[00:00:05] >> Hello everyone welcome to the Institute for information security and privacy lecture series here at George attack we're committed to bringing you top researchers working on cyber security threats trends and technologies honor to present Nick Weaver from u.c. Berkeley. I think you are tuning in virtually from Napa today is that. [00:00:31] Correct from my lovely lecture code Bowker and the California. Well it's great to it's great to have you and I just wanted to mention was great talking with you last week about your recent contributions to Cybersecurity Research and I just wanted to mention a story that you talked about in when you were reading the Guardian back a few years ago when you discovered the n.s.a. kind of publicly confirms research you were doing in packet injection and other techniques that were used for monitoring I hope you will touch on that today I'm sure the audience would like to hear that in your talk reflections on the Internet balance and one last thing by way of background Dr Weaver received his Ph d. in Computer Science in 2003 from u.c. Berkeley and then joined the International Computer Science and they're perfectly as a researcher and his primary focus is on network security notably spot nets and other Internet scale attacks and network measurement I'm sure you'll touch today during your talk on some of the other areas of focus and with snow for do I will turn it over to you next thank you very much so in many ways this is a bit of a retrospective talk on the. [00:01:54] Rather older work. But 1st of all some background. I am a computer security researcher and per play I do not have a security clearance. I refuse to fill out such a security clearance for However my hobby and literally my hobby is watching the surveillance tape it's. That if you discount my civil libertarian tendencies my refusal to get a security clearance and. [00:02:34] My general aversion to actually working for a living I could actually run a pretty good technical lead team at the other sec. And of course my work is sponsored by the National Science Foundation but opinions are my own although these days I have a corporate sponsor Kuroda Seltzer the worst time product launch since little Davies influenza Kates of 1080 so a disclaimer. [00:03:09] This talk is about classified information there is no it was on the front page of The New York Times the classification in the us we do not have the state secrets thing so. When as a individual I receive public earth receive classified information. By reading the newspaper I have no obligations. [00:03:39] But people who do have security clearances do have obligations so I do a lot of writing at the law fair walk and so I follow the law fair walk principle I do not directly include classified information so that those who do have a security clearance don't have to worry about burning their computer down. [00:04:04] But this is derived from a part of public but still classified information and I will then program. So back in May 2013 someone named Edward Snowden downloaded in massive prove the classified information from his contractor job at n.s.a. for why he then flew to Hong Kong shared the probe with multiple reporters notably Greenwald some folks from The Washington Post Greenwald was at the Guardian at the time and it's up to you to decide whether he was a disgruntled administrator or a courageous whistle blowing patriot I personally think evil Louise he is the latter and I thank God for that because he didn't dump the raw data he passed the data to reports but there have been a lot of other leaks since. [00:05:01] So we have. What's known as the if catalog and tore rules. That were leaked by an unknown party to take a battle. Somebody in New Zealand. Leapt a bunch of surveillance rules to the New Zealand Morning Herald. Somebody unknown sent a bunch of sigint summaries to Wiki Leaks. [00:05:30] Somebody stat info about the CIA hacking tools to Wiki Leaks. It's alleged that this guy named Joshua shortly but the feds did not succeed in convicting him though for. Ever and finally somebody. If bunch of n.s.a. exploitation tools and publicly release that because that's fun to do so let's take the 1000 for the n.s.a. the n.s.a. is mission is to have the capability to collect communication information on any particular non-U.S. her one thing to remember is the n.s.a. is not focused on the u.s. back in the seventy's there were big scandals concerning your Hoover domestic surveillance and this really in change the N.S.A.'s corporate culture the n.s.a. looks out more but they need the capability to get information on any particular part. [00:06:47] And also you don't know until tomorrow who you wish you were surveilling to death so when in pop when possible collect everything collect all the communication you can and then search for later. And they've got some very important researchers they've got creative interpretations of already very permissive law they've got some privileged locations to monitor internet traffic they've got 4 friends the United Kingdom Canada Australia New Zealand these friends have much more permissive wost than the us they also have a lot of what our best call frenemy. [00:07:32] Intelligence agencies that air other sort of France sort of not the classic example would be the French or the Israelis and the Germans and there's a lot of these front and finally they have more money than God and their primary tool that they deployed in the 2000 is what's known as the digital network intelligence plus the d.n.i. for and they do care about the loss so the last part where. [00:08:09] Executive order what you propose 3 and successes for us non lawyers basically it's not us person activity in the current outside the us cool guys half up it's basically spies or hands off by outside the us you can do what you want. There is some other exceptions that don't like the face Amendments Act section 702 that model is a non-U.S. person but collecting data in the us. [00:08:46] The n.s.a. has to certify the program with the courts so any individual part getting in is up to the n.s.a. but they have to go to the courts go to the special secret court to go yeah you're actually doing what you're supposed to be doing and you are impinging too much on the rights of the West person. [00:09:10] There is this section of the Patriot Act called Section $215.00 which is business records relevant to an investigation. On duty. Ok I'm going to need to pause and switch projection sabs because that's bluejeans it is clear wrapping out I'm going to switch to my. White cop story about the. [00:09:43] Brits the laptop this is going to make the q. and a slightly more annoying but I should still be able to see at 0. And let's go with being out again sorry about press. I will keep the blue jeans Then. I'll have the hue and they are blue jeans. [00:10:19] Air. Sheriff's. Bearing option shirts for a. Trip to start sharing. Ok. Again sorry about the lovely technical difficulties. Let me reopen the i Pad blue jeans. Did he get it. And. So I can actually see the earnings I can see the polls. I can see the chat. I can't believe the q. and a at. [00:11:21] All. I'm afraid questions will have to be asked in the general chat rather than in the q. and a interface. So the last. E.o. 12333. Are not the best person anything outside the us anything gets them the who is not the worst person collecting in the Us program must be. [00:11:57] We have the Patriot Act business records relevant to an investigation that bolded spend all the needle it to say every voting record in the us is somehow relevant that changed because it was so abusive but for us persons get a warrant so we recently found out the f.b.i. has been a bit sloppy here but the sloppiness still involves a crap ton of paper or so the number of warrants that are actually issued is relatively low. [00:12:33] And can somebody paying in general chat to make sure that they're actually seeing me cook yet. And as a reminder you can ask questions in chat because I have it open on my i Pad here so 1st of all what it isn't about it is not about the notion of needles and hate. [00:13:02] That you often hear people talking about needles in haystacks But the reality is it's needles in a needle sack so we thought out after the French shooting that there were a few 1000 jihad of us in France being observed. And the problem is is most of those you have 4000. [00:13:27] 3996 of them rectal crane inversion case or of that are real threat if you can't tell that from the point of surveillance it ends up looking the sack. It's also not about acting the dots that there are so much information you can see basically any pattern you want in the data retrospective Instead what it is about is written notes to collect met it though I don't want to look at it at work I want to look at what people are doing and the n.s.a. has a term content derived Connecticut that has little bits of information about the communication derived from everything you see and so a good example of this is if you are out. [00:14:30] This is a knife or. This is a onion you are. This is a g.p. message. This is a document file. Jack. This is Mojahedin secrets though there is jihadi branded impression motive in secret it's great it is literally saying hey energy hobbies drone mean any out who ever in the n.s.a. or g.c. if he were invented the program really deserves a big Christmas vibe. [00:15:12] And then wants to have this video into your goal is to pull of the threat to start with a piece of information and follow it through the network to understand what it is that you want about your park. So here's a hypothetical example modeled on some real world cases there's an i.r.c. chat. [00:15:39] We have the Cyrus a chat and a darned if you read this article at this time. It was kept this intercept was intercepted at this time and so now I want to know who anon to do it. And so all I have to start with is anon do click on this you are out at this time and 1st of all I want to who yes find out everything I can about it. [00:16:11] And so this is the signals intelligence or digital network intelligence blah and so at one use that this allows me to find out everything about his pattern. And step 2 is part of his computer that I want to be able to par get his device with an exploit by him or I just literally push a button and it over his computer. [00:16:37] So part of the system is a network intrusion detection system that the n.s.a. calls a ski school. So all of the scale Elbel network intrusion detection system is to understand that now in order to detect attacks and the goal of the d.n.i. flow is to understand the traffic in order to understand the people it's basically the same problem with just a couple of weeks so network intrusion wants real time they want to be able to say in real time. [00:17:10] What is happening so we can at least theoretically do detection we're spots digital network intelligence is Ok with what's known as near real time so we don't organize the communication entails the communication is dumb. So a scalable this is a fairly simple the bus we have a very high performance network have a wire tap and a wire tap in network just copies all the network traffic and we then go through a high volume filter because there's a lot of network traffic that we just don't care about big bulk s.s.h. transfers for example you want to have big the transfers you don't want to look at everybody and then we have a load balancer and this is cake the network traffic and split it up amongst a whole bunch of workers and then we have a whole bunch of worker So what happens is a network packet comes it it gets checked by the pipe volume felt that is there's not that part because well Bit Torrent is garbage for the spots they don't care because of the load balancer the load balancer is you just take the source and destination ips and hash them together and that tells you what network no to go to and this is a very simple operation. [00:18:40] Because what we want to do is make sure that all practical relevant to a pair of hooks. Goes to the same next net and then it goes to the nets no to sell their offices you can actually do this with an open flow switch you can use 100 gigabits Open Flow switched to do all the high volume fell through and logout for Berkeley National lapsus been doing it 3 years that way and that's a problem use custom hardware using f.p.g.a. is because well they're a money problem. [00:19:16] And the nix notes itself has truly linear scale that if you throw 10 times the money at the problem you can process $10.00 times the 1000000000 and a single you have space a inch and a half space in a machine room if you want to 5 gigabits per 2nd processes so to process $100.00 gigabits you need about 50 computers that's just money. [00:19:45] So inside the network intrusion detection that's where we process the information so we take the network traffic we reassemble at internet strangers and so now we know what the p.c. people owe us. Once we do that then we process that to get the message that this is a u.r.l. repast this is the hosting this is the you are wrong requests this has a 90 with it this is a send a mic request this is a mail being sent from some person to some other person. [00:20:25] And unlike a conventional lives the problem for surveillance is actually easier so in a conventional Nids you have to worry about people playing games where the packets get reassembled we're. Serving up doesn't care or valence just goes crypto. Suppose you want to build it yourself Well there's a lot of network intrusion detection systems you can just hit part of the shelf. [00:20:53] The 1st one is the Zeke network security monitor this is a real cool tool if you're defending your own network. It's a real time systems so it persons network traffic and invokes policies perhaps a disability for the spies does it require seeing both sides of the traffic and when you're deploying on an Internet backbone you lot of only see one side or the other though it's great if you want to build those it's great if you want to explain it it actually isn't good for the systems. [00:21:29] There's a tool cut more cats from walk even more than this handles the real summons this takes the network traffic reassembles it into a file and then in the most popular programs this is a real time system you can just download and. There's also a commercial that are. [00:21:50] Eagle blend by this company called Next a technology that provides you there if you're just willing to write a check. It's off the shelf so the n.s.a. used ask Iscar and x. Keyscore is probably based on what important port I will never find out if it has. A Snowden release I've got a scaling back. [00:22:18] And the reason why is a real pioneer is really this event as the perfect come set up and so use the a programming model of receiver events on 10 steps and you have an Event Center program an. X. Keyscore has a different programming model for and the programming model for analysts is all the data has that part of what matches so you don't have a model of risk given h.t.t.p. hatter this is what it is it's did the h.t.t.p. headers include That's the programming model only makes sense to be applied after you've already parsed the strip and the other thing is is x. Keyscore analyst can extend processing with c. plus plus. [00:23:10] I don't know about you but I don't want to. Have random random in a let's write in c. plus plus cat because what happens with c. plus bits go crash is it's awful let's them really to draw our abilities the only way I can have sequenced was code being written by random idiots is with every c. plus plus program running in it's own process. [00:23:49] And vortexes model allows this quartet's model reassembles into files once it's reassembled into files it invokes programs on page one x. he's for is parsing the resulting file and it's the endless programs would then run independently so if they crash who cares we do our reassembly not onto an s.s.d. but on 2 files in a ram desk though that you don't have to worry about the memory latency. [00:24:21] Anil's program crashes it doesn't affect other programs and yes this is less efficient than a system like a system like Zeke we don't end up having to create these huge intermediate files for them in memory then read them back again but let's face it if efficiency is just money and remember one thing that these guys have more money than God And so if you have more money than god well. [00:24:52] Go with a system that just works and this will just work so now that we're seeing that we're proud we want to do intelligence and so for now work intrusion detection we care about computers for surveillance which people so want to identify is here's a web page it's over h.t.t.p. it's not secure. [00:25:19] We see it well paid who the user actually hits. And if we look at the h.t.m.l. underneath we see something like that and if we look at the request we see something like best. And so our response within this regular expression will tell us the person has. This lucky to the person s. And so part of just simply observing a request made with this response with this response in now know who the person gets returned a tracking cookie inshoot a identification card but the other thing that we want to do is take advantage of advertise their advertising is using the huge number of darkness tracking cookies let's deal on a mice this cannot miss tracking cookie dough I see 2 requests one. [00:26:24] Q Both of these requests are from the same person at the same time the same web browser They are however different posts with different cracking cookies what I simply see there I've got 2 requests with that they refer any user same time different tracking cookies now I can do it on my list that wrapping cookies by linking them now I know the filter cookie score per respect cookie with these values are the same person. [00:27:03] And then I do bulk report bulk record is easy you just take a big amount of hits the n.s.a. does but reporting on systems like this there are wiretapped their goal is to stare about a week's worth of pop. And truth be told their editors Lawrence Berkeley National Lab reports 3 months a book network do not have the systems where you deploy them. [00:27:34] Up. You can't deploy in the us so a lot to me us for really restricted the most permissive laws that no 2 and that is not permissive enough to install at ski school but instead what you do is you deploy on on your friends spoils in a day you'd care a Australia New Zealand and also our viewers who are in base though in Japan and or stuff like that. [00:28:04] At the time of the Snowden documentation the n.s.a. is the belief or this bulk recording bulk analysis stuff after that was actually in the u.k. and the other half were scattered around the rest of the world of course none of it was in the us the other thing the you do is you make the on with your front of these. [00:28:24] Do you say hey r.p.n. country at you want to install this really cool piece of software and hardware on this link between your country be it will provide the hardware bill provide the technical support and pay we both get back to us we promise we won't use this to spy on your citizens or arced the since you promise not to use the spy on your citizens or our citizens and we'll actually open the stuff so you can actually see who were spying on it so yeah I don't need to trust that it's. [00:29:00] Ok we got here. Not the same part of a European country b. have I had to deal for year and so you spy on the Germans from the Netherlands you found the Netherlands from Germany. And then you know what gets me anything at all so all this metadata all this communication is most of it is ignore about most that you don't care about you need to be able to search it anyway and collecting all this melody to centrally will just not make sense so instead the model is you do with federated search though the model for this is who view this page of will go to what in Utah in a sack in Utah does not conduct this part of the activity. [00:29:56] Who viewed this page goes out and set gets to all these remote location and then if one gets the response it goes back. So what goes in Utah well in Utah we have some centralization So most of the mega data we don't centralize but some of it we get tons of it we do in what's known as Querrey focused centralized status though some real common paint like a wet requests might actually be worse centralized and so this is collected overseas under one to travel through we've already filtered it out so it's not us persons of. [00:30:44] Let's put it in a way there are meet cancer chip efficiently for a walk period of time and what we do is we use what's known as a query focused dataset we then take this data split it into a form that a lot of easy search so he put it into IP buckets or cookie buckets or username bucket and so I'm due for say username as we have asked the username that says what to do puppet to put this data into and then if we need to search for a particular username we look in that particular buckets and do a linear search so this is a good way of handling mostly read only day job data where 99.9 percent of it you don't care about but you don't know which percentage you care about until later and so this allows you to efficient purchase and this is what they put in Utah so Utah is big Hindu clusters that are used for Querrey focus data sets up let's go through that