Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Security Awareness: Applying Practical Security in Your World
Technology for Computer Forensics by Alicia Castro.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Computer Networks IGCSE ICT Section 4.
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Telephone versus Internet Wiretaps A Technical and Legal Perspective Steven M. Bellovin AT&T Labs – Research
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
For more notes and topics visit:
Cyber Crimes.
Networking LAN (Local Area Network)  A network is a collection of computers that communicate with each other through a shared network medium.  LANs.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Sniffing and Session Hijacking Lesson 12. Session Hijacking Passive Attacker hijacks a session, but just sits back and watches and records all of the.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
Network Devices and Firewalls Lesson 14. It applies to our class…
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Ethernet, WiFi & Protocols
Network and hardware revision
Remote Logging, Electronic Mail, and File Transfer
HTTP AND ABSTRACTION ON THE INTERNET
Local Area Networks Honolulu Community College
Software Mr. Singh.
Wireless Network Security
Wiretapping Christopher Simpson.
How Does Electronic Surveillance Work Legally?
Virtual Private Networks
Server Concepts Dr. Charles W. Kann.
Using MIS 2e Chapter 6 Appendix
CT1303 LAN Rehab AlFallaj.
A Brief History of the Crypto Wars
Using SSL – Secure Socket Layer
Chapter 16: Distributed System Structures
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
Chapter 5 Networks Communicating and Sharing Resources
Packet Sniffing.
Topic 5: Communication and the Internet
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Chapter 6 Networks Communicating and Sharing Resources
Progress leisure OCR GCSE ICT.
Chapter 8: Monitoring the Network
The Hacking Suite for Governmental Interception
Unit# 5: Internet and Worldwide Web
Planning and Storyboarding a Web Site
AbbottLink™ - IP Address Overview
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
The Internet: Encryption & Public Keys
Chapter 7 Network Applications
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Computer Networks ARP and RARP
Presentation transcript:

Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017 How to Wiretap Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017

Once, Wiretapping Was Easy The phone system was simple Tapping was simple Very little technology was needed © Benjamint444: https://en.wikipedia.org/wiki/File: Alligator_clips_444.jpg 9/21/2018 smb

It Wasn’t Quite that Easy What pair of wires should be tapped? Required cooperation from the phone company Where is the tap done? In Olmstead, it was in the basement of his office building and “in the streets near the houses”. “In the streets” sounds wet, cold, and probably noticeable… cybersec

Pen Registers Pen registers record dialed numbers Early designs were attached to the wire pair and simply recorded the actual dial pulses cybersec

More Modern Approaches A better idea: loop extenders Connect the tapped line to a friendly pair of wires that lead back to a nice, warm, dry office Photo ©Matt Blaze; used by permission cybersec

However… Technology keeps changing Pair of wires? What pair of wires? Mobile phones Voice over IP (VoIP) Internet games with voice channels Skype Pair of wires? What pair of wires? cybersec

CALEA en.wikipedia.org/wiki/File:Cisco7960G.jpg All phone switches are required to have a standardized wiretap interface The technology is irrelevant; the switch handles the details Remote taps, from your own office The solution was rapidly copied around the world; the generic term is “lawful intercept” en.wikipedia.org/wiki/File:Cisco7960G.jpg 9/21/2018 smb

Yet More Complexity What telco handles a given phone number? Consult the local number portability database Contact that telco What about mobile phones that have roamed, perhaps to a different network? Do you route calls through the home location, for easier tapping? Or do you do the tap remotely, which gives better performance but demands comprehensive support for taps throughout the phone network cybersec

Photo ©Matt Blaze; used by permission Pen Registers Once, easy—put a simple device on the line pair Modern versions handle touchtone and are easier to use, but are about the same Again, though—today’s phones don’t use simple wire pairs Answer: put something in the switch, as per CALEA Photo ©Matt Blaze; used by permission cybersec

How Do We Tap the Internet? cybersec

Whom Do We Tap? A login? An IP address? A MAC address? An email address? A particular person connecting to a particular web server? cybersec

Whom Do We Tap? A login? An IP address? A MAC address? An email address? A particular person connecting to a particular web server? All of the above, plus combinations! For intelligence taps, tapping many users may be necessary—plus taps by content! cybersec

Where Do We Tap? On the target’s LAN? On the access link to the customer from the ISP? On the Internet backbone? cybersec

Where Do We Tap? On the target’s LAN? Hard to get access; may be detectable On the access link to the customer from the ISP? Best—but may be a shared medium and carry traffic for many customers On the Internet backbone? Too much volume, and paths are asymmetric May be done for intelligence taps cybersec

Tapping a Link Every Mac and Linux computer comes with the tcpdump command; this can tap networks (Exercise: what about 18 U.S.C. § 2512—Manufacture, distribution, possession, and advertising of wire, oral, or electronic communication intercepting devices prohibited?) The tcpdump command even does some protocol analysis cybersec

cybersec

Getting the Right User’s Traffic We want to tap a person We may or may not know that person’s email address IP addresses are dynamically assigned, so we don’t know them a priori We need smart, protocol-aware filtering cybersec

