ilab
play

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr - PowerPoint PPT Presentation

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt Mnchen Surveillance and operational security 14ws 1 lecture evaluation oral


  1. iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Surveillance and operational security – 14ws 1

  2. ◮ lecture evaluation ◮ oral attestations in 03.05.051 ◮ 2015-02-02 ◮ 2015-02-03 ◮ 2015-02-04 Register. 2

  3. CC-BY-SA 3.0 Andreas Preuß 3

  4. IEEE Spectrum 2007: The Athens Affair. 4

  5. submarinecablemap.com 5

  6. server client the Internet 6

  7. server client BND, NSA IX, submarine cables 6

  8. lifewinning.com/submarine-cable-taps 7

  9. RAMPART-A Typical Operation USA Country X Processing Center E D B C Partner Analysts NSA Network SECRET//COMINT NETWORK Access Point A International Cable TOP SECRET//COMINT//NOFORN 8

  10. 9

  11. ◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems 10

  12. 11

  13. 12

  14. 13

  15. “I hunt sys admins” ◮ webmail/facebook ◮ quantum ◮ router target ◮ look for successful logins ◮ admin 14

  16. GCHQ attack on Belgian ISP Belgacom 15

  17. NSA attacks German satcom provider Stellar 16

  18. Attacks on standards ◮ Dual_EC_DRBG ◮ IETF 17

  19. BSI report on German steel mill 18

  20. Think about your threat model communications ./ endpoints Everything starts with physical security. Force Eve to become Mallory and Mallory to become a burglar. 19

  21. Endpoint security requires control. 20

  22. ◮ get a strategy ◮ unlinkability, compartmentalization ◮ slideshare.net/grugq/opsec-for-hackers ◮ crimethinc.com/texts/atoz/security.php 21

  23. 22

  24. Other helpful software ◮ OTR ◮ (GnuPG) ◮ Textsecure, Redphone ◮ Debian 23

  25. Endpoints ◮ attack surface: browsers, drivers, . . . ◮ AMT/IPMI 24

  26. QubesOS 25

  27. ◮ defence in depth ◮ diceware ◮ don’t store plaintext ◮ logging 26

  28. ◮ LANGSEC ◮ ENISA, Nov. 2014: Algorithms, key size and parameters ◮ OWASP 27

  29. AV tracking devices with phone functionality ◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries 28

  30. Believe nothing. Research everything. 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend