bti 7253: network security · temperanceeat not to dullness. drink not to elevation. silencespeak...

176
BTI 7253: Network Security Christian Grothoff BFH 1.3.2019 “The means of defense against foreign danger historically have become the instruments of tyranny at home.” –James Madison

Upload: others

Post on 26-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security

Christian Grothoff

BFH

1.3.2019

“The means of defense against foreign danger historically have become the instruments of tyranny at home.” –James Madison

Page 2: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Computer Security Dictionary

Hacking

Software vulnerabilities

Social Engineering

Skynet

Ethical case studies

Conclusion

BTI 7253: Network Security 1/160

Page 3: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part I: Motivation

BTI 7253: Network Security 2/160

Page 4: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Commercial tools: The crime fighting genie!

http://www.stealthgenie.com/ (6’2013)

BTI 7253: Network Security 3/160

Page 5: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Ethics

Ethics involves systematizing and recommending concepts of right and wrongconduct.

Meta-ethics What is the nature of moral judgements (universal, relative, nihilist)?Why should one be moral?

Normative ethics How can we answer ethical questions systematically?Applied ethics Provides answers to specific issues.

BTI 7253: Network Security 4/160

Page 6: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Normative ethics: Virtue ethics

Virtue ethics, advocated by Aristotle with some aspects being supported by SaintThomas Aquinas, focuses on the inherent character of a person rather than onspecific actions.

I Morality comes as a result of intrinsic virtues.I Plato’s Republic describes the Four Cardinal Virtues: wisdom, justice,

fortitude, and temperanceI Different people, cultures and societies often have different opinions on what

constitutes a virtue.I Debate on what specific virtues are morally praiseworthy continues.

BTI 7253: Network Security 5/160

Page 7: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Virtues

A virtue is a trait or quality that is deemed to be morally good and thus is valuedas a foundation of principle and good moral being.Examples:Clementia (mercy) mildness and gentleness, and the ability to set aside previous

transgressionsDisciplina (discipline) upholding the duties of citizenshipFrugalitas (frugality) economy and simplicity in lifestyle, without being miserlyIndustria (industriousness) hard workVeritas (truthfulness) honesty in dealing with others

BTI 7253: Network Security 6/160

Page 8: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Benjamin FranklinTemperance Eat not to Dullness. Drink not to Elevation.

Silence Speak not but what may benefit others or yourself. Avoid triflingConversation.

Order Let all your Things have their Places. Let each Part of your Businesshave its Time.

Resolution Resolve to perform what you ought. Perform without fail what youresolve.

Frugality Make no Expense but to do good to others or yourself; i.e. Wastenothing.

Industry Lose no Time. Be always employed in something useful. Cut off allunnecessary Actions.

Sincerity Use no hurtful Deceit. Think innocently and justly; and, if you speak,speak accordingly.

Justice Wrong none, by doing Injuries or omitting the Benefits that are yourDuty.

Moderation Avoid Extremes. Forbear resenting Injuries so much as you thinkthey deserve.

Cleanliness Tolerate no Uncleanness in Body, Clothes or Habitation.Tranquility Be not disturbed at Trifles, or at Accidents common or unavoidable.

Chastity Rarely use Venery but for Health or Offspring; Never to Dullness,Weakness, or the Injury of your own or another’s Peace orReputation.

Humility Imitate Jesus and Socrates.BTI 7253: Network Security 7/160

Page 9: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Virtues

Acceptance Accountability Altruism Ambition Aptitude Assertiveness AttentionAttractiveness Autonomy Awareness Balance Benevolence Calmness CandorCautiousness Chastity Charisma Charity Chivalry Citizenship CleanlinessCourage Commitment Compassion Confidence Conscientiousness ConsiderationContentment Continence Cooperativeness Courteousness Creativity CuriosityDependability Detachment Determination Diligence Discernment EmpathyEndurance Equanimity Fairness Faithfulness, Fidelity Freedom FriendlinessFrugality Flexibility Flourishing Foresight Forgiveness Generosity GentlenessGoodness Gratitude Helpfulness Honor Happiness Hope Hospitality HumilityHumor Impartiality Independence Individualism Industry Integrity InterestIntuition Inventiveness Justice Kindness Knowledge Leadership Liberty LogicLoyalty Meekness Mercy Mindfulness Moderation Modesty MoralityNonviolence Obedience Openness Optimism Order Orderliness OriginalityPatience Peacefulness Persistence Perseverance Philomathy Piety PolitenessPotential Prosperity Prudence Purity Reason Readiness Remembrance ResilienceRespectfulness Responsibility Restraint Respect Self-reliance Sensitivity ServiceSharing Sincerity Silence Social skills Solidarity Spirituality SportsmanshipStability Subsidiarity Tactfulness Temperance Tenacity Tolerance ThoughtfulnessTranquility Trustworthiness Understanding Uniqueness Unpretentiousness UnityVigilance Wealth Wisdom

