Richard Abbott Rabbit@shaw.ca Oregonrabbit@hushmail.com Disclosure - - PowerPoint PPT Presentation

richard abbott
SMART_READER_LITE
LIVE PREVIEW

Richard Abbott Rabbit@shaw.ca Oregonrabbit@hushmail.com Disclosure - - PowerPoint PPT Presentation

The Reality of Persistent Government Surveillance Richard Abbott Rabbit@shaw.ca Oregonrabbit@hushmail.com Disclosure All info in this presentation is taken from publicly- accessible sources. Some info may be classified but all is in


slide-1
SLIDE 1

The Reality of Persistent Government Surveillance

Richard Abbott

Rabbit@shaw.ca Oregonrabbit@hushmail.com

slide-2
SLIDE 2

Disclosure

All info in this presentation is taken from publicly- accessible sources. Some info may be “classified” but all is in the public

  • sphere. (ie leaked documents)
slide-3
SLIDE 3

Persistent

Ongoing, long-term, continuous

Government

Commanded by nation states or their agents

Surveillance

Overwatch Collection of information without regard to specific incidents (not reactive)

slide-4
SLIDE 4

Not Covered:

Targeted surveillance of actual suspects. Surveillance by local law enforcement. Surveillance of employees.

  • Government workers
  • Military Personnel
slide-5
SLIDE 5

The Backstory of The Modern Surveillance State

The Cold War

BRUSA: 1943 British-US agreement to streamline intel sharing UKUSA: 1946 Signals intel cooperation

  • UK + USA + Canada + Australia + New Zealand
  • AUSCANNZUKUS or the “Five Eyes”
slide-6
SLIDE 6

Commonalities of the Five Eyes

English speaking Allied during WWII Geographically large None occupied and/or liberated by Allied forces

  • Not France/Germany/Japan

Key: None have permanent US military bases

  • Blind spots –> need for allies
slide-7
SLIDE 7

Satellites: A Case Study

Highly secretive, but impossible to hide Highly expensive → lots of people → lots of leaks Very long term programs (50+ year history) Most capabilities are understandable via lay-observation

slide-8
SLIDE 8

ECHELON

Existence first publicly reported in 1988 Examined by EU parliament in late 90's

  • Formal report in 2001 (pre-9/11)

Primarily a satellite intercept program

  • Listening Stations located near commercial satellite communication

facilities.

  • Large antennae trained to geostationary sats
slide-9
SLIDE 9

Yakima Research Station (1/2)

slide-10
SLIDE 10

Yakima Research Station (2/2)

slide-11
SLIDE 11

Yakima Purpose

Installation of antennae contemporaneous with launch of Intelsat and INMARSAT comercial communications sats

  • Note lack of radomes → not hiding targets

May soon be closed, with work moved to another location.

slide-12
SLIDE 12

Canada's contribution to ECHALON: CFB Leitrim, Canada (outside Ottawa)

slide-13
SLIDE 13

CFB Leitrim Purpose

“According to official information, [CFB Leitrim's] task is to provide 'cryptologic rating' and to intercept diplomatic communications.” “If a site houses two or more satellite antennae with a diameter of at least 18 m, one of its tasks is certainly that of intercepting civilian communications.“

  • Europarlement report on ECHELON
slide-14
SLIDE 14

RAF Menwith Hill

slide-15
SLIDE 15

Misawa Air Base, Japan

slide-16
SLIDE 16

National Reconnaissance Office (NRO)

“From our inception in 1961 to our declassification to the public in 1992, we have worked tirelessly to provide the best reconnaissance support possible to the Intelligence Community (IC) and Department of Defense (DoD). We are unwavering in our dedication to fulfilling

  • ur vision: Vigilance From Above.”

PGS involves space-based interception

  • Geostationary (36,000km)
  • Not imaging sats in LEO → not persistent
slide-17
SLIDE 17

Evolution of Geostationary Sats

1970s: Rhyolite / Aquacade (4 sats, 20-meter dishes)

  • Simple bent-pipes reflecting to Australia

1980s: Chalet/ Vortex (6 sats, 38-meter dishes) 1990s: Mercury (3 sats, 1,000,000,000$ each in 1998 dollars) Current: Orion/Mentor (5 so far, 100+ meter dishes)

slide-18
SLIDE 18

Like this, but think 16x bigger!

slide-19
SLIDE 19
slide-20
SLIDE 20

9/11 – The World Changes

The President's Surveillance Program (PSP) Essentially a series of leaks by the president regarding

  • ngoing ECHELON-type operations

Terrorist Surveillance Program (TSP) Warrantless wiretapping by NSA Transfered to FISA in 2007, no longer “warrantless”, but Identical in practice.

slide-21
SLIDE 21

2001-2006, Changing public stories...