he used 2nd we asked our wiretapped who viewed the edge. [00:31:58] This gives us a double click out I think Ok with that double click am I happy we now go Who is this user id late tracking cookies for ads which are on the b.b.c. to the user id everywhere else so now we know who Yes Ok now that we have the link user I.D.'s both the user names that are public as well as the ad cookies Well hey what is the history of these I p addresses Ok one time he forgot to use the v.p. yet though that Double Click Add we see it from his home. [00:32:42] We then go into it soon as the IP intelligence database this is we take all those Android tracking cookies that they change p.s. location so we now know the IP address and so if the anon dude is Syria we now know where he lives where is where the cafe hears and we drop a drone on them in this case and I'll do this probably some punk here in Sweden then we can do with it. [00:33:10] Because we now know his base but let's say he want to attack his computer this is where point click and poem by name comes. Up and he doesn't catch that well that's passing the bar tab that wire can't says this is effect for some javascript to a domain I understand and a cookie indicates that this is the somebody I want to target Ok. [00:33:42] I am going to do what's known as package action I'm going to send a thick response. Not the same source IP address as the real server as long as it arrives 1st my script will now be correct his web browser to fetch a bit of Java Script from my website. [00:34:06] This is what the n.s.a. calls quanta this is also what's known as air pump the airplane is a tool that was released that that gave the go plus at dot com that replaces all the images you view over the why fight with the go see it if you open know what the go the images it will find out of there is a commercial venture hacking consults China actually deployed a full 1000000 in the middle of the China's Great Firewall is this but China actually has the film in the middle to now your browser for anon do his browser goes and fetches this bit of Javascript so. [00:34:51] The n.s.a. calls this their exploits or her but you can just go out and download this yourself because well this is called medicine medicine Floyd as this functionality commercial vendors hacking team thin Fischer and as a group all offer this capability and now a non dude's computer. Gets exploit it now fetches what the n.s.a. calls an implant what the rest of us would call him remote thus tool kept This is just simply a program that takes over his computer turns out as Mike does whatever you want and basically makes the victim's computer now a surveillance. [00:35:37] You want one of these well you can just download them there's plenty of black markets that you can download there's commercial that nurse so all of this flood is just not unique to the n.s.a. but the n.s.a. quantum itself is actually broken by design 1st of all this was one of the biggest secrets revealed by snow. [00:36:06] We know about it because some idiot chose it usefulness so what happened is early on in the release from the Snowden. Is there was a report about the n.s.a. and British hacking Belgacom that is Belton's telecommunications infrastructure using a technique they called quantum insert with no other details I go Hey this isn't quantum some by packet injection because packet injections and all the idea I had already studied IP with the Great Firewall of China. [00:36:45] And I knew about air poet and if I was building the n.s.a. I would be using that injection because it allows me to hone what I did identify the target inject obvious for air inject javascript take over their computer call it good. Stuff I rated this up I'm going to have a quantum sounds like packet injection if I see you have to say this is what I do because it would allow me to hack any web browser on the planet target by any. [00:37:17] Chance so I write it up I try to get it published I get a published basically in a organized medium blog or as Borat and send it to some threats. And colleagues one of who I did not know about at the time was working on analyzing the Snowden documents through Shire wealth analyzing certain documents for the Guardian and it's particularly what the n.s.a. was doing about Tor now in his. [00:37:55] Later subsequent discussions he says that the use of packet injection which was specifically in east toward documents was the one secret that the n.s.a. didn't want to reveal so his write up in The Guardian just linked to mine This is how quantum works because it's really hard to justify keeping something the secret when it is literally the tool of Def-Con prates and you have random people with no security clearance going n.s.a. this is what you should be doing if you weren't doing it already you're not in the If so you're probably doing it. [00:38:39] So the front end is actually literally error prone with the serial number spotted off to a high building something like this and building it on top of the real proof it is hatching exists but we found out through some Snowden documents that the n.s.a. quantum wiretap is just looking at single packets at a time in other words it's the student project version. [00:39:02] But they also screwed up though this is literally the N.S.A.'s logic in building this well denies our wiretap to shoot exploits and people pose up of course