Detecting & Defending Against
State-Actor Surveillance

Robert R
@iamlei
Intro
whoami
uid=1(robert)groups=(speaker,advocate,researcher,IVU)

@iamlei
Breakdown
●

I have only 20 minutes ...
●
●
●
●
●

Hardware bugs
Software bugs
Wifi monitoring
Cell phone bugs/monitoring
Conclusions
Surveillance Skymall leaks
Hardware Bugs
Retro Reflectors

SURLYSPAWN
LOUDAUTO
RAGEMASTER
TAWDRYYARD
Hardware Bugs
RF Bug Prevention
Hardware Bugs
RF Bug Prevention
Hardware Bugs
RF Bug Detection
HackRF
or
Any Radio Frequency Monitor
Hardware Bugs
Data Exfiltration
COTTONMOUTH
I, II, III

HOWLERMONKEY

GINSU

FIREWALK
Persistent Compromise
GODSURGE
HEAD/HALLUX WATER
SCHOOL/SIERRA/STUCCO MONTANA
JETPLOW
FEED/GOURMET/SOUFFLE TROUGH
Detecting Persistent
Compromise Devices
Detecting Persistent
Compromise Devices
Software Exploits
SWAP
IRATEMONK
WISTFULTOLL
DEITYBOUNCE
BIOS/Firmware/CF Card Hacked?

Re-Flash Devices
Wifi Devices
SPARROW

NIGHTSTAND
Cell Phone Bugs
Base Stations
CYCLONE CROSSBEAM, EBSR, ENTOURAGE,
NEBULA, TYPHO

Intelligence
GENESIS, WATERWICH, CANDYGRAM
Cell Phone Bugs
Conclusions
●

Bugs are detectable
Many are based on attacks covered in Hacker cons

●

Hard evidence is better than Hearsay
I want to hear from the first person who finds one!

●

Tin-Foil hats are not stylish
Further Reading & Sources
●

Michael Ossmann (ossmann.blogspot.com)

●

Bruce Shneier (www.schneier.com)

●

http://leaksource.files.wordpress.com

●

http://PrivacyTechJournal.com
Harass me on twitter: @iamlei

Detecting and Defending Your Privacy Against State-Actor Surveillance

Editor's Notes

  • #3 I've been part of the hacker 'scene' for the majority of my life now, I present a lot about security, and care a lot about civil rights, here is where the two intersect I don't take well to hearsay arguments (e.g.. someone saying “this is how it is!” without evidence) I really care about government spying, after my experience at a young age with a FBI visit to my house (that was a scare n' care, abusing the patriot act) I care more now, after holding a job where I regularly addressed inquiries (subpoena/warrants) from intelligence agencies.
  • #4 Appelbaum made a big stink at 30c3. Lots of talk about what they were using, but nothing about what to do... so this is the missing part of that talk. Released a 'catalog' of tools/bugs intelligence agencies could buy for surveillance needs. I will cover the 'how to detect', and where possible 'how to defend' against these surveillance bugs. I will hope I get bugged myself, more than deal with some crazy plot (don-pope-tinefoil-hat)
  • #6 RF transmitters, unknown frequencies Surlyspawn: Keyboard Ragemaster: VGA cable (red line) Loudauto: Embedded microphone Tawdryyard: Radio Beacon (think RFID) Defenses: RF bug sniffer, physical inspection
  • #7 HackRF Complaicaiotns: knowing frequencies
  • #8 HackRF Complaicaiotns: knowing frequencies
  • #9 HackRF Complaicaiotns: knowing frequencies
  • #10 COTTONMOUTH: Every USB bug possible GINSU: PCI bus bug HOWLERMONKEY: RF transceiver (works with other things) FIREWALK: Ethernet bug (inject traffic)
  • #11 Devices injected either directly to JTAG (godsurge), BIOS, or comapct flash cards (*montana) to provide persistent compromise on a device
  • #12 Look inside
  • #13 Look inside
  • #14 SWAP/IRATEMONK (Hard drive firmware/MR) WISTFULTOLL/DIETBOUNCE (motherboard BIOS)
  • #15 SWAP/IRATEMONK (Hard drive firmware/MR) WISTFULTOLL/DIETBOUNCE (motherboard BIOS)
  • #16 SPARROW – UAV NIGHTSTAND – More worried about pineapple's from Hack5
  • #17 CellTower Canary or Pair of pants with RF signal blocking pockets (e.g.. don't bring your devices where you dont want to be tracked)
  • #19 Remember: This is the same government that could not roll out a health insurance website.