This document discusses the development of a distributed sensor network called CreepyDOL that could track people in an urban area through passive wireless monitoring and analysis of leaked data from devices. The goal is to demonstrate how much information can be extracted without consent and to shape technology development to better protect privacy. CreepyDOL would use inexpensive hardware like Raspberry Pi boards placed in common objects to passively monitor WiFi traffic and device behaviors. While not actually deploying a full surveillance system, the author aims to educate about privacy risks and push for technical and cultural changes to limit unwarranted data collection and transmission. Concerns are also raised about government overreach in surveillance and prosecution of security researchers.
Julian Assange has offered an interesting theory about the nature of conspiracies, in which they are not some guys sitting around a mahogany table, but rather are the product of network theory. We explain his ideas for how conspiracies thus form and how they are defeated.
This document provides instructions for connecting to an unsecured wireless network belonging to a neighbor without their permission. It describes using tools like Kismet to discover nearby wireless networks, focusing on those that are unencrypted. It then explains how to configure the wireless driver and connect to the access point of the target network. The overall message is that understanding how attackers operate can help secure one's own wireless network, though stealing internet access from neighbors is unethical.
The document discusses using wireless cameras and UPS batteries to monitor one's home in case of warrantless searches by law enforcement. It describes setting up an Internet-enabled wireless camera to send email alerts and video recordings. It also discusses using a UPS battery to potentially power the camera and network equipment for many hours if the power is cut off, in order to maintain surveillance of one's property without permission. The tone is somewhat tongue-in-cheek about "fighting crime" with these methods.
The document discusses security measures businesses can take to protect themselves from cyber threats like ransomware and hacking. It recommends training employees on security best practices to prevent phishing scams from infecting networks. It also suggests creating an acceptable use policy to regulate employee internet usage and requiring strong passwords. Other tips include keeping networks up-to-date with software patches, having excellent automated backups, using a firewall, and not allowing unauthorized software downloads. The overall message is that small businesses are frequently targets of cyberattacks and need to take security seriously to avoid losing data or funds to hackers.
This document provides instructions for building a magnetic card reader/writer that can copy data from one credit or debit card to another. It notes that while commercial magnetic card readers are expensive, an electronics hobbyist can build one themselves relatively inexpensively using basic electronic components and a computer. Detailed schematics are provided to allow anyone familiar with electronics and computer interfacing to construct such a device, bypassing the high costs of commercial products. The author encourages readers to make their own magnetic card reader/writer to explore the data encoded on magnetic stripes of payment cards.
Hermann Goering said that leaders can manipulate people into supporting wars by claiming they are under attack and accusing peacemakers of lacking patriotism. The document is an excerpt from a speech Goering gave before being sentenced to death at the Nuremberg trials for war crimes committed under the Nazi regime in Germany. It warns that governments can stir up support for conflicts by portraying themselves as defending the nation from external threats.
Do we need a new language to describe cybersecurity?Sherry Jones
The document discusses whether cybersecurity needs a new language to be more inclusive and effective. It argues that the current military-style terminology used in cybersecurity, such as "zero-day attack" and "advanced persistent threat", can alienate some groups and cause fear rather than engagement among users. A new language focusing on cooperation rather than conflict and using persuasive stories rather than fear could help involve more people in cybersecurity and promote secure online behaviors.
This document discusses the issue of digital piracy in publishing. It provides statistics on the scale of online piracy and perspectives from industry professionals. Muso.com is presented as a solution that can help publishing companies regain control of their content by scanning the web for illegal copies and having them removed quickly and easily. The process is described as registering works with Muso.com, reviewing illegal files found, and responding to remove them with one click.
Julian Assange has offered an interesting theory about the nature of conspiracies, in which they are not some guys sitting around a mahogany table, but rather are the product of network theory. We explain his ideas for how conspiracies thus form and how they are defeated.
This document provides instructions for connecting to an unsecured wireless network belonging to a neighbor without their permission. It describes using tools like Kismet to discover nearby wireless networks, focusing on those that are unencrypted. It then explains how to configure the wireless driver and connect to the access point of the target network. The overall message is that understanding how attackers operate can help secure one's own wireless network, though stealing internet access from neighbors is unethical.
The document discusses using wireless cameras and UPS batteries to monitor one's home in case of warrantless searches by law enforcement. It describes setting up an Internet-enabled wireless camera to send email alerts and video recordings. It also discusses using a UPS battery to potentially power the camera and network equipment for many hours if the power is cut off, in order to maintain surveillance of one's property without permission. The tone is somewhat tongue-in-cheek about "fighting crime" with these methods.
The document discusses security measures businesses can take to protect themselves from cyber threats like ransomware and hacking. It recommends training employees on security best practices to prevent phishing scams from infecting networks. It also suggests creating an acceptable use policy to regulate employee internet usage and requiring strong passwords. Other tips include keeping networks up-to-date with software patches, having excellent automated backups, using a firewall, and not allowing unauthorized software downloads. The overall message is that small businesses are frequently targets of cyberattacks and need to take security seriously to avoid losing data or funds to hackers.
This document provides instructions for building a magnetic card reader/writer that can copy data from one credit or debit card to another. It notes that while commercial magnetic card readers are expensive, an electronics hobbyist can build one themselves relatively inexpensively using basic electronic components and a computer. Detailed schematics are provided to allow anyone familiar with electronics and computer interfacing to construct such a device, bypassing the high costs of commercial products. The author encourages readers to make their own magnetic card reader/writer to explore the data encoded on magnetic stripes of payment cards.
Hermann Goering said that leaders can manipulate people into supporting wars by claiming they are under attack and accusing peacemakers of lacking patriotism. The document is an excerpt from a speech Goering gave before being sentenced to death at the Nuremberg trials for war crimes committed under the Nazi regime in Germany. It warns that governments can stir up support for conflicts by portraying themselves as defending the nation from external threats.
Do we need a new language to describe cybersecurity?Sherry Jones
The document discusses whether cybersecurity needs a new language to be more inclusive and effective. It argues that the current military-style terminology used in cybersecurity, such as "zero-day attack" and "advanced persistent threat", can alienate some groups and cause fear rather than engagement among users. A new language focusing on cooperation rather than conflict and using persuasive stories rather than fear could help involve more people in cybersecurity and promote secure online behaviors.
This document discusses the issue of digital piracy in publishing. It provides statistics on the scale of online piracy and perspectives from industry professionals. Muso.com is presented as a solution that can help publishing companies regain control of their content by scanning the web for illegal copies and having them removed quickly and easily. The process is described as registering works with Muso.com, reviewing illegal files found, and responding to remove them with one click.
This document discusses the increasing trend of government and corporate surveillance and the erosion of privacy. It summarizes that:
1) Advances in surveillance technology combined with public fear have allowed surveillance to rapidly expand, with over half a million cameras in London alone monitoring people an average of 300 times per day.
2) People have also voluntarily given up privacy by oversharing personal details online, yet this does not justify increased official monitoring and erosion of civil liberties through laws like the Protect America Act.
3) For the moment, public acceptance is what gives surveillance programs the most power, so resisting normalization of these practices may help curb further intrusions if privacy expectations are not completely erased.
President Bill Clinton gave a speech declaring cyber attacks a serious threat and hackers a primary source of this threat. He claimed hackers have stolen information, raided bank accounts, run up credit card charges, and extorted money by threatening to unleash viruses. However, hackers argue there is little evidence of these acts and that insiders, criminals, or those with grudges are more likely culprits. Clinton's characterization of hackers is unfair and inaccurate according to their perspective. The speech also proposed allocating billions of dollars and potentially placing the military in charge of fighting cyber threats domestically, concerning civil liberties.
1) As digital media and technology advance, privacy levels are diminishing rapidly. People constantly update social media about their daily lives, including locations and schedules, without realizing the dangers.
2) Various apps allow users to publicly share their locations in real time, taking away mystery from dating. Employers and law enforcement also monitor social media.
3) iPhones maintain files of users' locations over time without their knowledge, creating detailed maps accessible to anyone with the phone. While technology provides benefits, users must be aware of negative privacy repercussions to stay safe online.
Your doorbell is looking a bit creepy. Smart video doorbells like those from Ring and Nest Labs (owned by Amazon and Alphabet, respectively) have their practical uses, such as catching package thieves. Still, the fast-selling systems could evolve into a privacy invasion, as Geoffrey A. Fowler notes in the Washington Post while offering an ethical field guide.
n the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security.
In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cyber criminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin.
This document provides information about the staff and contributors involved with the 2600 magazine. It lists Emmanuel Goldstein as the Editor-in-Chief and includes various other roles such as Layout, Cover Design, Writers, Network Operations, and Insprational Music. It also includes begin and end PGP key blocks.
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveHeng Guan
Heng Guan presents a talk on using social engineering techniques to target different groups based on characteristics like age, gender, and psychological/physical states. The talk discusses how factors like culture, time of day, and access to personal information can impact social engineering attacks. While the talk aims to warn people, it takes the perspective of an attacker to discuss strategies like leveraging events, imposing time limits, and profiling targets using big data to execute highly accurate social engineering attacks. The talk concludes by discussing mitigation approaches like training people and selecting partners/offspring with stronger defense capabilities.
Online Harassment: Organization for Security and Cooperation in Europe, ViennaMichelle Ferrier
This document provides an overview of Dr. Michelle Ferrier's presentation on defending against harassment for journalists online. It introduces Dr. Ferrier and her background working to counter online harassment as the founder of TrollBusters.com. The presentation covers defining online harassment, sharing examples of harassment experienced by journalists, demonstrating monitoring and reporting tools to address threats, and discussing strategies for individuals and newsrooms to improve online safety.
This document discusses the concept of government mistrusting its citizens and how that undermines the government's authority. It makes three key points:
1) Any government that anticipates bad conduct from its citizens has already lost the right to govern, as the essence of an evil government is mistrusting the people.
2) The implicit agreement between a government and its citizens is that the government will trust the people and the people will trust the government.
3) Once a government begins to mistrust the people it governs, it loses its mandate to rule because it is no longer representing the citizens but is instead acting as an agent of persecution against them.
The document discusses the February issue of (IN)SECURE Magazine. It mentions that the issue focuses on Android security and includes articles on web security, shellcode, mobile security, and more. It also notes that the RSA Conference will be held later in February, which the magazine will cover. It provides contact information for the magazine.
This document provides information about the Tor anonymity network and issues related to privacy, surveillance, and cryptography. It discusses how Tor works to anonymize users and protect their privacy, the importance of privacy in a democratic society, and risks of government surveillance and backdoors in encryption tools and software. It also summarizes the history of Tor and how it was originally developed by the US Naval Research Laboratory.
Mechele Gruhn, Microsoft
Are you perfect? We aren't. But we are trying to be better.
Please join us as we share the good, the bad, and the ugly stories of success and failure from the last crazy year, how we plan to improve in the next year, and how you can help.
This session will be targeted at BlueHat attendees both external and internal to Microsoft who interact with the Microsoft Security Response Center for resolution of vulnerabilities as part of coordinated vulnerability disclosure and will share lessons learned from the past as well as a look forward to the future.
Præsentation for PROSA listing some threat and how to reduce risk - open source oyu can reuse slides for your own presentations https://github.com/kramshoej/security-courses
Drones open up new opportunities for both crime and law enforcement. The author discusses several ways drones could enable criminal acts like terrorism or smuggling but notes technical limitations. Drones also raise privacy concerns with potential "peeping tom" uses. Law enforcement is beginning to use drones for surveillance and crime scene security but also faces public opposition. Overall the piece argues that new technologies will inevitably create new forms of criminal behavior but also new tools for law enforcement, requiring adaptation of regulations.
Why is cybersecurity important for the entertainment industry Lisa Stockley
Cybersecurity is important for the entertainment industry because it is a high-value target for hackers seeking to access and leak unreleased movies, television shows, and celebrity information. Recent breaches at Disney, Netflix, and Sony have shown that hackers target entertainment companies directly and also their third-party vendors. Social engineering, where hackers exploit human tendencies, is a common technique used. Steps entertainment companies can take include implementing cybersecurity programs, managing risks and user privileges, encrypting data, having incident response plans, vetting third-party vendors, and obtaining cybersecurity insurance.
Online firestorms - A tempest in a teapotHimanshuDaga7
Online Firestorms is a part of Social Media Analysis that pertains to detection and tracking of social media handle of a company and raises an alarm if something attracts a lot of negative attention by the users/ customers. Thus, it helps a company to monitor it's decisions and take damage control measures in time, before the damage is done.
Major security intrustions from businesses large and small, private and government, indicate that the Internet is far less secure than most realize. After reading this, you may want to reconsider how secure your private data and information really is.
The document discusses the concept of an "infocalypse" or breakdown of the information society due to issues of data manipulation, lack of trust and security vulnerabilities. Some key points made include:
- All digital data can potentially be manipulated, hacked or destroyed as there is no absolute security. Reliance on digital systems makes critical infrastructure vulnerable.
- Several major data breaches like the Ashley Madison hack have already exposed vulnerabilities and shaken trust in systems. A worse scenario could involve widespread data destruction or manipulation leading to information warfare and infrastructure collapse.
- Solutions proposed include rebuilding some analog backup systems, limiting data collection and sharing, increasing cost transparency for "free" digital services, and reducing overreliance
Verizon's backup power failed during an August 2014 blackout, disrupting 911 service. A Verizon representative explained that the emergency generators were electric, and no one realized the fuel pumps delivering fuel to the generators also required electricity to operate. When the main power went out, the backup generators had no fuel, causing further outage issues.
This document summarizes how alternative long distance telephone companies operate. It explains that these companies have their own networks consisting of landlines, lines leased from AT&T, microwave relays and satellite links. It describes the key components of these networks: local access numbers, switches to route calls over the network, and controlling systems to authorize calls and track billing. It also provides details on the microwave links these companies use to transmit calls between stations located about 30 miles apart.
This document discusses the increasing trend of government and corporate surveillance and the erosion of privacy. It summarizes that:
1) Advances in surveillance technology combined with public fear have allowed surveillance to rapidly expand, with over half a million cameras in London alone monitoring people an average of 300 times per day.
2) People have also voluntarily given up privacy by oversharing personal details online, yet this does not justify increased official monitoring and erosion of civil liberties through laws like the Protect America Act.
3) For the moment, public acceptance is what gives surveillance programs the most power, so resisting normalization of these practices may help curb further intrusions if privacy expectations are not completely erased.
President Bill Clinton gave a speech declaring cyber attacks a serious threat and hackers a primary source of this threat. He claimed hackers have stolen information, raided bank accounts, run up credit card charges, and extorted money by threatening to unleash viruses. However, hackers argue there is little evidence of these acts and that insiders, criminals, or those with grudges are more likely culprits. Clinton's characterization of hackers is unfair and inaccurate according to their perspective. The speech also proposed allocating billions of dollars and potentially placing the military in charge of fighting cyber threats domestically, concerning civil liberties.
1) As digital media and technology advance, privacy levels are diminishing rapidly. People constantly update social media about their daily lives, including locations and schedules, without realizing the dangers.
2) Various apps allow users to publicly share their locations in real time, taking away mystery from dating. Employers and law enforcement also monitor social media.
3) iPhones maintain files of users' locations over time without their knowledge, creating detailed maps accessible to anyone with the phone. While technology provides benefits, users must be aware of negative privacy repercussions to stay safe online.
Your doorbell is looking a bit creepy. Smart video doorbells like those from Ring and Nest Labs (owned by Amazon and Alphabet, respectively) have their practical uses, such as catching package thieves. Still, the fast-selling systems could evolve into a privacy invasion, as Geoffrey A. Fowler notes in the Washington Post while offering an ethical field guide.
n the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security.
In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cyber criminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin.
This document provides information about the staff and contributors involved with the 2600 magazine. It lists Emmanuel Goldstein as the Editor-in-Chief and includes various other roles such as Layout, Cover Design, Writers, Network Operations, and Insprational Music. It also includes begin and end PGP key blocks.
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveHeng Guan
Heng Guan presents a talk on using social engineering techniques to target different groups based on characteristics like age, gender, and psychological/physical states. The talk discusses how factors like culture, time of day, and access to personal information can impact social engineering attacks. While the talk aims to warn people, it takes the perspective of an attacker to discuss strategies like leveraging events, imposing time limits, and profiling targets using big data to execute highly accurate social engineering attacks. The talk concludes by discussing mitigation approaches like training people and selecting partners/offspring with stronger defense capabilities.
Online Harassment: Organization for Security and Cooperation in Europe, ViennaMichelle Ferrier
This document provides an overview of Dr. Michelle Ferrier's presentation on defending against harassment for journalists online. It introduces Dr. Ferrier and her background working to counter online harassment as the founder of TrollBusters.com. The presentation covers defining online harassment, sharing examples of harassment experienced by journalists, demonstrating monitoring and reporting tools to address threats, and discussing strategies for individuals and newsrooms to improve online safety.
This document discusses the concept of government mistrusting its citizens and how that undermines the government's authority. It makes three key points:
1) Any government that anticipates bad conduct from its citizens has already lost the right to govern, as the essence of an evil government is mistrusting the people.
2) The implicit agreement between a government and its citizens is that the government will trust the people and the people will trust the government.
3) Once a government begins to mistrust the people it governs, it loses its mandate to rule because it is no longer representing the citizens but is instead acting as an agent of persecution against them.
The document discusses the February issue of (IN)SECURE Magazine. It mentions that the issue focuses on Android security and includes articles on web security, shellcode, mobile security, and more. It also notes that the RSA Conference will be held later in February, which the magazine will cover. It provides contact information for the magazine.
This document provides information about the Tor anonymity network and issues related to privacy, surveillance, and cryptography. It discusses how Tor works to anonymize users and protect their privacy, the importance of privacy in a democratic society, and risks of government surveillance and backdoors in encryption tools and software. It also summarizes the history of Tor and how it was originally developed by the US Naval Research Laboratory.
Mechele Gruhn, Microsoft
Are you perfect? We aren't. But we are trying to be better.
Please join us as we share the good, the bad, and the ugly stories of success and failure from the last crazy year, how we plan to improve in the next year, and how you can help.
This session will be targeted at BlueHat attendees both external and internal to Microsoft who interact with the Microsoft Security Response Center for resolution of vulnerabilities as part of coordinated vulnerability disclosure and will share lessons learned from the past as well as a look forward to the future.
Præsentation for PROSA listing some threat and how to reduce risk - open source oyu can reuse slides for your own presentations https://github.com/kramshoej/security-courses
Drones open up new opportunities for both crime and law enforcement. The author discusses several ways drones could enable criminal acts like terrorism or smuggling but notes technical limitations. Drones also raise privacy concerns with potential "peeping tom" uses. Law enforcement is beginning to use drones for surveillance and crime scene security but also faces public opposition. Overall the piece argues that new technologies will inevitably create new forms of criminal behavior but also new tools for law enforcement, requiring adaptation of regulations.
Why is cybersecurity important for the entertainment industry Lisa Stockley
Cybersecurity is important for the entertainment industry because it is a high-value target for hackers seeking to access and leak unreleased movies, television shows, and celebrity information. Recent breaches at Disney, Netflix, and Sony have shown that hackers target entertainment companies directly and also their third-party vendors. Social engineering, where hackers exploit human tendencies, is a common technique used. Steps entertainment companies can take include implementing cybersecurity programs, managing risks and user privileges, encrypting data, having incident response plans, vetting third-party vendors, and obtaining cybersecurity insurance.
Online firestorms - A tempest in a teapotHimanshuDaga7
Online Firestorms is a part of Social Media Analysis that pertains to detection and tracking of social media handle of a company and raises an alarm if something attracts a lot of negative attention by the users/ customers. Thus, it helps a company to monitor it's decisions and take damage control measures in time, before the damage is done.
Major security intrustions from businesses large and small, private and government, indicate that the Internet is far less secure than most realize. After reading this, you may want to reconsider how secure your private data and information really is.
The document discusses the concept of an "infocalypse" or breakdown of the information society due to issues of data manipulation, lack of trust and security vulnerabilities. Some key points made include:
- All digital data can potentially be manipulated, hacked or destroyed as there is no absolute security. Reliance on digital systems makes critical infrastructure vulnerable.
- Several major data breaches like the Ashley Madison hack have already exposed vulnerabilities and shaken trust in systems. A worse scenario could involve widespread data destruction or manipulation leading to information warfare and infrastructure collapse.
- Solutions proposed include rebuilding some analog backup systems, limiting data collection and sharing, increasing cost transparency for "free" digital services, and reducing overreliance
Verizon's backup power failed during an August 2014 blackout, disrupting 911 service. A Verizon representative explained that the emergency generators were electric, and no one realized the fuel pumps delivering fuel to the generators also required electricity to operate. When the main power went out, the backup generators had no fuel, causing further outage issues.
This document summarizes how alternative long distance telephone companies operate. It explains that these companies have their own networks consisting of landlines, lines leased from AT&T, microwave relays and satellite links. It describes the key components of these networks: local access numbers, switches to route calls over the network, and controlling systems to authorize calls and track billing. It also provides details on the microwave links these companies use to transmit calls between stations located about 30 miles apart.
The document discusses the threats posed by government surveillance programs and provides recommendations for improving encryption and security. It summarizes the capabilities of programs like TEMPORA, BULLRUN, and QUANTUM that enable mass surveillance. It then provides an overview of cryptography basics like TLS, certificates, and cipher suites. Finally, it outlines responses to surveillance like improvements to encryption protocols and recommendations for system administrators to adopt TLS and keep software up-to-date.
The document discusses the preferred roaming list (PRL) file that determines which cellular networks a mobile phone can connect to when outside the user's home network coverage area. The PRL file contains the frequencies and network IDs the phone is authorized to access. It is updated automatically by the carrier. While roaming enables nationwide coverage, carriers may prioritize connecting to networks that are cheapest for them, even if they offer inferior service quality for the user. The complex technical process of roaming is generally hidden from users, giving carriers influence over their roaming experience without their knowledge.
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
Since the beginning of publications by Edward Snowden last year many of the presumedly exaggerated threat models in cryptography have become reality. When operating sensitive services it's more likely than not that communcation data will be tapped at large carriers as well as internet exchanges and stored indefinitily - this calls for strong and forward-secure encryption.
On the other hand we're faced with the problem that much of the software we're using in the datacenter today is not very secure when it comes to default encryption settings. On top of that, most developers and system administrators are not very fluent in the basic workings of encryption systems.
The talk will give an introduction to SSL/TLS and explain how to check for weaknesses in existing services with tools like nmap, sslscan and sslyze. For common daemons like apache, nginx, exim, postfix and dovecot best practice on improving cryptographic strength will be discussed.
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
Since the beginning of publications by Edward Snowden last year many of the presumedly exaggerated threat models in cryptography have become reality. When operating sensitive services it's more likely than not that communcation data will be tapped at large carriers as well as internet exchanges and stored indefinitily - this calls for strong and forward-secure encryption.
On the other hand we're faced with the problem that much of the software we're using in the datacenter today is not very secure when it comes to default encryption settings. On top of that, most developers and system administrators are not very fluent in the basic workings of encryption systems.
The talk will give an introduction to SSL/TLS and explain how to check for weaknesses in existing services with tools like nmap, sslscan and sslyze. For common daemons like apache, nginx, exim, postfix and dovecot best practice on improving cryptographic strength will be discussed.
The Dark Net is a hidden part of the internet that allows for anonymous browsing and communication. It is much larger than the surface web that is accessible through typical search engines. The Dark Net promotes anonymity and prevents censorship, but is also exploited for criminal activity like drug and weapons trading. It poses a threat as sensitive data from governments and businesses has been stolen and is available for sale on the Dark Net. Debates are ongoing on how to address security concerns while maintaining privacy, and whether businesses should play a role in investigating criminal networks on the Dark Net.
The document discusses the need for a National Cyber Security Standard (NCSS) in the United States. It summarizes four major cyber attacks since 2013 on Target, Sony, and Anthem to illustrate the growing threat of cyber attacks and data breaches. These attacks showed vulnerabilities in security practices that could be addressed by an NCSS established by a National Cyber Security Organization. The attacks stole personal and financial data of millions of customers and demonstrated lax security standards and protocols.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
A Democratic member of the Maryland House of Delegates approved a new bill that would greatly expand authorities' ability to monitor communications like email and phone calls. She explained her support by saying that after 9/11, civil liberties concerns about monitoring jaywalkers no longer mattered. Critics argue the bill compromises privacy and civil liberties.
This document provides an editorial summary of recent events related to cybersecurity threats and government responses. It summarizes skepticism around statistics claiming 250,000 hacking attempts on Pentagon computers, noting a lack of specifics. It also critiques responses from politicians calling to expand domestic surveillance and claiming the US has no ability to defend against cyberattacks. The editorial urges moving past simplistic narratives to more nuanced discussions addressing civil liberties concerns.
Write My Research Paper. Online assignment writing service.Amber Butler
Sir Richard Branson is the chairman and leader of the top management team at Virgin, which includes executives and department heads who work together to achieve the company's mission and goals. Effective teamwork is important for the success of a large diverse company like Virgin, which relies on teams such as the top management team, cross-functional teams, and work teams to address problems, drive improvement, and get work done. As the leader, Branson guides the top management team in strategic decision making and oversight of the entire Virgin organization.
This document discusses government surveillance programs and civil liberties in the UK. It provides examples of surveillance programs operated by GCHQ and the NSA, such as programs that collect data from social media sites, smartphones, text messages, and more. The document questions whether surveillance is being conducted within proper legal and oversight guidelines, or if it has gone too far and infringed on citizens' privacy and civil liberties. It calls for stronger legal protections and more oversight of surveillance activities.
The Internet is on fire – don't just stand there, grab a bucket!Frode Hommedal
The Internet is on fire, and every connected device and user is at risk. How did we get here? By not seeing the dangers ahead, by being lazy and by not understanding the threats we are facing and the consequences of failing at building secure and robust infrastructure. This needs to change, and you need to contribute.
This document discusses the emergence of electronic communication systems and privacy concerns related to computer databases in the 1980s. It summarizes the contents of a magazine published in July 1984 focused on justice and computers. Specifically, it discusses recent cases where computer systems were raided by police for posting credit card numbers or personal information from databases. The document criticizes the misunderstanding of computers shown by authorities and argues that privacy invasion through databases is a greater issue than hackers accessing systems.
presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues
The document discusses the idea of using digital tethers to track data in the same way that falconers use leather restraints to track trained birds. It suggests that data could be digitally watermarked so that any unauthorized access or transfer could immediately alert the data's owner and allow them to track the data's location. Some existing technologies like GPS and digital watermarking could potentially be used to develop such a system. Having this kind of control over data could help address the growing problem of data theft by allowing owners to remotely wipe or self-destruct stolen data, and track down cybercriminals.
Similar to Stalking a City for Fun and Frivolity" Defcon Talk (20)
CEH and Security+ Training Outline - EH AcademyE Hacking
This document provides an overview of an online training program for the Certified Ethical Hacker (CEH) and Security+ certifications offered by EH Academy. The program includes over 45 hours of video content across multiple modules covering topics such as footprinting, reconnaissance, port scanning, viruses and worms, denial of service attacks, and SQL injections. Students will have lifetime access to the video lessons and community support to help them prepare for the CEH and Security+ certification exams.
