straw man in the middle
play

(Straw) Man in the Middle: A Modest Post-Snowden Proposal Brussels, - PowerPoint PPT Presentation

(Straw) Man in the Middle: A Modest Post-Snowden Proposal Brussels, Belgium Jacob Appelbaum [redacted] 10 December 2015 Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 1 / 26 Post-Snowden? What does that mean?


  1. (Straw) Man in the Middle: A Modest Post-Snowden Proposal Brussels, Belgium Jacob Appelbaum [redacted] 10 December 2015 Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 1 / 26

  2. Post-Snowden? What does that mean? Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 2 / 26

  3. Understanding the plumbing Mass surveillance works by first illegally and generally seizing data, and then indiscriminately searching all data, until a specific search term is found. This is selector based surveillance, a kind of surveillance that requires mass surveillance. It comes from vulnerabilities in core internet and other network protocols. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 3 / 26

  4. A shift? We have experienced a huge shift. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 4 / 26

  5. Key changes Specific understanding about a handful of protocols. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 5 / 26

  6. Key changes A general and pervasive fear; a feeling of helplessness. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 6 / 26

  7. Key changes People have lost faith in the authorities and adopted a fatalistic attitude. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 7 / 26

  8. A new assumption A pervasive fear of mass surveillance, jokes about being on lists; a new default of total monitoring! Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 8 / 26

  9. A new default to fight passive attackers Changes are now detectable. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 9 / 26

  10. A new default to fight passive attackers Changes are now detectable. Encryption is here to stay. Passive interception moves to active. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 9 / 26

  11. A new default to fight passive attackers Changes are now detectable. Encryption is here to stay. Passive interception moves to active. Signal/ZRTP clients and Let’s Encrypt CA change the game. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 9 / 26

  12. A new default to fight passive attackers Changes are now detectable. Encryption is here to stay. Passive interception moves to active. Signal/ZRTP clients and Let’s Encrypt CA change the game. This impacts Law Enforcement and Intelligence; focusing on LE. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 9 / 26

  13. Cultural differences In the US, the UK and in other countries in Europe - searches and notification are different. Cryptography brings us to a new convergence for all cultures at once. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 10 / 26

  14. A recent European Court of Human Rights ruling Oversight isn’t enough: accountability is required Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 11 / 26

  15. Checking validity Example interactions with the police: Siren on an otherwise unmarked car pulling over a driver Drive to a well lit area, dial 112/911, confirm identity of ”officer” No know raid by armed people Did they declare they are police? How do we verify it? Knock at the door with a search warrant Is it a valid warrant? Other examples such as a famous Tupac shooting involving police in plain clothing Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 12 / 26

  16. Reality check In most of these situations - we acknowledge the serious issue of police impersonation. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 13 / 26

  17. How do we detect crimes? Cyber cyber cyber Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 14 / 26

  18. How do we detect crimes? Cyber cyber cyber (Hint: You will receive nearly no help from any authority!) Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 14 / 26

  19. An example standard of evidence In the German Chancellor Merkel case there was a supposed lack of evidence. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 15 / 26

  20. An example standard of evidence In the German Chancellor Merkel case there was a supposed lack of evidence. Thus we see - we need a new standard of evidence! Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 15 / 26

  21. A short summary First, we acknowledge a change in thinking because of Snowden. Secondly, we see a move towards more and more transparency. Thirdly, we control those we can control and not those that we don’t... Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 16 / 26

  22. Wait, control? I have no democratic control over the majority of services. I do have democratic control over a small set of services: local LE, national LE Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 17 / 26

  23. Wait, transparency? The new protocols force transparency, the proposed standard of evidence give us data for action; but how might we choose what to act on? Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 18 / 26

  24. Ask the honest parties to prove their honesty They sign their interception request in real time, point it to a given court (docket, judge, case, etc.) just as with the search of the home. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 19 / 26

  25. And anyone who doesn’t sign... Is subject to investigation with the collected evidence. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 20 / 26

  26. Wait, what? There is no requirement that cryptophone or signal help with this proposal - only that a system of real time notification is implemented by states and their relevant agencies. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 21 / 26

  27. Wait, what about TARGETED surveillance Like cryptography that horse has left the barn with the move from passive to active. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 22 / 26

  28. Wait, what about malware The same standard of evidence and notification should apply. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 23 / 26

  29. Help the (honest) police No ”Golden Key” required Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 24 / 26

  30. Help the (honest) police No ”Golden Key” required A trade of the secrecy property that keeps security for the majority of users Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 24 / 26

  31. Help the (honest) police No ”Golden Key” required A trade of the secrecy property that keeps security for the majority of users Law enforcement is always asking for a way to do this; my proposal allows an avenue while also asking them to give up secrecy and commit to accountability and transparency. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 24 / 26

  32. An equal standard From homes to phones - interference is not secret, lawful processes exist, crimes committed by thousands of unlawful attackers now subject to reporting. Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 25 / 26

  33. Questions? Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 26 / 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend