Interception Technology

Similar documents
20-CS Cyber Defense Overview Fall, Network Basics

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Cold, Hard Cache KV? On the implementation and maintenance of caches. who is

Overview: Introducing Usability and User-Centered Design (UCD)

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

716 West Ave Austin, TX USA

WHAT DOES INFRASTRUCTURE MEAN?

Top 10 Considerations for Securing Private Clouds

INFORMATION SECURITY NO MORE THE CINDERELLA?

Inline Reference Monitoring Techniques

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Interface The exit interface a packet will take when destined for a specific network.

10 Hidden IT Risks That Might Threaten Your Business

Introduction to Testing and Maintainable code

Poulsen, Kevin Wednesday, November 07, :54 PM Singel, Ryan FW: [hush.com # ] Journalist's query

Autodesk University Automotive component lightweight design by advanced material and Moldflow Insight, Helius and Abaqus Co-Simulation

416 Distributed Systems. Distributed File Systems 2 Jan 20, 2016

How & Why We Subnet Lab Workbook

The IBM I A Different Roadmap

Cryptography (Overview)

Introduction to Security and User Authentication

Web Browser Questions What Web browsers does Johnson Bank Retirement Plan Services support?

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

PRIVACY POLICY Let us summarize this for you...

The Case for Secure Communications

Global cybersecurity and international standards

Is the Mafia Taking Over Cybercrime? Jonathan Lusthaus

Who We Are! Natalie Timpone

Mobile: Purely a Powerful Platform; Or Panacea?

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

Qualifying exam: operating systems, 1/6/2014

What every attorney should know about E-security Also, ESI

Cyber Incident Response: Step 1

ET4254 Communications and Networking 1

Lawful Interception of IP Traffic

Internet Exchange Points An Internet Society Public Policy Briefing

Digital Enablement bridging the digital divide

Tor: a brief intro. Roger Dingledine The Tor Project

Guide to Network Security First Edition. Chapter One Introduction to Information Security

ASEAN e-authentication Workshop Balwinder Sahota

CS Final Exam

CompTIA CAS-003. CompTIA Advanced Security Practitioner (CASP)

Global estandards and Web Architectures for egovernment projects José M. Alonso,

IS Today: Managing in a Digital World 9/17/12

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 20: Networks and Distributed Systems

A proposal to solve the patient data problem. (Yes, this is a manifesto)

Part 1: Critical Infrastructures and Their Reliance on Critical Information Infrastructures

Internet Concepts. Learning objectives. An understanding of the services available through the Internet

Securing trust in electronic supply chains

Legal Considerations and Case Studies

How Secured2 Uses Beyond Encryption Security to Protect Your Data

Trends in Lawful Interception and Its Applications in National Security

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

Application Firewalls

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems

poetry.com Web Safety Ratings from McAfee SiteAdvisor What our inbox looked like after we signed up here:

E-services instructions The City of Helsinki e-services support, open Mon-Fri from 8 AM to 6 PM Tel.

Jeffrey Friedberg. Chief Trust Architect Microsoft Corporation. July 12, 2010 Microsoft Corporation

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

CentraNet CustoPAK USER GUIDE. Telephone Number. Verizon Telephone Number. Switch Type: GTD-5 5ESS DMS 100 DMS 10

OPENSHIFT FOR OPERATIONS. Jamie Cloud Guy - US Public Sector at Red Hat

CINCINNATI BELL TELEPHONE COMPANY LLC RESIDENCE SERVICE AGREEMENT - LOCAL TELEPHONE SERVICES NONRESIDENCE SERVICE AGREEMENT - LOCAL TELEPHONE SERVICES

La Science du Secret sans Secrets

Cyber Security and Cyber Fraud

PowerVR Performance Recommendations The Golden Rules. October 2015

Cyber Security Strategy

YADTEL - Privacy Information INFORMATION WE COLLECT

Privacy: Whose Information Is It?

CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS

ELECTRONIC BANKING & ONLINE AUTHENTICATION

bkash shifting from scale to innovation

Improve your Defenses: Building Bulletproof Security

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda

Below is another example, taken from a REAL profile on one of the sites in my packet of someone abusing the sites.