let's go at home and they use the term shoot. Use those to attacking you know allies critical infrastructure yet telecommunications infrastructure is critical infrastructure the ultimate is any you al are so that really I think the Belgian government is justified in asking the British Royal Air Force on British P.C.'s Hugh headquarters. [00:39:44] Whatever. Actually go there right now sorry classification rules get in the wet stuff if you're building us what do you do is you set it up so that the word happened knows what it's targeting when you see a request from the victim you send a response immediately because this is a race condition and your reply has to go for hours and that's a committee 1st and this is classification system is so paroch and broken that what they had to do is have that wiretap go to a backend system in classifieds make the actual target decision turn the response back in the unclassified space and each step through you have to go through a system known as a guy of the special Sheen designed to make sure that no wrong classified information gets across and so they took something the trip take in a millisecond and made it take hundreds of milliseconds and basically no longer work yet they they literally did that and. [00:41:04] China also dust. So China's Great Fire all is effectively the same system it's a network intrusion detection system it is scalable real time there are if they leave the original paper in Chinese academia sites broke paperwork and so our subsequent papers on the Great Firewall site their paper saving us because well academics always like citations The other thing us is trying to hasn't in Path merely in the middle of after war that's probably based on an open. [00:41:42] Joke it sees a Syrian request if it decides to do a mean in the middle attack it can duck stick to are the only known use of this has been implementing dos attacks but really could just as easily use the us to attack us. This isn't rocket surgery a few years back I built my own version of bug x. Keyscore Mcor atom for fun the longest time it took me was to do the core affable user interface. [00:42:20] So. The where I deployed it on a 2015 was an Intel lock nice little computer about it often there was are eligible can't give it network so this is a really cool device it is a network tap built into a switch are you what all of these this is one of the most useful be bugging tools or wrap a total cost ever thought crime under $1000.00 exhibit capable. [00:42:53] Nursed the wiring class of the Mayflower Hotel in Washington d.c. where I was attending a Department of Homeland Security work car. And the wiring closet plugged up. This could have been installed in that wiring closet and nobody would have ever noticed. Today you can do even cheaper than not you can probably replace with a raspberry party or which is a quad or $1.00 It hurts forgives radio the our supply and that's a $140.00 compared to what it looked like when I deployed Well I have bought requiring extract heaters are I the extract looking cookies and provides a 3rd ship so here's that hypothetical example done on my user interface though I want to read another list by us though I've been the expression. [00:44:02] Now I get a connection. That can happen so I've got a record it so I can recover the 5 so I can recover the network file that was actually being broadcast through on the network so you can reconstruct the network traffic and so they've got the nice little easy article. [00:44:28] From there I can go what are the cookies so this allows me to get the null put coast and so big server cookies in this request are a mess but let's look for the links course well the linked groups or the double play allowed me to find the heck I've got an arse technical cookie. [00:44:56] Lost audio on Ok Ok sorry about that Sun chat that somebody said they have hostile and so I got my arse technical Cokie let's close on that. Or the Jacobi the not look at here linked in to who the user this though by just doing this or looking around I can find out who the person s.. [00:45:42] I can look at all the identified users at this IP address I have here is our 2nd account are. The. Cookie. So I know who here and now I have a packet injection tool that will inject one of 2 bits of javascript javascript number one causes a hidden I frame that spits out all the user identified cookies I have a whole bunch of friends and I'm friends to this allows you to bulk a bit of fire somebody and then Tony is place all javascript with my little are all images with my little poem so this was the flow I built at Hobby Lobby. [00:46:34] So what about crypt. The work apps have a security model to protect cryptographic see because both surveillance and cryptography don't get on together. So what the n.s.a. did is the bulk wiretaps capture the cryptographic handshake outsource it back to the us and the crypto magic breaks he it will bend the profit. [00:47:01] On this however does tell the world that they're breaking the crept up stuff like if in World War 2 Now the British were breaking in a remained a secret but Britain was breaking a name I was not stuck. The biggest role in the n.s.a. tool kit is what's known as clot ha graphy just feel that. [00:47:24] Any r.s.a. based protocol like fill us with r.s.a. or p.g.p. if you steal the privacy it becomes trivial to decrypt the traffic on the what you can do passive decryption. On put there are some more tricks they get so they captured handshakes for b.p. s. that were higher really based on different help if the helmet is designed so that if a Europe has a bad person you can't decrypt the traffic to they were clearly being able to do stuff to that the home but at the same time this was not 100 percent match so the n.s.a. has 2 missions of breaking everybody else's encrypted and keeping our encryption stop. [00:48:17] Top secret information needs to be secure for 40 years against interception and the n.s.a. still allows 3000 bit iffy Helman and elliptic curve if you Hellman for top secret if you use those parameters properly you know it is secure against the n.s.a.. So how did the n.s.a. break the helmet they cheated they bribed r.s.a. data security to use this add random number generator and make it the fault random number generator there are as if products. [00:48:55] And this really the number generator is backward if you know the backwards and see the output you can roll the random number generator backwards and once you can predict the red numbers well you now can break that if you know. They got it up to those in the spirit or other priests and the police there for that and other spying on people go and this is a back door this is stupid. [00:49:25] But no means revelations came out there was a throwaway line in the New York Times about a Neil Ferguson pop on the subject and think what had happened is there was some negotiation between the New York Times and the n.s.a. we phrase it like this to protect sources the methods because we don't want to say you at least see but as soon as the New York and said there's everybody found out that it was the will is he in about 30 seconds. [00:49:55] And polarity ends to. So probably the most famous is duly seen in Juniper So the n.s.a. got through so Juniper it usually see in their b.p.m. applications this was due to an unknown Intelligence Agency is what it was found out Juniper was this was if we used a different parameters that it hit a the the actor was there but just a different Let's ignore for the fact that Juniper was gone **** because he never used it will e.c. and last you want to back up some other intelligence agency Pro particular purpose. [00:50:45] This is a backdoor let's change the source code to repeal the law locking out the 1st intelligence agents now the 1st intelligence agency couldn't go to Juniper day you hacked in your source code got changed because well you know that would reveal that the big break in the coat of a 3rd intelligence agency then broke it and then added it back to your. [00:51:14] And went on a per cleaned up back door they changed the dual e.c. regulars back. The latest rumors are that both number 2 and 3 were both show you know. And then the computer security community a back door let's take a look hey wait aren't these 2 least the parameters each is back in this I just well as the. [00:51:38] Hurt and feel area. There is more that they gave us and restoring. The imperfect Forward Secrecy work was really good and the observation is you can precompute if the helmet. It's per prime not perky. A 1000 bit the hell meant you could build a custom super computer to break particular problems and you can sabotage the product he and nobody knows where the example p.k. for. [00:52:12] The Either the n.s.a. was doing less in half seriously pissed because the work from Adrian at all blew it what open or they weren't in which case they were seriously pissed because they could have been doing this for happened that ever worked we'll never know what you don't want about this sound and. [00:52:36] This is much more restricted so there's the program called up screen that is looking for keywords in there this is very limited. And it mostly legalized a program that they put in place without any legal authority at all up there we have one person and that's known as upset that we have data requests of us companies and this is not balk This is tens of thousands of individual each parade of requests that individuals though it's not Balkan but it's a lot of Yahoo trying to fight this in court last. [00:53:17] And note that this was not enough for the n.s.a. of the few thousands of the n.s.a. both have Yahoo and Google oversees inter-linked which seriously pissed off now the other thing of note is this is abuse but not abuse. Up sorry Siri went on. It is a piece of by me. [00:53:46] They did a lot to undermine security but there is actually this affectively no evidence that the n.s.a. actually abused the system but these are abuse there's no question about it but they were actually the Peeps the were a few cases of of what the n.s.a. calls love it don't love it is where a n.s.a. personnel is this to spy on their infant part it's a huge problem for the n.s.a. they get a few cases a year of this and it's self report half the time. [00:54:26] The other half the time it's copy there aren't so it's for common or isn't informed it's called love it they hate it. There's no cases of economic espionage most countries if you say broke into Petra Prust Brazilian petrochemical company because oil security is national security you would forward that information to your local Ok France would do this Israel would say don't do it Russia would do this we do not know the Us will not do that. [00:55:06] But