{"id":11160,"date":"2016-01-29T06:08:24","date_gmt":"2016-01-29T12:08:24","guid":{"rendered":"http:\/\/hcstx.org\/?p=11160"},"modified":"2016-01-29T06:08:24","modified_gmt":"2016-01-29T12:08:24","slug":"sharpen-your-cyber-skills-how-to-make-your-own-nsa-bulk-surveillance-system","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/01\/29\/sharpen-your-cyber-skills-how-to-make-your-own-nsa-bulk-surveillance-system\/","title":{"rendered":"Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-11161\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/01\/obama-nsa.jpg\" alt=\"obama-nsa\" width=\"600\" height=\"399\" \/><\/p>\n<p><span class=\"lede\">OF ALL THE <\/span>NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency\u2019s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world.<\/p>\n<p>XKEYSCORE, which <a href=\"https:\/\/theintercept.com\/2015\/07\/01\/nsas-google-worlds-private-communications\/\">the NSA calls its \u201cwidest reaching\u201d surveillance program<\/a>, was established around 2008 and consists of more than 700 servers that store data sucked from the internet\u2019s backbone and mine this data for patterns and connections.<\/p>\n<p>Only a well-resourced party like the NSA could deploy such a grandiose surveillance program. But if your spy needs are more modest, there are a number of existing tools available that offer similar surveillance capabilities, albeit at a smaller scale, says Nicholas Weaver.<\/p>\n<p>Weaver, a senior researcher at the International Computer Science Institute at UC Berkeley who focuses on network surveillance and security issues, developed a little hobby after the Snowden leaks in 2013: to <a href=\"https:\/\/www.lawfareblog.com\/contempt-bulk-surveillance-its-too-easy\">build a bulk surveillance system in miniature<\/a> that would be capable of performing all the primary tasks of an NSA spy system\u2014but on a small, 100 Mbps-size network. Those capabilities had to include bulk data collection, search functionality, the ability to track cookies and identify anonymous users, a method for injecting malware into a surveillance target\u2019s computer for more directed surveillance, and a friendly web interface. Luckily, Weaver realized, he already had off-the-shelf equipment that met the criteria.<\/p>\n<p>\u201cWhen the Snowden stuff came out, I looked at the documents and said, \u2018Hey they\u2019re doing what I do. It\u2019s literally the same [as the security research] I\u2019ve been doing for a decade,&#8217;\u201d Weaver told WIRED.<\/p>\n<p>Speaking to WIRED in advance of a presentation he\u2019s giving today about his system at the <a href=\"https:\/\/www.usenix.org\/conference\/enigma2016\">Enigma security conference<\/a> in San Francisco, he described the components needed to emulate the spy agency.<\/p>\n<h3>Surveillance Tech Is \u2018Banal and Basic\u2019<\/h3>\n<p>Although the US intelligence community likes to operate under the notion that its systems are NOBUS (Nobody But Us), meaning its technologies are unique to the United States, Weaver says the reality is the opposite when it comes to surveillance technology. \u201cIt\u2019s very banal and very basic, it\u2019s very well-understood technology, and \u2026 there\u2019s really nothing new,\u201d he says.<\/p>\n<p>The NSA\u2019s super-secret surveillance system, in fact, works very much the way off-the-shelf intrusion detection systems (IDS) function: With these systems, when a data packet arrives to a network, a high-volume filter separates garbage traffic from the important traffic and passes the latter to a<a href=\"https:\/\/en.wikipedia.org\/wiki\/Load_balancing_(computing)\">load balancer<\/a>, which distributes data to a number of servers. In this case, it distributes the data to network intrusion detection nodes or devices. The IDS nodes then parse the traffic to determine if it\u2019s benign or malicious and make decisions about what to do based on those conclusions, such as blocking the traffic if it\u2019s malicious and issuing an alert to administrators.<\/p>\n<h3>DIY Surveillance<\/h3>\n<p>Following the same general design, Weaver developed a home-grown surveillance system that took less than a week to construct. To approximate a filter and load balancer, he used <a href=\"http:\/\/www.networkworld.com\/article\/2202144\/data-center\/faq--what-is-openflow-and-why-is-it-needed-.html\">OpenFlow<\/a>, a protocol for managing and directing traffic among routers and switches on a network. For his intrusion detection system, he used the <a href=\"https:\/\/www.bro.org\/\">Bro Network Security Monitor<\/a>, an open-source framework developed by Vern Paxson, a fellow computer scientist at UC Berkeley. He had to write scripts to do things like extract the cookies in web traffic and parse out usernames from traffic, but this was minimal work.<\/p>\n<p>Those looking to do more robust backbone monitoring and data parsing like the NSA does could opt instead for<br \/>\n&lt;href=&#8221;https: www.vortexsystems.us&#8221;=&#8221;&#8221;&gt;Vortex, an IDS <a href=\"https:\/\/github.com\/lmco\">that the US defense contractor Lockheed Martin<\/a> developed and released for free on GitHub. Weaver thinks, in fact, that the NSA\u2019s XKEYSCORE system probably began its life as Lockheed Martin\u2019s Vortex, based on XKEYSCORE system features described in the Snowden documents.<\/p>\n<p>Read the Original Article at<strong><a href=\"http:\/\/www.wired.com\/2016\/01\/how-to-make-your-own-nsa-bulk-surveillance-system\/?mbid=nl_12716\"> Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency\u2019s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,1317,4126,883,1814,65,3712],"tags":[4125,4127,4128,183,4129,1839,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11160"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=11160"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11160\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=11160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=11160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=11160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}