45
David Spencer Bradford Linux Users Group 16 September 2013

In ur-internets

  • Upload
    55020

  • View
    747

  • Download
    0

Embed Size (px)

DESCRIPTION

IN UR INTERNETS - the NSA and your intertubes, September 2013

Citation preview

Page 1: In ur-internets

David SpencerBradford Linux Users Group

16 September 2013

Page 2: In ur-internets

http://www.bbc.co.uk/news/uk-24107854

Page 3: In ur-internets

by the end of 1920 the Black Chamber had the secret and illegal cooperation of almost the entire American cable Industry

BamfordThe Puzzle Palace

1920

Page 4: In ur-internets

LOUIS W. TORDELLA

Page 5: In ur-internets

http://arstechnica.com/tech-policy/2013/06/how-a-30-year-old-lawyer-exposed-nsa-mass-surveillance-of-americans-in-1975/2/

Page 6: In ur-internets

Every day, a courier went up to New York on the train and returned to Fort Meade with large reels of magnetic

tape, which were copies of the international telegrams sent from New

York the preceding day using the facilities of three telegraph companies

Ars Technicahttp://arstechnica.com/tech-policy/2013/06/how-a-30-year-old-lawyer-exposed-nsa-mass-surveillance-of-americans-in-1975/

Page 7: In ur-internets

2001-09-11

http://usvsth3m.com/post/61008418799/awkward-9-11-tribute-tweets-from-companies

Page 8: In ur-internets

A lot of people are trying to say that it's a different world today, and that eavesdropping on a massive scale is not

covered under the FISA statute, because it just

wasn't possible or anticipated back then.

That's a lie.

December 29, 2005

https://www.schneier.com/blog/archives/2005/12/project_shamroc.html

Page 9: In ur-internets

2005 FFS

Page 10: In ur-internets

2013

Page 11: In ur-internets

“You need the haystack to find the needle”

Keith AlexanderAspen Security Forum, 17 July 2013

http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander

http://www.aspeninstitute.org/events/2013/07/17/2013-aspen-security-forum/transcript-clear-present-danger-cyber-crime-cyber

Page 12: In ur-internets

INFORMATION DOMINANCE CENTER

http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trekhttp://www.businessinsider.com/the-us-army-star-trek-command-center-2013-9

Page 13: In ur-internets
Page 14: In ur-internets

BIG DATAAlexander reportedly gave several presentationsthat detailed networks of suspected terrorists.In one case it turned out that "all those guyswere connected to were pizza shops"

http://www.businessinsider.com/keith-alexanders-sidekick-james-heath-2013-9

MMM PIZZA OM NOM NOMAnother massive chart, which ostensibly detailed al Qaeda and its

connections in Afghanistan, turned out to be completely false. "We found there was no data behind the links. No verifiable sources.We later found out that a quarter of the guys named on the chart had

already been killed in Afghanistan."

Page 15: In ur-internets
Page 16: In ur-internets

U R TEH EN3MY OF TEH ST8Counterencryption programmescode-named after first battles of respective Civil Wars

UK: EDGEHILLUS: MANASSAS / BULLRUN

http://www.emptywheel.net/2013/09/05/nsa-gchq-declare-civil-war-on-their-own-people/

Adwalton Moor = CCL

Page 17: In ur-internets

http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396354932/NSA-Bullrun-2-001.jpg

Page 18: In ur-internets

“Do not speculate on sources or methods”

HERE YA GO● A company volunteers to help (and gets paid for it)● Spies copy the traffic directly off the fiber● A company complies under legal duress● Spies infiltrate a company● Spies coerce upstream companies to weaken crypto in their

products/install backdoors● Spies brute force the crypto [weakened keys]● Spies compromise a digital certificate● Spies hack a target computer directly [zero-day exploits],

stealing keys and/or data, sabotage

Ars Technicahttp://arstechnica.com/tech-policy/2013/09/let-us-count-the-ways-how-the-feds-legally-technically-get-our-data/

Page 19: In ur-internets

Encryption works.Properly implemented strong crypto systems

are one of the few things that you can rely on.Unfortunately, endpoint security is so terrifically weak

that NSA can frequently find ways around it.

Snowden 17 June 2013

The NSA is able to decrypt most of the Internet.They're doing it primarily by cheating, not by mathematics.Remember this: The math is good, but math has no agency.

Code has agency, and the code has been subverted.

Schneier 5 Sep 2013

http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblowerhttps://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html

Page 20: In ur-internets

IPSEC

Every once in a while, someone not an NSA employee,but who had longstanding ties to NSA,

would make a suggestion that reduced privacy or security,but which seemed to make sense

when viewed by people who didn't know much about crypto.For example,

using the same IV (initialization vector) throughout a session,rather than making a new one for each packet.

Or, retaining a way to for this encryption protocolto specify that no encryption is to be applied.

John Gilmore 6 September 2013http://www.mail-archive.com/[email protected]/msg12325.html

Page 21: In ur-internets

Weakness in Dual_EC_DRBGDan Shumow and Niels Ferguson

(Microsoft)

Did NSA Put a Secret Backdoor in New Encryption Standard?

Schneier 15 November 2007http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115

http://rump2007.cr.yp.to/15-shumow.pdf

Page 22: In ur-internets

WTF 2007

Gov’t standards agency “strongly” discouragesuse of NSA-influenced algorithm

13 September 2013http://arstechnica.com/security/2013/09/government-standards-agency-strongly-suggests-dropping-its-own-encryption-standard/

Page 23: In ur-internets

http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4

Page 24: In ur-internets

Where do I start a petition to raise the IQ and kernel knowledge of people? Guys, go read drivers/char/random.c. Then, learn about cryptography. Finally,

come back here and admit to the world that you were wrong. Short answer: we actually know what we are doing. You don't. Long answer: we use rdrand as

_one_ of many inputs into the random pool, and we use it as a way to _improve_ that random pool. So even if rdrand were to be back-doored by the

NSA, our use of rdrand actually improves the quality of the random numbers you get from /dev/random. Really short answer: you're ignorant.

Linus 9 September 2013 http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4/responses/9066

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c2557a303ab6712bb6e09447df828c557c710ac9

Page 25: In ur-internets

https://plus.google.com/117091380454742934025/posts/SDcoemc9V3J

Page 26: In ur-internets

DIGINOTAR PWNED JULY 2011Netherlands cert authority

“the list of fraudulent digital certificates obtained from DigiNotar has been growing, expanding to include not just Facebook, Google, Microsoft, Skype, Twitter, and WordPress, but also the CIA, MI6, and Mossad intelligence services, as well as the pro-privacy Tor Project”

Information Week6 September 2011

http://www.informationweek.com/security/attacks/stolen-digital-certificates-compromised/231600810

Page 27: In ur-internets

O HAI

http://koen.io/wp-content/uploads/2013/09/DigiNotar_slide.png

Page 28: In ur-internets

MAN IN THE MIDDLE“FLYING PIG”

https://people.torproject.org/~andrew/2013-09-10-quick-ant-tor-events-qfd.png

Page 29: In ur-internets

MAN IN THE MIDDLE“FLYING PIG”

http://4.bp.blogspot.com/-jUBwxB2JMuo/UjCPEX7CYtI/AAAAAAAAFAE/IXaJrZdyQhQ/s400/Flying+Pig.gif

Page 30: In ur-internets

MAN IN THE MIDDLEhttps://ur.pwned.lol

Page 31: In ur-internets

Perfect Forward Secrecy

Netcraft toolbarhttp://toolbar.netcraft.com/install

Page 32: In ur-internets

Gmail certificate subverted?

u r teh fuX0r3dlololol

Page 33: In ur-internets
Page 34: In ur-internets
Page 35: In ur-internets

Singularity Hubhttp://singularityhub.com/2013/09/04/facebook-plans-to-add-millions-more-faces-to-its-facial-recognition-database/

Page 36: In ur-internets

http://arstechnica.com/security/2013/09/the-body-worn-imsi-catcher-for-all-your-covert-phone-snooping-needs/

Page 37: In ur-internets
Page 38: In ur-internets

Ars

Technica

Page 39: In ur-internets

http://arstechnica.com/tech-policy/2013/09/how-the-cops-watch-your-tweets-in-real-time/

Page 40: In ur-internets

http://www.wired.co.uk/news/archive/2013-06/26/socmint

Page 41: In ur-internets
Page 42: In ur-internets

Adam Curtis

http://www.bbc.co.uk/blogs/adamcurtis/posts/BUGGER

Page 43: In ur-internets

Charles Stross

1970s: deregulation of labour markets and the deliberate destruction of the job for life culture.

Today, around 70% of the US intelligence budget is spent on outside contractors.

Gen Y has never thought of jobs as permanent things. Gen Y will stare at you blankly if you talk about loyalty to

their employer.

Edward Snowden is 30: he was born in 1983.I think he's a sign of things to come.

PS: Chelsea Manning is 25.

http://www.antipope.org/charlie/blog-static/2013/08/snowden-leaks-the-real-take-ho.html

Page 44: In ur-internets

http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying

Page 45: In ur-internets