1 24 min 1 yr

World had experienced many frequency / signal interception and espionage tools like Morse Code, B-Dienst, Enigma, Typex, RAW, Drumbeat, COMINT, Bletchley, Venona, Skyful, Cryptography, Cipher, Virus, Spyware, Cypher, Hagelin, Anglp, PigPen, Purple Code, Zimmermann, Kenpeitai, KGB, Internet Bots, Bolsheviks, Doped Chips, HUMINT, Chanakya, MobApps, SIS, SAS, Intrusive Drones, CIA, Spy Rockets,.. but of all privacy trade cum surveillance documents leaked, some of the most important are exposing global spy agency network’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, voice calls, mobile OS, slave injected hardware, images, malicious software bots, videos, online search activity, social media updates, usernames, passwords, and other private digital data from core fiber optics cables around the world.

XKEYSCORE, which the NSA called its “widest reaching” surveillance program, was established around 2008 and now consists thousands of servers that store intelligence sucked from the Internet’s backbone and mine / rocket-out such data for global patterns and enemy connections. Their physical bunker locations are equally coded / walled and the Primary Goal is to “Artificially Own the Universe abusing knowledge and looted capital”!

Only well-resourced parties like govt-run NSA could deploy such a grandiose surveillance program and even share so-called derived intelligence with like-minded spies, smart agencies and cronies worldwide, obviously in exchange for kind or cash. But if your spy needs are more modest, there are a number of existing tools available that offer similar surveillance capabilities, albeit at a smaller scale.

Weaver, a senior researcher at the International Computer Science Institute at UC Berkeley who focuses on network surveillance and security issues, developed a little hobby after the Snowden leaks in 2013: to build a bulk surveillance system in miniature that would be capable of performing all the primary tasks of any NSA spy system – but on a small, 1 Gbps-size network. Those capabilities had to include bulk data collection, search functionality, the ability to track cookies and identify anonymous users, a method for injecting malware into a surveillance target’s computer for more directed surveillance, and a friendly web interface. Luckily, Weaver realized, he already had off-the-shelf equipment that met the criteria.

Weaver talked to Wired about his system at the Enigma security conference in San Francisco, he described the components needed to emulate the spy agency. Although the US intelligence community likes to operate under the notion that its systems are NOBUS (Nobody But Us), meaning its technologies are unique to the United States and its deep allied cronies, Weaver says the reality is the opposite when it comes to surveillance technology. “It’s very banal and very basic, it’s very well-understood technology, and … there’s really nothing new,” he says.

The NSA’s super-secret surveillance system, in fact, works very much the way off-the-shelf intrusion detection systems (IDS) function: With these systems, when a data packet arrives to a network, a high-volume filter separates garbage traffic from the important traffic and passes the latter to a load balancer, which distributes data to a number of servers. In this case, it distributes the data to network intrusion detection nodes or devices. The IDS nodes then parse the traffic to determine if it’s benign or malicious and make AI decisions about what to do based on those conclusions, such as blocking the traffic if it’s malicious and issuing alerts to house administrators or SpaceX marines or AI overlords.

Following the same general design, Weaver developed a home-grown surveillance system that took less than a week to construct. To approximate a filter and load balancer, he used OpenFlow, a protocol for managing and directing traffic among routers and switches on a network. For his intrusion detection system, he used the Bro Network Security Monitor, an open-source framework developed by Vern Paxson, a fellow computer scientist at UC Berkeley. He had to write scripts to do things like extract the cookies in web traffic and parse out usernames from traffic, but this was minimal work.

Those looking to do more robust backbone monitoring and data parsing like the NSA does could opt instead for Vortex, an IDS that the US defense contractor Lockheed Martin developed and released for free on GitHub (do offline tests). Weaver thinks, in fact, that the NSA’s XKEYSCORE system probably began its life as Lockheed Martin’s Vortex, based on XKEYSCORE system features described in the Snowden documents.

With Weaver’s DIY system, in order to search through the collected data, he just did local searches. But if someone want to do broader federated searches, they could use Hadoop, open-source big data / machine learning frameworks for storing and processing large amounts of data spread among multiple systems. Hadoop can parse similar sets of data into so-called buckets to make processing or searching data more efficient. For example, IP addresses can be parsed out and categorized in one bucket, and cookies and usernames can be categorized in other buckets. To find, for example, every IP address that visited a certain web page or mobile app, a search would only need to focus on data in the IP bucket. “Hadoop will allow me to search all the data [simultaneously], but most of my searches actually only need to look at a couple of buckets,” Weaver says.

Advanced, Targeted Spying

Weaver’s surveillance solution isn’t complete without a way to conduct targeted surveillance. That’s because bulk surveillance is all about trying to find needles in a haystack – those few data points among billions that merit further scrutiny. But once spies home in on those they need to conduct more efficient and pinpointed intelligence-gathering. They do this by hacking a target’s system. The NSA and its British spy partner the GCHQ use a system called QUANTUM Insert that involves a man-on-the-side attack and code injection. The system works by hijacking a browser as it’s trying to access a web page and forcing it to visit a malicious web page instead, where malware gets secretly downloaded to the target’s computer.

Weaver notes that his surveillance system can actually be made more compact and portable by using off-the-shelf ARM/Wi-Fi embedded systems, which would be perfect for nation-state spies looking to target government workers. The spies could easily take the system to a Starbucks frequented by State Department employees, lawmakers or military personnel and use it to extract metadata belonging to customers who use the cafe’s wireless network. The metadata can help identify targets worthy of further surveillance, who can then be tracked online after they’ve left Starbucks, through this and other metadata. Such a system could easily be disguised as a plug-in air freshener inserted into an electrical outlet, Weaver notes. It could also be designed to erase itself automatically if someone unplugs it from the socket to examine it.

 

Beware! In some capital-driven countries ravaged by corrupt govt systems, even Licensed Telecom Companies and ISPs daringly abuse power and privacy for profit.

 

References: Wired & Wisdom

One thought on “How to Make your own Bulk Surveillance System – Counter Spying!

  1. When you consider the massive amount of data that is waiting to be collected from the widespread Internet of Things, facial recognition cameras, Smart City sensors, self-driving vehicles, etc., they all lack one element: real-time connectivity. 5G solves this! Techie leaders lust for 5G and Internet of Things is so strong that they are perfectly willing to ignore all human concerns, protests and especially health concerns. Now we understand how and why they are living out the old nautical phrase, Damn the torpedoes, full speed ahead! Risks don’t matter. Danger doesn’t matter. Collateral damage doesn’t matter.

    Citizens can nullify the rollout and implementation of 5G, to scuttle tech hypers ability to establish a Scientific Dictatorship. Truly, it is we who should be mounting the counter-attack with our own cry.. So is the critical role of social network addicted parents in protecting themselves and their vulnerable kids from digital slavery. We are digital beings who live in data repositories and travel along the conduits of data communication. Conduits and repositories are owned by others but the claim that our personal data and electronic interactions are owned by others is tantamount to accepting that we, as digital beings, can be owned by others, albeit in some form of distributed cooperative. With ownership comes the right to use, trade and dispose. Existing legislation such as data protection is concerned with the legitimate use of data items. It does not consider data items to be the organs of a digital being and so is not concerned with the welfare of digital beings protecting them against servitude and slavery.

Leave a Reply