World under surveillance – – Five Eyes (FVEY)



World under surveillance – – Five Eyes (FVEY)

1 1


nsaobserver-slides-pses2014


On Github skhaen / nsaobserver-slides-pses2014

World under surveillance

Skhaen / libwalk.soskhaen@cyphercat.eu GPG : C99CCF64

nsa-observer.laquadrature.net (Alban & LQDN & Vinci <3)

nsa-observer.net

nsa.imirhil.fr (Aeris <3)

<3 Prunus, OpenPony, Bobynou, Laura, dattaz, MrTino <3

Five Eyes (FVEY)

Countries Agencies United-States NSA REL TO USA United Kingdom GCHQ REL TO GBR New-Zealand GCSB REL TO NZL Canada CSEC REL TO CAN Australia ASD REL TO AUS

Nine Eyes

Five Eyes + Denmark + France + Netherlands + Norway

Fourteen Eyes

(SSEUR - SIGINT Seniors Europe)

Nine Eyes + Germany + Belgium + Italy + Spain + Sweden (FRA).

UPSTREAM (NSA)

TEMPORA (GCHQ)

"Collection of communications on fiber cables and infrastructure as data flows past." : internet content, telephony content, metadata, voice, fax, ...

RAMPART(-A)

The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.

PRISM

Collection directly from the servers of these U.S. Service Providers: Microsoft (+Skype), Yahoo, Google (+YouTube), Facebook, PalTalk, AOL, Apple : emails, chat/video voice, videos, photos, stored data, VoIP, file transfers, video conferencing, notifications of target activity (logins...), online social networking details + special requests

MUSCULAR

The NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.

"Fuck these guys" Brandon Downey (Network Security Engineer - Google)

VICTORY DANCE

joint interagency effort between CIA and NSA. The mission lasted 6 months (during which 43 flights were flown) and mapped the Wi-Fi fingerprint of nearly every major town in Yemen

MYSTIC

  • ACIDWASH : collects 30-40 million telephony metadata records per day from Afghanistan.
  • DUSKPALLET : Kenyan GSM
  • EVENINGEASEL : Mexican wireless
  • BASECOAT
  • Carribean and Philippines

SOMALGET

SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • Bahamas : monitoring of telecommunications systems, gather personal datas on mobile calls
  • Afghanistan : record and storage all the domestic (and international) phone calls

ANTICRISIS GIRL

targeted website monitoring using passive : The agency logged data showing hundreds of users from around the world, including the United States [...]. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down.

XKEYSCORE (NSA)

DNI exploitation system/analytic framework -- perform strong (e.g. email) and soft (content) selection -- provides real-time target activity

email addresses, extracted files, full log, HTTP parser, phone number, user activity, using encryption ...

OPTIC NERVE

In 2008, during 6 months, OPTIC NERVE gathered one photo every 5 seconds from more than 1.8 million people using webcams in Yahoo chats

Including automatic facial recognition tests

A GCHQ's presentation was talking with interest of the ability to collect the kinect data traffic (from XBox 360)...

and from XBox One too ?

  • camera on, 24/7
    • facial recognition up to 6 people at the same time (able to see facial expressions in details)
  • microphone on 24/7
    • vocal recognition

automatic updates Skype

But... Microsoft will protect us, no?

Suprise! Skype, SSL, and the FBI

INTERNET IS FOR PORN

NSA spied also some browsing sessions on porn sites to fight terrorism (--> if you are a jihadist).

QUANTUM

To trick targets into visiting a FOXACID server, the NSA relies on its secret partnerships with US telecoms companies. As part of the TURMOIL system, the NSA places secret nodes, codenamed TAO nodes, at key places on the Internet backbone for a man-in-the-middle (or a man-in-the-side). The NSA uses this active implants to run packet injection attack, which surreptitiously redirects the target to the FOXACID server.

