course evaluation
play

course evaluation room for attestations: 03.05.051 iLab Threat - PowerPoint PPT Presentation

course evaluation room for attestations: 03.05.051 iLab Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt


  1. course evaluation room for attestations: 03.05.051

  2. iLab Threat modelling, surveillance, operational security Benjamin Hof hof@in.tum.de Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Closing event – 15ss

  3. You may not be interested in surveillance, but surveillance is interested in you CC-BY-SA 3.0 Andreas Preuß

  4. IEEE Spectrum 2007: The Athens Affair.

  5. IEEE Spectrum 2007: The Athens Affair.

  6. View on security 1. communication 2. software stacks 3. physical security

  7. Outline Classification of actors Threat actors Attack systems Examples Systematic defence

  8. submarinecablemap.com

  9. Eve lifewinning.com/submarine-cable-taps

  10. Mallory

  11. Burglar

  12. Jack Bauer

  13. Outline Classification of actors Threat actors Attack systems Examples Systematic defence

  14. High end ◮ Five eyes ◮ Israel ◮ China ◮ Russia ◮ France

  15. Commercial variants

  16. arms dealers

  17. Mercenaries law suits, high profile business deals

  18. attacker resources ./ money ./ target value

  19. Scale

  20. Outline Classification of actors Threat actors Attack systems Examples Systematic defence

  21. RAMPART-A Typical Operation USA Country X Processing Center E D B C Partner Analysts NSA Network SECRET//COMINT NETWORK Access Point A International Cable TOP SECRET//COMINT//NOFORN

  22. ◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems

  23. ~ - ~; - e n - t i f - i ~ - ~ m -._ ~ L ~ -~ L ~W~ " O!" · gma f .c o:n :~._-.~ - ~ : ~h~me skypeM~ sk.ypeM~l:.*.en ~ gmo l . com P.v~s or sep~rate.:1 ~d ) TOP SECRET//$1 //REL U SA , AUS, CAN, GBR, NZL ' • (TS//51//REL) Change the query to search for the last 3 Months and click SUBMIT .. St lector Prollle sear ch Seied:or P l' oflle S<iec tor Ploflle [· - - - -:o>gnal.ccm<goo;je>) Mttlcatlon: v 20111110 [3 OD:OO :OO End D.t o: v 'bd>y Selectors Yeste«Jay c .. ,.,.,. <oi) Add @ Remove 1h l< - 7 1h i :>Mon th L google Parcrreters L Mt Nonlh [J Parilmetefs l 0ay El ._.-~- P ar<meters 2 t»ys googlo [J ParM'let«s 3 ~ 5.,.,. skyp e MaJ'blcM E P¥.snet us . Oays 1 t:l skype r.,.lbken 140ays google Pararwet. : ers J M>tth o 3r...w Ad d: I Ercer ~ rrore- seleclot! by (OO!mst and ht enter Qui et 6Monlhs A ut hority Filtus l v~-~ I > - . .. .. . . t· · •n• ·• •• .- .. - . - ll SPIEGEL ONLINE

  24. Outline Classification of actors Threat actors Attack systems Examples Systematic defence

  25. “I hunt sys admins” ◮ router ◮ look for successful logins ◮ admin ◮ personal webmail/facebook ◮ quantum

  26. GCHQ attack on Belgian ISP Belgacom

  27. German satcom provider Stellar

  28. Attacks on standards ◮ Dual_EC_DRBG ◮ IETF

  29. BSI report on German steel mill

  30. Outline Classification of actors Threat actors Attack systems Examples Systematic defence

  31. Operational security ◮ get a strategy ◮ unlinkability, compartmentalization ◮ paranoia doesn’t work retroactively

  32. Endpoint security requires control.

  33. Debian reproducible builds

  34. QubesOS

  35. Applications ◮ OTR ◮ Textsecure, Redphone, Signal ◮ Tor

  36. Hide metadata

  37. Development ◮ LANGSEC ◮ OWASP ◮ ENISA

  38. Operations ◮ diceware ◮ don’t store plaintext ◮ logging ◮ defence in depth

  39. Attack surface Endpoints ◮ browsers, drivers, . . . ◮ AMT/IPMI tracking devices with audio functionality ◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries

  40. Believe nothing. Research everything.

Recommend


More recommend