The document discusses devaluing attacks against the next billion devices and disincentivizing threats. It notes that robbing banks for money cannot scale effectively. The document mentions devaluation and provides case studies as examples, suggesting alternative approaches are needed to address security issues as more devices are connected. It concludes with contact information for the author to likely discuss this issue further.
High Definition Fuzzing; Exploring HDMI vulnerabilitiesE Hacking
Most modern Android-based phones and tablets have a Slimport(r) connection that supports HDMI-CEC like Samsung and HTC among mobile devices, and many JVC, Kenwood, Panasonic, and Sony car stereos and other 750 million devices in the world so far.
Exploiting Linux On 32-bit and 64-bit SystemsE Hacking
Dr. Hector Marco-Gisbert & Dr. Ismael Ripoll presented new techniques for exploiting the Linux, using its weaknesses.
http://www.ehacking.net/2016/06/exploiting-linux-on-32-bit-and-64-bit.html
The most important steps to become a hacker have been revealed. Learn the steps that are highly required to become a information security professional.
http://academy.ehacking.net/blog/125408/tips-to-become-a-hacker
Penetrating the Perimeter - Tales from the BattlefieldE Hacking
Presentation and demonstration by Phil Grimes at Central Ohio Infosec Summit 2016.
Read more about it:
http://www.ehacking.net/2016/05/penetrating-perimeter-tales-from.html
Finding ways to fingerprint the websites on tor project. Read more and see the video: http://www.ehacking.net/2016/02/website-fingerprinting-on-tor-attacks.html
The tool has been developed to be used inside a Linux environment. At the host system level, the only prerequisites are support for Python 2,7 or higher and the Android SDK.
Abusing Microsoft Kerberos - Sorry you guys don’t get itE Hacking
This document discusses abusing Microsoft Kerberos authentication. It begins with introductions of the presenters Alva "Skip" Duckwall and Benjamin Delpy. It then outlines what will be covered, including Windows Active Directory, mimikatz, NTLM hashes, Kerberos, pass-the-hash/keys/tickets and Golden Tickets. It also notes there will be 3 live demonstrations.
Advanced Persistent Threat (APT) attacks are highly organised and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns.
Shodan is basically a search engine which helps to find (routers, switches, Scada etc.) mainly vulnerable systems on the internet .It is widely known as Google for hackers
It was launched in 2009 by computer programmer John Matherly. It is mainly a search engine of service banners in which metadata (data about data) is sent from the server to client. Shodan currently probes for 50+ ports.
Your machine (mobile phone, bluetooth device, router etc etc) may betrayed you and can be used to detect your position or even invade your privacy. They are watching you, stay alert.
Bluetooth is watching you, bluetooth is everywhere and they are tracking your every move. Learn how to detect the surveillance system. For hacking, for fun and for privacy.
Unmasking is the process to remove mask from the face and to reveal the real identity; at defcon17, Robert “RSnake” Hansen & Joshua “Jabra” Abraham have discussed the concept with demonstration
Sir I want to hack whatsapp chat ? Please give me a tutorial link. This question made me to write this simple POC tutorial to hack/steal whatsapp chats
http://www.ehacking.net/2014/09/poc-tutorial-of-stealing-whatsapp-chat.html
Presented by JP Dunning “.ronin” BlackHat Asia 2014; Demonstration of how to build a hardware based trojan at home. Create your own hardware of Trojan Virus. http://www.ehacking.net/2014/09/building-trojan-hardware-at-home.html
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
LDAP Services are a key component
in companies. The information stored in them
is used for corporate applications. If one of these
applications accepts input from a client and
execute it without first validating it, attackers h
ave the potential to execute their own
queries and thereby extract sensitive information f
rom the LDAP directory. In this paper a
deep analysis of the LDAP injection techniques is p
resented including Blind attacks
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Stalking a City for Fun and Frivolity" Defcon Talk
1. Stalking a City for Fun
and Frivolity
“Pull pin, point toward privacy insurance claimant”
Brendan O’Connor
Malice Afterthought, Inc.
http://www.maliceafterthought.com
2. Everything leaks too
much data.
At every level, we’ve forgotten that privacy, not just
security, should be a goal.
3. It is no longer possible to
“blend in to the crowd.”
Certain assumptions, and many action movies, will have
to be adjusted.
Every scene where an action hero dives into a mall with 10K people and the Feds say “dang,
we lost him?” Yeah, that won’t work anymore.
4. Fundamental changes
are needed to fix this.
So we’re probably doomed. But it’s going to be a fun
time in the interim.
And I mean both technical changes---more on this later---and cultural ones: it needs to
*NOT* be OK to request too much data, let alone to store it or transmit it. And I say this as
someone who has worked on software that millions of people use EVERY DAY: we *cannot*
leak private data, or we have lost the only thing we do better than our adversaries, and the
only reason anyone should trust developers.
5. Foreword: Democratizing
Surveillance
http://www.flickr.com/photos/68979377@N00/3745750194
I. Foreword: The Democratization of Surveillance
A. "Security is really the government's area."
1. This was actually said to me by my sister recently, indicating that I'm failing in my
duty to educate my family.
2. Those of us in this room know that the government isn't very good at securing
things by means *other* than throwing them in prison for large amounts of time.
3. Nonetheless, the government has a near-monopoly on surveillance.
6. “Only the Good Guys”
http://www.flickr.com/photos/chberge/3753079527
4. When it doesn't, the perception of the general public is that "only good guys" have access
to terrifying surveillance technology. This is *our fault* for not correcting this misperception,
though groups reporting on, e.g., all the BlueCoat boxes they've found in repressive
governments are certainly helping. Heck, PRISM was leaked, and this is *still* the thing I’m
hearing: people think “hey, the NSA needs that.”
7. “Sunlight is the best disinfectant”
http://www.flickr.com/photos/andyz/3857625392
B. "Sunlight is the best disinfectant."
1. A recent study showed that cops wearing sunglass cameras were 88% less likely to
commit actions resulting in complaints, and 60% less likely to use force; when they did use
force, those officers wearing lapel cameras were consistent in using the least amount of force
possible in a situation. This effect was not duplicated in officers refusing to wear the
cameras.
2. If we can see what's going on---if we can look back at our government---we
have the opportunity to make sure it works as efficiently and safely as possible. If not, we are
subject to blackmail, extortion, and threats. (See Aaron Swartz.)
So we need sunlight---but we need it quickly, and where our natural inclination, our natural
sunlight, is not. Those of you who are weapons buffs may know that this isn’t a photo of the
sun: it’s a picture of the blast caused by Tsar Bomba, the largest nuclear weapon ever
detonated.
8. So I get called a stalker
http://www.flickr.com/photos/simplyjessi/6333279524/
Wait, wrong stalker. This is an adorable cat, apparently named Stalker. People don’t call me
an adorable cat.
9. So I get called a stalker
http://www.flickr.com/photos/dcagne/424124810
Much better. As I was saying,
C. Why I do "creepy" work.
1. The only effective way to raise the issue of creeping surveillance and loss of
privacy is to make clear that *anyone*, not just "the good guys," can use this technology for
good or for evil.
2. The only way to make it clear is, of course, to release software that does it in a
nice, user-friendly package.
10. CreepyDOL is:
• a distributed sensor network that
combines wireless sniffing, distributed
C&C, 3D visualization, and “grenade”
encryption to do real-time personnel
tracking and true-identity theft on a major
urban area. It’s Stalking as a Service!
12. The United States Government
has declared a holy war against
legitimate security research.
Some of us think that’s not a good idea.
13. It doesn’t matter whether
you like Weev or not.
Mighty Casey got three strikes, but we get only one;“They claimed it was for
the sake of their grandparents and grandchildren, but it was of course for the
sake of their grandparent’s grandchildren, and their grandchildren’s
grandparents.” (Douglas Adams)
The time to fight private ex post facto laws is now---because once ratified by a Court of
Appeals, it will be a generation before we get to try again. So set aside any dislike you may
have for Weev---perhaps for the best of reasons---and act in your own enlightened self-
interest. Or everyone in this room will be in prison soon.
14. Amicus Brief of Meredith
Patterson, Brendan O'Connor,
Sergey Bratus, Gabriella Coleman,
Peyton Engel, Matthew Green,
Dan Hirsch, Dan Kaminsky,
Samuel Liles, Shane MacDougall,
Jericho, Space Rogue, and Mudge
And Alex Muentz, another hacker and a full lawyer, who was
willing to take a law student’s brief and submit it to the
Circuit Court of Appeals.
All of the names on this list are big deals. Meredith Patterson from LangSec, Sergey Bratus,
Patron Saint of the Gospel of Weird Machines, Crypto Engineer and Professor Matt Green, Dan
Kaminsky, Jericho, Space Rogue, Mudge... the list goes on. And that should tell you how
scared the entire community is, and should be; it touches all of us, whether we’re DARPA
program managers, professors, or itinerant hackers.
15. In the meantime, there will be a
chilling effect, as we cannot trust
legal actions not to be prosecuted
anyway.
Therefore, CreepyDOL has not been used to take on an
entire city. It’s been tested, and parts of it have been tested
with extremely high amounts of data, but I leave the next step,
world domination, to a braver researcher.
16. Extremely Serious Disclaimer
This presentation does not create an attorney-client relationship. Probably. If it
does, it will have said it does.Although it could have created an attorney-client
relationship without explicitly saying so, because the law is tricky like that.
This presentation may contain confidential and/or legally privileged information. If it
does, and you are not the intended recipient, then the sender hereby requests that
you notify him of his mistake and destroy all copies in your possession.The sender
also concedes that he is very, very stupid.
This disclaimer is not especially concerned with intelligibility.This disclaimer has no
qualms about indulging in the more obnoxious trademarks of legalese, including but
not limited to (i) the phrase “including but not limited to”, (ii) the use of “said” as
an adjective, (iii) re-naming conventions that have little to no basis in vernacular
English and, regardless, never actually recur (hereinafter referred to as “the 1980
Atlanta Falcons”), and (iv) lowercase Roman numerals.
This disclaimer exists for precisely one reason—to make this presentation appear
more professional.This disclaimer shall not be construed as a guarantee of actual
professionalism on the part of the sender.Any actual professionalism contained
herein is purely coincidental and is in no way attributable to the presence of this
disclaimer. If you aren’t reading this, then this disclaimer has done its job. Its sad,
pointless job.THIS DISCLAIMER IS NOT INTENDED TO BE IRONIC.
Adapted, with kind permission from the author and publisher, from http://
www.mcsweeneys.net/articles/alright-fine-ill-add-a-disclaimer-to-my-emails .
To be clear: I do not endorse using this software, or any software, for criminal purposes.
We're hackers, not criminals. I want the fact of this software's existence to help shape habits
and, hopefully, the next generations of mobile devices; perhaps they won't be designed (at
the protocol level) to leak so much information so widely.
17. DARPA Cyber Fast
Track
• CreepyDOL is not CFT work
• DARPA tries hard not to build stuff that
creeps people out this much, and they’re
very nice people.
• That said, two CFT contracts did let me
build two of the core systems: Reticle, and
the visualization system.
• Thanks, Mudge!
19. Goal: Passive Wireless
http://www.flickr.com/photos/library_of_congress/2163911718
II. Goals
A. How much data can be extracted from passive wireless monitoring?
1. More than just from a network trace---remember that when not connected to a
wireless network, WiFi devices send out lists of their known networks, asking if anyone can
help them.
2. As soon as a device thinks it's connected to WiFi, all its background sync services
will kick off again---DropBox, iMessage, all the rest. So we'll immediately know that certain
services will be in play.
3. Over unencrypted WiFi, all the traffic sent by a device is exposed. Even if we can't
see both sides of every message, we can learn a lot from what we do see---especially if we
know how a given protocol operates.
4. How much better could we do if we had not one sensor, but ten? Spread out over
an area? Now we have geolocation, time and place analysis, etc.
5. If we're tracking over a large area, we don't just want to know traffic and devices:
we want to know people. Can we take data and find people? (I don't want your SSN, I want
your name. And really, I want to know enough about you to blackmail you; information is
control.)
20. Goal: Large-Scale Sensing Without
Centralized Communications
http://www.flickr.com/photos/christmaswithak/2732857205
B. Can we do large-scale sensing without centralized communications?
1. If we centralize communications, life is simple; everyone phones home---but a
compromised node gives every attacker the location of the mothership.
2. Centralized communications decrease resistance to attack, and prevent you from
responding agilely to attack.
21. Goal: Intelligibility
http://www.slideshare.net/EmilandDC/dear-nsa-let-me-take-care-ou
C. Can we present massive amounts of this data in a way that is intelligible by mortals?
User-friendly? Still secure?
1. Group One of high security products: incredible technology, terrible UI. This
causes low adoption, or (possibly worse) mistakes in use. Systems fail, people die. Examples:
Pidgin-OTR, or PGP/OpenPGP.
2. Group Two: Concerns about technology, great UI. This causes adoption, but can
cause massive problems later (if the concerns are borne out). Examples: HushMail, Silent
Circle.
3. Group Three: Good technology, great UI. This is wonderful, but incredibly hard to
do (because UI masters are usually not security wizards). Example: CryptoCat, RedPhone.
4. We would aspire to have CreepyDOL be in Group Three, through a variety of
methods to ensure secure communication in relatively-intelligible ways. *This is an ongoing
process.* Our code is open source, to allow verification, and will be released in the coming
weeks.
23. Background:Academic Sensor
Networks Rock!
http://www.flickr.com/photos/22240293@N05/3912598338
(This is the MIT CS building, if you’re wondering. They have an awesome sensor network, and
their papers are always accompanied by the *weirdest* floor plans.)