SMART BEGINNERS GUIDE

Andrew Bartlett Hawker College

Go-Fi or Wi-Go. Photons Everywhere. Jon Crowcroft December, 2005

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

Marketing Automation Functional Evaluation Guide

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing

IT POLICY AND PROJECTS THAILAND

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

User's Manual. Intego ChatBarrier X3 User's Manual Page 1

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Concurrency Control 1

Wireless Security Algorithms

Alcatel-Lucent 1357 ULIS

Moving Application Security into the Network

TRAVEL ADVICE BOOKLET. Going abroad with your telephone, tablet or laptop computer

My Lessons Learned in Security Awareness. Pedro Serrano, CISSP Security Architect Cimarex Energy

mid=81#15143

Competitive Analysis. Version 1.0. February 2017

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Modeling and Performance Analysis with Discrete-Event Simulation

Highly Accurate, Record/ Playback of Digitized Signal Data Serves a Variety of Applications

Finding an Independent Third Party Battery Test Lab

Contents. Management. Client. Choosing One 1/20/17

The 12 Fundamentals For Creating a Successful Website

Transcription:

Interception Technology The Good, The Bad, and The Ugly! Massachusetts Institute of Technology Page 1

What is Interception Ability to list/view/record information as it travels between some number of parties, without those parties knowing that it is being captured Traditional Case: Phone Wire Tap Modern Case: All communications, Voice, Video, E- mail etc. Page 2

Where to do Interception At the bit level? At Layer 2? At the IP Layer At the application itself? Page 3

At the bit Level OC3 Mon is an example Looks "sideways" at the light going by Assembles packets from there Problem: Need to sort through all the "bits" to get the actual information Bits move fast! Page 4

Layer 2 and IP Layer Need to provide hooks in layer 2 switches These already exist to some degree Example: Port Replication IP Layer Need to subvert routing This can be done, if you can divert packets for transparent caching, you can do it for this! Problem: Sorting through the packets looking for the data Page 5

Layer 3 Interception Need to sort through the data How do you know what to intercept IP addresses change, most lawful interception is targeted at people, not just simple processes This is what Carnivore supposedly does Though they won't tell us! Requires fast enough computers to keep up Requires only limited cooperation from service providers Page 6

Application Layer Interception Requires least computing power Most accurate Requires the most cooperation from the service provider Page 7

Application Layer Examples E-mail Sendmail's "Milter" facility can be used to make copies of e-mail based on criteria such as From and To fields (or even subject!) Web Services Can make copies of "interesting" targeted transactions Page 8

Goals? Depends on who you are Law Enforcement Reliable interception with maximum operational security Service Provider Trust of customers, shield from liability Citizen Accountability of Law Enforcement Don't spy on me! Everyone Secure, bad guys don't use it! Page 9

Security? History has shown that this required an open design Every security design I have seen done behind closed doors has been shown to be weak There is a convenience versus security trade-off A critical part of security is accountability Technology must be easy to use, or it will not be configured correctly If mis-configured, security will be lost, but things will "work" Page 10

Law Enforcement Requirement for "Operational Security" Very few people know about the intercept Cheap Can do more intercepts Available No technical limit on number of intercepts Remotely implementable Makes it cheap! Page 11

Citizen Wants checks and balances Accountability Security Wants confidence in Systems in use Remember: A loss of confidentiality is very hard to trace Page 12

Service Provider Wants to make $$$ Wants protection against liability This tends toward a "Hands Off" approach Reputation is important Page 13

Carnivore Internet Interception: Version 1 Works at IP Layer Not Cheap Requires minimal cooperation from ISP Has reasonable operational security Guys who help install it don't know what it is grabbing Accountability: What accountability! Page 14

The Balancing Act Should be designed in an "open" process Should be accountable Should require intervention of Service Provider??? Can we do better? Should be secure And very hard to make insecure Page 15

Can it be done? Maybe: If you limit who can do interception Problem: Do you limit it to the FBI Note: There are over 19,000 law enforcement organizations in the U.S. What about foreign governments How do you design accountability Some governments may require nonaccountability! Page 16

Will it be effective? Who are we going to intercept? Stupid bad guys? Are they really a threat? Steganography is already rumored to be in use by terrorists. It certainly is readily available By facilitating electronic interception, we may be helping law enforcement to avoid the "hard" work of infiltrating the smart bad guys? But whom am I to judge! Page 17

Quis custodiet ipsos custodes? So who does? Questions? Page 18