Q-BISCUIT redirection based on keyword + HTML cookies values, Q-BOT IRC botnet hijacking Q-BOT2 Q-BOT + Q-BISCUIT, Q-COPPER file download/upload disruption, Q-COOKIE Q-DNS DNS hijacking, caching nameservers Q-MUSH virtual HUFFMUSH - targeted spam exploitation Q-INSERT HTML redirection, Q-NATION First malware injected into targets' computers (VALIDATOR, COMMANDEER) Q-SKY HTML/TCP reset Q-SPIM instant messaging (msn, XMPP...) Q-SQUEEL injection into MySQL persistent DB connections Q-SQUIRREL truly covert infrastructure, be any IP in the world. Q-THEORY

I HUNT SYSADMIN

Why ?

  • retrieve the topology of targeted network
  • bypass security to get into network
  • graph target's assets and administrators
  • retrieve the configuration
  • network map including internal network
  • credentials from files or keyloggers
  • emails (login, password, ...) via UPSTREAM/XKEYSCORE

DISCOROUTE (telnet)

  • Passive monitoring of telnet stream (everywhere at everytime)
  • Analyze router configuration to retrieve allowed IP addresses
  • Addresses should belong to sys admins...
  • Check if such addresses were used to connect to "owned" services facebook,

QUANTUM it ! /o/

SSH

Split successful and uncessful connections

  • len (packet) > 1500 bytes
  • time of connections
  • Build a list of users whose successfully log into the target
  • Do they start browsing webmail or social network some minutes after.

QUANTUM it ! /o/

ROUTER

Same method (cisco, juniper, huawei) :

  • Add access (to be connected when one wants)
  • Add/Modify routing rules
  • Set up a packet sniffer
  • Weaken the VPN's encryption
  • ...

Do a regular checksum on the installation.

IT'S PASSIVE SIGINT!

TOR

"still the King of high secure, low latency Internet Anonymity. There are no contenders for the throne in waiting"

MJOLNIR : custom Tor client library (2006)

MJOLNIR is a modification of Tor, and it is ideally indistinguishable from an original Tor client. As such, it should appear identical to Tor in traffic. To ease this process, we used original Tor functions whenever possible. However, its main purpose is to provide the programmer with greater control over all aspects of Tor. In the normal Tor client, almost all servers in all circuits chosen randomly. Using MJOLNIR , the programmer can build circuits one server at a time, with no limit to the number of servers in the circuit.

  • DoS, Coil attack, Flower attack
  • circuit tracing
  • Black-box the Tor cloud
  • ...

tor stinks ? (2012)

we will never be able to de-anonymize all Tor users all the time. with manual analysis we can de-anonymize a very small fraction of Tor users [...]

  • GCHQ runs Tor nodes under NEWTONSCRADLE
  • EPIC FAIL : GCHQ looks for Tor users when they are not using Tor.
  • timing pattern (same as MJOLNIR?)
  • use cookies to identify Tor users when they are not using Tor.
  • DoubleClickID seen on Tor and non-Tor IPs

FOXACID : identifies TOR users on the Internet and then executes an attack against their Firefox web browser.

EGOTISTISCALGIRAFFE: Fingerprinting Tor (hello TorButton!), Exploiting Tor : ERRONEOUSINGENUITY (ERIN) + EGOSTICALGOAT = firefox exploit

And many others...

INTERDICTION

TAO

Jacob "I will blow your fuckin' mind" Appelbaum (ioerror) : "To protect and infect - part 2 -- @30C3"

[...]

What can we do ?

« Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. »

  • Free softwares (we really need to say this ? Again ?)
  • End-to-end encryption (and PFS for TLS)
  • Decentralized softwares

Doing some tests and improve

and a bit more « name & shame » too...

Let's do something !

There are many projects as LibreSSL, OpenSSH, Tor or Caliopen which need your help for development or donations

There are many associations, as La Quadrature du Net or EFF which cannot do everything alone.

Questions?