III. Background
A. Sensor Networks
1. Academic researchers have spent tons of time and resources on these. MANETs,
other advances in technology have resulted.
2. A lot of these have uW power levels, and sacrifice languages, OS, and cost to get
there---especially cost, with many nodes costing $500 or more. Each.
3. I can't afford this. I want something I can afford to break, to lose, and even to have
stolen. I want it an order of magnitude cheaper, and I want it to run Linux. (Ubuntu or
Debian, if possible.)
24. Background: Large-
Scale Surveillance
• Remember, we knew this was happening before PRISM
was announced
• In my original outline:“One can assume that they have
solved all of the problems involved in CreepyDOL
before me, and that they should, rightfully, be cited as
prior art. I'd love to do so; as soon as they publish their
work, I'll be happy to cite them.”
• Heh heh heh.
• Pour one out for the Intelligence Community: a lot of
this stuff is a pain to figure out
27. F-BOMB v.1 (ShmooCon 2012)
A. Hardware: F-BOMB, version 2 (Falling/Ballistically-launched Object that Makes
Backdoors)
1. Originally presented at ShmooCon 2012. At that time, this was based on the
Marvell Sheeva board, the same board used by the Pwnie Plug that’s been selling so well for
years. To keep costs down, I was actually buying PogoPlugs, a rebranding of the Sheeva
board, as they were being sold as essentially fire sales, and stripping out their guts.
Conveniently, (next slide)
28. It fits in a CO Detector
No one ever checks their CO detector to see if it has become a node in a sensor network.
The new one fits much better into this case; much less cutting is necessary.
29. F-BOMB v.2
2. Now based on the Raspberry Pi Model A, because it's awesome, runs an easier
version of Linux (Debian vs. Arch), and I can actually get it for cheaper than the salvage
PogoPlugs. We also get significantly reduced power consumption, it runs at a better voltage
(5v instead of 12v), it’s physically much smaller and lighter, and it actually has more RAM and
processing power on board. You can see there’s a bit of cord sticking out of each F-BOMB in
this photo; this is because I mis-measured when buying the cas. But the Raspberry Pi is
actually much smaller than the Sheeva board, so it fits better into smaller objects. (Hold up
one.)
These devices use USB power, which means that I can plug them into walls (you can see an
Apple-style USB power adapter in the lower-left), but also into USB batteries, MintyBoost kits,
or anything else that gives me 5v in this ubiquitous form factor. They do not use that port as
a data port.
31. Wait... why 2 WiFi?
• Because I’m cheap and lazy
• Introducing PortalSmash: it clicks on
buttons, so you don’t have to
4. Nodes don't bring "phone home" communications gear, e.g., a 3G card; that's too
expensive and *very* easy to trace (just call VZW tech support!). They use PortalSmash, Open
Source software I've developed to look for open (or captive portal) WiFi and use that. In an
urban area, that's perfectly sufficient. (No, PortalSmash doesn't look at encrypted WiFi; yes,
you could add Reaver etc. No, I'm not planning to.)
32. C&C Software
• “Reticle: Leaderless Command and
Control”
• This was the first of the two DARPA
CFT contracts I mentioned
• Whole presentation at B-SidesVegas
2012---but I will summarize
B. C&C Software: Reticle, Leaderless C&C
1. Developed under DARPA Cyber Fast Track, Spring 2012
2. Original work presented at BSidesLV 2012, but massive improvements, and a
complete rewrite, since then.
33. Reticle
Each Reticle node runs CouchDB, a NoSQL database, plus Nginx, Tor, and some custom
management software. This lets nodes combine into a peer-to-peer “contagion” network in
which each node sends commands and data to every other node, for both command
infiltration and data exfiltration, without any single point of failure. They speak via Tor, to
prevent anyone on the network to which they connect from determining where other Reticle
nodes are living.
To make reverse-engineering of a node much more difficult, Reticle nodes can be configured
with what I call “grenade” encryption: pull pin, throw toward adversary. They load their
encryption keys for their local storage at boot from removable media, which is then removed
to prevent an adversary from recovering the data. A “cold boot” attack is certainly possible,
but since most nodes don’t have batteries, it’s physically kind of a pain to do---and it’s not a
usual thing for most people to dump liquid nitrogen on the first black box they see plugged
into a wall.
CreepyDOL, then, is just a mission Reticle runs; it can be retasked at any time.
36. Distributed Computation for
Distributed Systems
http://www.flickr.com/photos/lara604/3164622774
http://www.flickr.com/photos/jenniferboyer/52474490/
http://www.flickr.com/photos/gaelx/1858599144
A. Distributed Querying for Distributed Data
1. Since we don't have independent, high-bandwidth channels for sending data
home, it's not a good idea (and may not be possible) to send raw packets home. Nodes
should send home data that's already been digested.
2. So: we run any queries on the nodes that can be effectively run on the nodes,
*given data that node has collected*.
3. We do not process multi-node data on individual nodes, even though every node
has access to all the data (see "contagion network"), because they've got limited processing
power---and more importantly, data storage.
37. Centralized Querying for
Centralized Questions
B. Centralized Querying for High-Level Data
1. Things that need datapoints from multiple nodes---tracking, pattern analysis,
etc., go on the "backend."
2. The backend is just another node, but with a special mission configuration: rather
than just sensing and adding data, it receives data from the contagion network, pushes it into
another system (a data warehouse), and then instructs the contagion to delete it to make
room.
38. NOM: Nosiness, Organization, and Mining
http://www.flickr.com/photos/scjody/5345366096
C. Data Query Methodology: NOM
1. O: Observation. Take as much data out of local traffic as possible; this means
names, photos, services used, etc. To make this easy, we've created a large number of
"filters" that are designed for traffic from specific applications---DropBox, Twitter, Facebook,
dating websites, etc. Now, many of these services encrypt their traffic, which is admirable;
however, in many cases, we can still get useful data that they provide in, e.g., their User
Agent. And there’s no reason for them to do this. (Next slide)
39. Why?
So this is a screenshot from Wireshark, of a packet being sent to request new iMessages from
Apple. Notice at the bottom, where it sends the hardware device and iOS version, as part of
the HTTP header? This is unnecessary, and it’s harmful. (If Apple needs this information, it
could transmit it inside TLS.)
40. NOM: Nosiness, Organization, and Mining
http://www.flickr.com/photos/scjody/5345366096
2. N: Nosiness. Using data extracted from O queries, there are lots of
leveraged queries we can make; for instance, given an email address, we can look for
accounts on web services, or given a photo, we can look for copies of that photo pointing to
other accounts. This can be run either as distributed or centralized.
3. M: Mining. Taking data found by the nodes, build up larger analyzed products. For
instance, is the device (person) usually in one area during a certain time of day? Are there
three devices that are almost always seen together, if at all? (The latter may indicate that they
are all carried by the same user.) This type of query is exclusively run on the backend.
