide-9
SLIDE 9

TOP SECRET//COMINT//NOFORN

RAMPART-A Typical Operation

A B C D

International Cable

USA Country X

Processing Center Access Point Partner Analysts

NSA Network

E

SECRET//COMINT NETWORK

8

slide-10
SLIDE 10

9

slide-11
SLIDE 11

◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems 10

slide-12
SLIDE 12

11

slide-13
SLIDE 13

12

slide-14
SLIDE 14

13

slide-15
SLIDE 15

“I hunt sys admins”

◮ webmail/facebook ◮ quantum ◮ router target ◮ look for successful logins ◮ admin 14

slide-16
SLIDE 16

GCHQ attack on Belgian ISP Belgacom

15

slide-17
SLIDE 17

NSA attacks German satcom provider Stellar

16

slide-18
SLIDE 18

Attacks on standards

◮ Dual_EC_DRBG ◮ IETF 17

slide-19
SLIDE 19

BSI report on German steel mill

18

slide-20
SLIDE 20

Think about your threat model

communications ./ endpoints

Everything starts with physical security.

Force Eve to become Mallory and Mallory to become a burglar.

19

slide-21
SLIDE 21

Endpoint security requires control.

20

slide-22
SLIDE 22

◮ get a strategy ◮ unlinkability, compartmentalization ◮ slideshare.net/grugq/opsec-for-hackers ◮ crimethinc.com/texts/atoz/security.php 21

slide-23
SLIDE 23

22

slide-24
SLIDE 24

Other helpful software

◮ OTR ◮ (GnuPG) ◮ Textsecure, Redphone ◮ Debian 23

slide-25
SLIDE 25

Endpoints

◮ attack surface: browsers, drivers, . . . ◮ AMT/IPMI 24

slide-26
SLIDE 26

QubesOS

25

slide-27
SLIDE 27

◮ defence in depth ◮ diceware ◮ don’t store plaintext ◮ logging 26

slide-28
SLIDE 28

◮ LANGSEC ◮ ENISA, Nov. 2014: Algorithms, key size and parameters ◮ OWASP 27

slide-29
SLIDE 29

AV tracking devices with phone functionality

◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries 28

slide-30
SLIDE 30

Believe nothing. Research everything.

29