Download presentation
Presentation is loading. Please wait.
Published byDaniel Singleton Modified over 8 years ago
1
The Hacking Suite For Governmental Interception
2
Which are todays challenges? Encryption Cloud Mobility
3
The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the House Oversight The evolution of technology is creating new challenges for law enforcement and our ability to access communications. We call it “Going Dark,” and it means that those charged with protecting the American people aren’t always able to access the information necessary to prosecute criminals and prevent terrorism even though we have lawful authority to do so. To be clear, we obtain the proper legal authority to intercept and access communications and information, but we increasingly lack the technical ability to do so. This problem is broader and more extensive than just encryption. But, for purposes of my testimony today, I will focus on the challenges we face based on the evolving use of encryption Amy Hess, FBI, April 29, 2015 Federal Bureau of Investigation
4
Obama: Police and spies should not be locked out of encrypted smartphones and messaging apps.... Jan 16, 2015 Cameron: We should try to avoid the safe havens that could otherwise be created for terrorists to talk to each other.
5
“We have to focus on the Internet and social networks, which are more than ever used to recruit, organize and disseminate technical knowhow to commit terrorist acts.... We must go further.” PM Manuel Valls, Address to French Parliament, Jan. 13, 2014
6
The pendulum has “swung too far” against the government. FBI Director James Comey, Oct. 16, 2014
7
“We shouldn't give in to scare-mongering or to people who fundamentally don’t understand the details...” CEO Tim Cook, Nov. 3, 2014
8
“None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn't give it up. The Telegraph, Feb. 28, 2015 “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will.” Letter to Customers https://www.apple.com/privacy/
9
...protected by end-to-end encryption across all your devices...
10
“We continue our ongoing efforts to encrypt all Google products and services.” The Intercept
11
Encryption. Noise. Mobility. Make Law Enforcement and Security Agency blind.
12
How can we solve this? From the device.
13
RCS infrastructure
14
You work on the device. Bypass encryption See what the suspect sees Follow your suspect
16
Which data can you collect?
18
Microphone Messaging Documents Passwords Calls Location Camera snapshots Keystrokes Visited websites Screenshots And more …
19
Where can you run it?
21
How can you deploy it?
22
When the target opens a document While the target browses the web Exploit Delivery Service Secure and always up to date
23
Inject into downloaded applications Inject into video streaming websites Bob’s laptop Web site Internet Network Injector
24
Send your target a SMS QR Code Web link
25
Different vectors for different scenarios
26
Don’t forget social engineering
27
You get more than just plain evidence.
28
Target-centric solution (Evidences collection)
29
Target-centric Intelligence
30
Intelligence (Correlations between targets)
31
Skype and Voice Recording Evidences
32
Chats and Messages App Evidences
33
Social Media Evidences
34
Bitcoins Evidences
35
Webcam and Camera Evidences
36
Screenshots Evidences
37
Mouse Clicks Evidences
38
Easy configuration of Agents
39
Event / Action configuration
40
Master-Slave (Master Nodes, Collectors, Anonimyzers)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.