41. CreepyDOL Architecture
So this is the overall architecture for CreepyDOL. The nodes connect to each other, and one
node becomes a “sink node” from which data is pulled and sent to the CreepyDOL storage, so
that it can be used in the visualization. The visualization pulls data from the storage and
from an OpenStreetMaps provider, to have underlaid maps.
42. Visualization
• Second DARPA CFT Contract
• Used the Unity Game Engine
• Side note: wow, that’s a fun toy
• Side note: wow, I hate writing JavaScript that’s
interpreted by C#, then compiled into .NET CLR
• Runs on an iPad! Or OSX/Windows/Linux/Android
• I think I could make it run on an XBox360,
actually (Unity isVery Nice)
So let’s talk about visualization.
To prevent the user (the person requesting data) from being tied to a particular computer, we
use the backend to run queries for visualization, then serve the results to the user's
visualization computer.
To make it easy to do large-scale visualization, I used an existing engine: the Unity game
engine, used in hundreds or thousands of iPad, iPhone, XBox, Wii, and PC games. This let me
take advantage of the hundreds of person-years of development they’ve already done to
make it fast. As a side effect, it also means I can run my visualization on an iPad; since all the
processing is done on a visualization server, it doesn’t need to be able to hold the data in
RAM.
44. Test Parameters
• To prevent badness, we programmed the
NOM system to look only for traffic from
devices we owned; no “random
stranger” data was collected at
any time.
45. So first you can see the plane loading. Then the data loads, and after a brief loading delay,
the map comes in from OpenStreetMaps. I’ll zoom the camera in and out a bit; you can see
that it’s 3D, and the control interface works much like Starcraft or other real-time strategy
games, except with people instead of alien troops. Now you can see I’ll draw a box to select a
group of data, and after a brief delay, the data and map will re-draw to allow more focus on
the data in question. I can hover over various nodes to see their MAC addresses and
locations, but for maximum data, I click on a node, and it shows me everything. I have some
of the services I use, I have the hardware and software I’m carrying, I have a real name, email
address, and even my photo from an online dating site. Combined with the true location and
time of each of these pings, we end up with the same data that you used to use a whole team
of surveillance agents to retrieve. Cheap, distributed stalking.
48. Counter-Infiltration
http://www.flickr.com/photos/igalko/6341182132/
A. Counter-Infiltration
1. There is a persistent rumor, in cases of exceptional police brutality (Occupy
Anything, or more protests in Britain) that the police are sending in agents provocateur to
cause the disruption that gives them an excuse to crack down. (This rumor is at least 300
years old, by the way.)
2. CreepyDOL would let you set up "known devices" with alarms for new ones, watch
as new people come in, or even simply set off a klaxon if a Blackberry shows up (obviously a
cop).
C. OPSEC Training
1. The ROE for my tests demonstrate limiting data capture to one or several known
devices. Use that to test your agents' OPSEC capabilities: set up a wide-ranging capture
network (but tied to their stuff) and see what they leak.
2. The advantage is that you don't need to control every network an agent accesses.
This lets you test "in the real world," which is much more realistic.
49. Evidence Logging
http://www.flickr.com/photos/decade_null/142235888
B. Evidence Logging
1. Again in fast-moving scenarios like protests and rallies: there's a real problem
with destruction of evidence, electronic or physical, during crackdowns. In addition, it's very,
very difficult to know who was *in* a kettle in the first few hours afterward; a way to know
that could be very comforting and/or helpful to those outside.
2. Since CreepyDOL uses a contagion network, anything it logs will be immediately
shipped out of the area to linked nodes anywhere on the planet. If those nodes go offline, the
data is preserved.
3. For bonus points, use F-BOMB belt packs (which last a very long time on batteries)
to have moving logs---and if you come in range of a WiFi AP somewhere (say, at a stop
light), they'll offload their data without any additional interaction.
4. The encryption, and the fact that the nodes don't persist their keys, mean that
unless an adversary *already knows what it is and how to cold boot it*, they don't get data. If
people on the outside are concerned about the nodes, revoke their device certificates and
they'll be cut off immediately.
51. Scaling Up
• Sharding Contagion Networks
• Scaling backend --- luckily, this isn’t hard
• Scaling limits of visualization
Sharding the contagion networks: it’s easy, just give them different keys. Each network could
have a sink node that throws data into the visualization system.
Scaling the backend is similarly easy: the software communications with the visualization
engine over HTTP, so it can run in the ubiquitous cloud. Indeed, running the backend on
Amazon S3, I’ve tested scaling parts of the backend to over half a terabyte of packet capture
data.
The visualization is somewhat more difficult; Unity gets fussy if I display more than a couple
thousand nodes at once. However, with grouping, and eventually, over large map areas,
doing limited field of view and view distance work (as they do in real video games), this can
be mitigated.
52. Enhancements
• $20 SDR devices (RTLSDR)
• To listen to any frequency, not just WiFi
• Encrypted WiFi Workarounds
• e.g., Reaver
• Jasager (WiFi Pineapple) to make sure
wireless devices connect
• MitM
54. Mitigation:A Sacrifice
The leaks are at all levels. The 802.11 protocol asks devices to do this beaconing which
means that even with encryption both in the protocol and over the air, I can still do tracking
and identifications.
The OS won’t enforce VPNs (iOS).
The apps leak too much data that they don’t need.
This is EVERYONE’s fault, but no one wants to take responsibility for their own actions. It’s
the status quo, right?
55. The Status is Not Quo
Image from Dr. Horrible’s Sing-Along Blog, by Joss Whedon
We can’t tolerate this level of privacy leakage: as consumers, we should demand better, and
as developers at every level, we have a responsibility to do better.
56. Digression: Hark
• Archive for hacker work of all types (not
just security)
• Mentorship, promotion, and archival forever
• New system of unique identifiers, like the
academic DOI system, but free
• On Kickstarter now: http://thehark.net
So a very short final note on Hark. There’s been a back and forth between academic and non-
academic researchers for years, where the academics say hackers aren’t rigorous enough and
don’t cite their work, and hackers say academics don’t do anything *but* cite other work.
After this blew up at ShmooCon 2013, those of us who, like myself, straddle the academic/
nonacademic divide, had some discussions and drew up plans for a way to let hackers archive
their work, whether it’s a tweet, a blog post, a conference presentation, or a journal article,
and cite previous hacker work regardless of whether it’s been academically published. I don’t
have time to go into all the details right now, but if you think it’s important for hackers to
stop re-inventing the same wheels every time we have a new research projects, I hope you’ll
check out thehark.net. And yes, we encourage corporate donations.
57. Thanks!
• To all those I’ve asked for comments, to
Mudge for CFT, and my law school, for letting
me spend so much time on other things.
• Also, I’m finishing law school in 10 months,
and am wondering what I ought to take on
next. If you’ve got something interesting, ping
me: brendan@maliceafterthought.com.
• http://thehark.net