ilab
play

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr - PowerPoint PPT Presentation

iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl fr Netzarchitekturen und Netzdienste Fakultt fr Informatik Technische Universitt Mnchen Surveillance and operational security 14ws 1 lecture evaluation oral


  1. iLab Countersurveillance Benjamin Hof hof@in.tum.de Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Surveillance and operational security – 14ws 1

  2. ◮ lecture evaluation ◮ oral attestations in 03.05.051 ◮ 2015-02-02 ◮ 2015-02-03 ◮ 2015-02-04 Register. 2

  3. CC-BY-SA 3.0 Andreas Preuß 3

  4. IEEE Spectrum 2007: The Athens Affair. 4

  5. submarinecablemap.com 5

  6. server client the Internet 6

  7. server client BND, NSA IX, submarine cables 6

  8. lifewinning.com/submarine-cable-taps 7

  9. RAMPART-A Typical Operation USA Country X Processing Center E D B C Partner Analysts NSA Network SECRET//COMINT NETWORK Access Point A International Cable TOP SECRET//COMINT//NOFORN 8

  10. 9

  11. ◮ full traffic storage ◮ search engines ◮ financial transactions ◮ mobile systems 10

  12. 11

  13. 12

  14. 13

  15. “I hunt sys admins” ◮ webmail/facebook ◮ quantum ◮ router target ◮ look for successful logins ◮ admin 14

  16. GCHQ attack on Belgian ISP Belgacom 15

  17. NSA attacks German satcom provider Stellar 16

  18. Attacks on standards ◮ Dual_EC_DRBG ◮ IETF 17

  19. BSI report on German steel mill 18

  20. Think about your threat model communications ./ endpoints Everything starts with physical security. Force Eve to become Mallory and Mallory to become a burglar. 19

  21. Endpoint security requires control. 20

  22. ◮ get a strategy ◮ unlinkability, compartmentalization ◮ slideshare.net/grugq/opsec-for-hackers ◮ crimethinc.com/texts/atoz/security.php 21

  23. 22

  24. Other helpful software ◮ OTR ◮ (GnuPG) ◮ Textsecure, Redphone ◮ Debian 23

  25. Endpoints ◮ attack surface: browsers, drivers, . . . ◮ AMT/IPMI 24

  26. QubesOS 25

  27. ◮ defence in depth ◮ diceware ◮ don’t store plaintext ◮ logging 26

  28. ◮ LANGSEC ◮ ENISA, Nov. 2014: Algorithms, key size and parameters ◮ OWASP 27

  29. AV tracking devices with phone functionality ◮ SS7 ◮ data trail ◮ baseband processor ◮ additional batteries 28

  30. Believe nothing. Research everything. 29

Recommend


More recommend