Carnivore A late 1990s FBI network-tapping device Very controversial, so there was an external review As a result, we know much more about it than about other specialized tapping software cybersec

Configuring Carnivore cybersec

Configuring IP Address cybersec

Filtering on Email Address cybersec

Selecting Protocols cybersec

Full Content or Pen Register cybersec

Filtering on Content cybersec

What Does This Tell Us? Network taps must look at many intermixed sessions The tapping software must sort the packets into different sessions and evaluate each session for compliance with the warrant This is hard! (Wire pairs were much easier…) cybersec

From https://www.epic.org/privacy/carnivore/fisa.html Software Can Be Buggy From https://www.epic.org/privacy/carnivore/fisa.html cybersec

(When to Encrypt) Anyone on-LAN can eavesdrop on traffic Law enforcement can eavesdrop on access links SIGINT agencies can tap backbones Law enforcement and SIGINT agencies can compel sites to disclose content, e.g., email Hackers can penetrate end-systems, including mail and web servers and user computers—and steal their keys Encrypt things if your usage patterns have one of those scenarios in your threat model cybersec

FISA §702 Downstream—compulsory process to ISPs (PRISM) Upstream collection—look at wires, possibly in the US, for legal foreign intelligence information cybersec

PRISM (PCLOB §702 report) cybersec

Bulk Capture Intelligence agencies need to capture a lot of traffic, both content and metadata Often, what is done is to capture a lot of data, but only look at “tasked selectors” (There are credible reports that this is sometimes done for criminal wiretaps, too.) cybersec

Stellar Wind Stellar Wind is a now-discontinued bulk SIGINT collection system The legal arguments permitting it were dubious It did bulk collection of foreign content and domestic and foreign communications metadata cybersec

Stellar Wind Content Database (From a DoJ/DoD/NSA/CIA/ODNI Inspectors General report) cybersec

What is Metadata? cybersec

Collecting Internet Metadata You have to collect an entire SMTP or IMAP session You have to parse the protocol and the email message (It’s actually not at all clear that addresses in email header are legally metadata, at least per Smith) Note the difference from phone calls But—what about “post cut-through dialed digits”? Hard to tell from content cybersec

“About” Collection Under the §702 program, the NSA can collect messages that mention a selector, i.e., that are “about” that selector The selector still has to be a valid target This can sweep up messages to and from US persons Note: In April 2017, the NSA voluntarily halted “about” collection cybersec

Doing “About” Collection In the IP header, selectors are at fixed offsets In email messages, the selectors are near the start of the session With “about” collection, they can be anywhere— much more expensive! Image: Bruno Wenk cybersec

Multi-Communications Transactions Sometimes, a single intercept contains permitted and prohibited (i.e., purely domestic) traffic Picking out just the foreign traffic is technically infeasible cybersec

From ODNI https://www.eff.org/deeplinks/2013/08/intelligence-agency-attorney-explains-how-multi-communication-transactions-allowed cybersec

A Gmail Screenshot cybersec

SIGINT Isn’t Always Enough What if the traffic is encrypted? (Assuming, of course, that the NSA can’t break the crypto…) What if Tor is being used? Both the content and the metadata are hidden Solution: Network Investigative Techniques cybersec

Network Investigative Techniques Network Investigative Techniques (NITs): lawful hacking Used by the FBI since at least 2002, per court filings and FOIAed documents Quite controversial cybersec

How NITs are Used Email a booby-trapped attachment to the user Just like illegal spearphishing malware Plant something on a web site that your target(s) will visit Used in the PLAYPEN child pornography case Just like watering hole attacks Use any other mechanism commonly used to install malware on particular targets’ machines cybersec

The Purpose of NITs Most common: find the real IP address, MAC address, perhaps owner information Some of that may be (legal) metadata; some of it probably isn’t Use CIPAV: Computer and Internet Protocol Address Verifier Possibly do remote search (“Magic Lantern”) cybersec

CIPAV Send a packet to the FBI from the target’s machine No worries about NATs—the NAT will translate the FBI’s packet’s address The address, as received, will be the global address, which can be used to find the suspect’s computer Other FBI tools are apparently classified cybersec

Legal Processes Needed There has been quite a bit of discussion about what legal process is needed for a CIPAV Eventual consensus: a search warrant to hack into the target’s computer, plus a pen register/trap-and-trace (i.e., metadata) order to obtain the IP address A remote search would require a search warrant as well as a hacking warrant (though both could be in the same warrant) cybersec

The FBI’s Eventual Answer https://www.eff.org/files/fbi_cipav-08-p169.pdf cybersec

Controversies Jurisdiction—who can issue a warrant for a target computer in an unknown location? Is it “particular” enough? Is it reasonable to use one warrant to search or trace many computers? Is it acceptable for the FBI to hack computers? cybersec