only I thought there would be in the early days of Snowden his the people used in the n.s.a. surveillance for personal profit we know this doesn't happen because if it happens we call stock it. And it would be all over and the same for the wiki's and blown Kringle of would have gone but we actually have a absence of a term that specifically shows a large class of the use never occurs on this known docks if we reveal some target arms there was an Australian woman who was. [00:55:52] Ok boyfriend ran off to join the Taliban isn't this who you should be surveilling. There were 5 us Muslims reported this was with full by it's a wiretap and this was part of it criminal investigation or material support of terrorism so what has happened since well post again the n.s.a. is actually really bad shape has encrypted and is now free and non sabotage So let's encrypt has turned the cost of doing few of us and corruption on your web page to actively 0 there is no excuse for web pages to not be in print. [00:56:45] Yahoo forced all the ad networks to support us though Yahoo got seriously pissed by the n.s.a. wiretapping. And so they've got their revenge they got their revenge by forcing every ad network on the planet to support p.l.s. do now every advertisement supports say on the planet and commute here. [00:57:11] Most T.L.'s is now $256.00 bit and e.c. feel it she. Almost all in mail is encrypted on the wire accounts of that 1st series start p.-l. out does not stop an active Baptist group it stops all pass of that ever since. And the encryption itself got a lot stronger he'll last 13 is only forward secure Muppets' surely about everybody is now used in each mac the r.p.g. for when the number generators are we have forts of your message and pop while in flight signal and it's out that are designed even against compromised fighters. [00:57:53] Basically both surveillance can only get simple pilot hole netted it I p. address x. visited site while I transferred the amount of data is the time t. and that as you can see is not very useful it gets here just a reveal amount of information. Though x. Keyscore rocks quantum breaks up through more apps and they're all that actively useless at this point another thing of note is supply chain attacks so this Bloomberg Business Week article that was let's put it lightly utter **** this report was bogus but the supply chain attacks that is somebody sabotaging products and manufacturer are not we know because the end of Take It To The End of us they caught doing us the Cisco products they were going to be shipped to Syria now isn't this who you want the n.s.a. to sabotage Yeah but well they're certainly me for Cisco but with all this why would it China do the same why wouldn't show you to do the same thing to walk away from the equipment with or without what I always consider. [00:59:16] So why if you're worried about Chinese spies like say I think you're up if you ever bought a 5 he equipment through. It doesn't make sense. But other than postman is happening is now the primary in fact acting we have to target individuals. N.s.a. has no great advantage here and that's a tool for well may but the innocent doesn't have anything different than anybody else conceptional are n.s.a. n.g.c. h.q. Balco got out it so people who were infected by n.s.a. NACA know who they were are on the list was through a combination of Snowden documents and his 1st Pinellas. [01:00:11] And the other thing he has is the n.s.a. is too cautious the n.s.a. n.g.c. h.q. are really conservative about who they attack but there are other countries they are the honey bad they don't give up about who they hack and who they get caught so that's like Russia China North Korea these countries don't care so much if they're caught and so therefore can be much more aggressive and the troops are Democrats Democrat you can write a check to a whole bunch of companies you can hire a bunch of contractors yourself and you can basically as a small country have the same basic welding for hacking is the n.s.a. and so welcome to the future so anything we n.s.a. Dia and anybody else can do this was probably the biggest the Emmet of snow was destroying what is known as the strategic a pop or c. reserve that is we no longer can claim the high ground. [01:01:22] The areas that the n.s.a. had a unique advantage the bulk surveillance is affectively dept how much traffic at least days of your web browsing is on encrypted Firefox and chrome specifically call out an encrypted traffic as not secure there is direct and rush or for the remaining only encrypted traffic to go cracked so the bulk surveillance is dad. [01:01:53] And even out of the box surveillance the n.s.a. is only advantage was there frets. Everybody can use the n.s.a. style flow internally anybody can do the m. and s. a stout fellow at the Starbucks located in foggy market. Arm As for the hacking in the other stall Dockery Well we're now at a real this if it so China has a huge advantage they've got a huge fraction of the supply chain and there are hundreds of batch they really go Care So there are much more aggressive. [01:02:33] And they're quite long cat counters. Russia also has a good advantage they don't have the supply chain but there are 100 better they've got a very very friendly. Arm And so this is the future. Of **** and that is the talk lives will be available in a few hours.