“We are only tapping terrorists” “We are only tapping foreigners who talk to terrorists” “We are only tapping foreign communications” “We are only tapping calls where one party is foreign” “We are tapping everyone, but only listening to X Y and Z”

slide-22
SLIDE 22

The Legal Justification of the PSP(s)

(1) International communications are not private. (2) Constitutional protections restrict only local governments The “Rightless foreigners” defense (3) State Secrets privilege Bars all judicial oversight See United States v. Reynolds

slide-23
SLIDE 23

The Post-PSP Cleanup

Consistent efforts by FBI/NSA/CIA to gauge public reaction via controlled leaks. Widespread domestic wiretapping now accepted by US public. See Shia LaBeouf on Leno, 2008 talking about 2005 taps of his phone. http://www.youtube.com/watch?v=7BMepsU6ycg

slide-24
SLIDE 24

Room 461A

Top Secret NSA taping facility. Located at 611 Folsom Street, San Fransisco CA Hepting v. AT&T (2006) Filed by EFF against AT&T Mooted by 2007 grant of immunity for telecoms cooperating with US government "While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal,"

slide-25
SLIDE 25

Post-9/11 Transitions in Intelligence Operations

From prediction of future attacks to reporting on ongoing ““We have not been able to corroborate some of the more sensational threat reporting, such as that from a ---- service in 1998 saying that Bin Laden wanted to hijack a U.S. Aircraft...”

  • August 6, 2001 presidential daily brief

Failed to prevent attacks. Need “They are going to attack THIS plane on THIS day.” Need access to ALL relevant communications.

slide-26
SLIDE 26

From Intelligence to Law Enforcement

Data needs to be absolute Specific persons must be named Due process must be obeyed Chain of custody/evidence High probability that public will be made aware of operations.

slide-27
SLIDE 27

Touchstone shifts from method of collection to citizenship of person tapped.

Old School: International communications are open to interception. Domestic communications are open so long as handed over voluntarily by operators (ie Room 461a). Post-2007 FISA Amendments: “there is no substantial likelihood that the surveillance will ac- quire the contents of any communication to which a United States person is a party” 50 USC§1801(a)(1-3)

  • Source of the 51% standard for foreignness
slide-28
SLIDE 28

The Privacy / Metadata Cycle

Government perspective: If a corporation has access to data for purposes of profit, user has waived privacy rights. Corporate Perspective: If government claims no privacy interest at issue, we are free to use data however we wish.

slide-29
SLIDE 29

Current State of Affairs

Wiretapping / Internet Caching Hardcoded Backdoors Voluntary Handovers

slide-30
SLIDE 30

Wiretapping

Three Collection Methods: (1) Taps on fiber backbone Special Collection Service (SCS) from embassies FORNSAT (ECHELON taps of foreign satellites) Special Source Operations (SSO) (2) Taps within US corporate systems (Prism) (3) FISA-warranted handovers (ie Verison call records)

slide-31
SLIDE 31
slide-32
SLIDE 32

“Genie”

Leaked in Snowden “black budget” document NSA Hacking of optical routers/switches

  • for purposes of wiretapping

$652-million program

slide-33
SLIDE 33

Hardcoded Backdoors

Extension of pre-1996 restrictions on export of encryption Most likely how the Special Collection Service (SCS) gains data. see Lotus Notes work reduction http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html

slide-34
SLIDE 34

RuggedCom (April 2012)

Username “factory” password based on MAC RuggedCom and CERT were informed, but failed to act. Links to Stuxnet: RuggedCom owned by Siemens Similar Backdoors in Siemens programmable logic controllers (PLCs) Stuxnet used similar backdoors in Siemens SCADA products

slide-35
SLIDE 35

Baracudda networks (Jan 2013)

Backdoor accessible from specific IP ranges Private ranges: 192.168.200.0/24 192.168.10.0/24 Public ranges: 205.158.110.0/24 216.129.105.0/24

slide-36
SLIDE 36

Possible NSA Fronts?

mail.totalpaas.com (205.158.110.135) - Domain registered by: Domains By Proxy, LLC … frmt1.boxitweb.com (205.158.110.132) - Domain registered by: Thor Myhrstad static.medallia.com (205.158.110.229) - Domain registed by: Medallia Inc. utility.connectify.net (205.158.110.171) - Domain registered by: Connectify Networks, Inc. everest.address.com (216.129.105.202) - Domain registed by: WhitePages, Inc. mail.tqm.bz (216.129.105.205) - Domain registered by: Total Quality Maintenance, Inc

  • utbound.andyforbes.com (216.129.105.212) - Domain registered by: HM hosting
slide-37
SLIDE 37

What are they looking for?

(1) Terrorism (no debate) (2) Other illegal activity

The Airbus-Saudi bribery fiasco Megaupload

(3) Military Intelligence (again, no debate) (4) Intellectual property and/or commercial advantage

slide-38
SLIDE 38

Commercial Advantage ?!$#!@#$

“There is wide-ranging evidence indicating that major governments are routinely utilising communications intelligence to provide commercial advantage to companies and trade”

  • STOA Report to the Director General for Research of the European Parliament 1999

“From a commercial communications satellite, NSA lifted all the faxes and phone calls between the European consortium Airbus, the Saudi national airline and the Saudi government. The agency found that Airbus agents were offering bribes to a Saudi official. It passed the information to U.S.

  • fficials pressing the bid of Boeing Co and McDonnell Douglas Corp.,

which triumphed last year in the $6 billion competition."”

http://articles.baltimoresun.com/1995-12-03/news/1995337001_1_intelligence-agency-nsa-intelligence-national-security-agency

slide-39
SLIDE 39

With nothing to hide, why should law-abiding

  • rganizations work to avoid monitoring?

Avoidance as Security Exercise That which avoids Government surveillance also avoids competitors, third party hackers or other evil-doers.

slide-40
SLIDE 40

Government surveillance technology can be exploited by third parties. China's mandatory “Green Dam” software is full of exploitable vulnerabilities Olympics-gate (2004)

Vodaphone Greece “Software extensions in the Ericsson AXE switching equipment that permitted the "lawful interception" of mobile messages and calls by law enforcement agencies were apparently subverted”

http://www.theregister.co.uk/2007/07/11/greek_mobile_wiretap_latest/?page=2

slide-41
SLIDE 41

Protection of Customer Confidence

“For non-U.S. residents, 10 percent of respondents indicated that they had cancelled a project with a U.S.-based cloud computing provider; 56 percent said that they would be less likely to use a U.S.- based cloud computing service. For U.S. residents, slightly more than a third (36 percent) indicated that the NSA leaks made it more difficult for them to do business outside of the United States.”

http://www2.itif.org/2013-cloud-computing-costs.pdf

slide-42
SLIDE 42

To avoid participating in illegal activity

2007 FISA amendments cleared US telecoms Could/Should have resulted in many prosecutions

  • R. v. Telus (2013) reaffirmed that Canadian police must get

wiretapping warrants (as opposed to general warrants)

slide-43
SLIDE 43

To Avoid Becoming a Target

Operation Aurora (Google 2009) China demands access similar to that give to the NSA/FBI Google refuses. Chinese hackers attack Google's CALEA systems Similar story at Microsoft: "What we found was the attackers were actually looking for the accounts that we had lawful wiretap orders on,"

  • David W. Aucsmith, senior director of MS Institute for Advanced Technology”
slide-44
SLIDE 44

Which Vendors are not cooperating?

slide-45
SLIDE 45

Linus Torvalds on backdoors into linux:

http://www.youtube.com/watch?v=84Sx0E13gAo

at 24:00

slide-46
SLIDE 46

Non-publicly traded entities

  • Lavabit
  • Mozilla Corporation

Charities

  • Wikimedia
  • Linux foundation
  • Mozilla Foundation
slide-47
SLIDE 47

Snowden on Encryption

slide-48
SLIDE 48

The Lavabit Story

June 2013: NSA, and everyone else, learn that Snowden is using Lavabit to reach out to reporters (edsnowden@lavabit.com) Assumption made that Snowden may also have used other addresses prior to going public June 28th: Lavabit receives order requiring it to provide metadata on all users To/From/Subject etc Installation of an fbi-operated tap device

slide-49
SLIDE 49

July 16th: Lavabit receives order demanding Levison hand over “all information necessary to decrypt communications sent to or from the Lavabit e-mail account [redacted] including encryption keys and SSL keys.” Levison then agrees to work with FBI to bypass Lavabit security (Wants 2000$ and 60 days to create needed systems) Government reps refuse to trust Levison, demand keys, judge agrees. July 17th: Levision hands over SSL key on paper (11pages) Government declares this “illegible” August 5th: 5000$/day if Lavabit does not cooperate

slide-50
SLIDE 50

August 8th: Lavabit shutdown

slide-51
SLIDE 51

What does Lavabit teach us about US wiretapping?

(1) They were unable/unwilling to break into Lavabit's systems. (2) They had no records of Lavabit email traffic (no connection to PRISM) (3) They were unable to decrypt Lavabit's SSL traffic without private key.

slide-52
SLIDE 52

What tools and techniques are available to frustrate surveillance?

  • F/OSS
  • Strong End-to-end encryption
  • Client-side encryption
  • Proxy services (offshore VPNs/Tor)
slide-53
SLIDE 53

The “Tor Stinks” Documents

slide-54
SLIDE 54
slide-55
SLIDE 55
slide-56
SLIDE 56
slide-57
SLIDE 57
slide-58
SLIDE 58

What Can we do at a corporate level?

Avoid publicly-traded vendors, regardless of country Properly update router/switching firmware Deploy strong, client-side, encryption wherever possible Mud-Puddle test everything Anonymize highly sensitive information (ie Tor hidden-service mirrors)

slide-59
SLIDE 59

Which services cannot be protected?

  • Traditional telephony
  • Smartphones
  • “Free” services (ie Gmail)
slide-60
SLIDE 60

“Parallel Construction”

Drug Enforcement Agency (DEA) Special Operations Division (SOD)

The link between national wiretap agencies and local law enforcement

slide-61
SLIDE 61

The End!!

Richard Abbott

Rabbit@shaw.ca Oregonrabbit@Hushmail.com