BTI 7253: Network Security 8/160

Page 10: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Dante Alighieri’s seven deadly vices

I PrideI JealousyI WrathI SlothI Avarice (greed)I GluttonyI Lust

BTI 7253: Network Security 9/160

Page 11: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Normative ethics: Deontology

Deontology argues that decisions should be made considering the factors of one’sduties and one’s rights. Some deontological theories include:I Immanuel Kant’s Categorical Imperative, which roots morality in humanity’s

rational capacity and asserts certain inviolable moral laws.I The contractualism of John Rawls, which holds that the moral acts are those

that we would all agree to if we were unbiased.I Natural rights theories, such that of John Locke or Robert Nozick, which hold

that human beings have absolute, natural rights.Deontology thus holds that the morality of an action should be based on whetherthat action itself is right or wrong under a series of rules, and debates what therules should be.

BTI 7253: Network Security 10/160

Page 12: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Kant’s Categorical Imperative

“Act only according to that maxim by which you can also will that it wouldbecome a universal law.”

“Act in such a way that you treat humanity, whether in your own person or in theperson of any other, never merely as a means to an end, but always at the same

time as an end.”

BTI 7253: Network Security 11/160

Page 13: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Kant’s vs. Constant

I Benjamin Constant asserted that since truth telling must be universal,according to Kant’s theories, one must tell a known murderer the location ofher prey.

I Kant agreed with Constant’s inference, that from his premises one must infera moral duty not to lie to a murderer.

BTI 7253: Network Security 12/160

Page 14: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Kant’s vs. Constant

I Benjamin Constant asserted that since truth telling must be universal,according to Kant’s theories, one must tell a known murderer the location ofher prey.

I Kant agreed with Constant’s inference, that from his premises one must infera moral duty not to lie to a murderer.

BTI 7253: Network Security 12/160

Page 15: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Normative ethics: Utilitarianism

Consequentialism argues that the morality of an action is contingent on theaction’s outcome or result:I Utilitarianism holds that an action is right if it leads to the most happiness for

the greatest number of people.I Intellectualism dictates that the best action is the one that best fosters and

promotes knowledge.I Welfarism argues that the best action is the one that most increases economic

well-being or welfare.I Egoism is the belief that the moral person is the self-interested person: an

action is right if it maximizes good for the self.

BTI 7253: Network Security 13/160

Page 16: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Law and Ethics

I Set of written rules and associated sanctionsI Created by political process, enforced by law enforcementI Should codify “our” ethicsI Usually come with commentary and justifications

Example:

“Wer nicht mit hinreichender Sicherheit überschauen kann, welche ihn betref-fende Informationen in bestimmten Bereichen seiner sozialen Umwelt bekanntsind, und wer das Wissen möglicher Kommunikationspartner nicht einigermaßenabzuschätzen vermag, kann in seiner Freiheit wesentlich gehemmt werden, auseigener Selbstbestimmung zu planen oder zu entscheiden.”

—Bundesverfassungsgericht zum Volkszählungsurteil

BTI 7253: Network Security 14/160

Page 17: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

“Wir sind die Guten.” —Die Anstalt

BTI 7253: Network Security 15/160

Page 18: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part II: Computer Security Dictionary

BTI 7253: Network Security 16/160

Page 19: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Information Security

“Information security is concerned with the preservation of confidentiality,integrity and availability of information. In addition, properties such asauthenticity, accountability, non-repudiation and reliability can also be

involved.” –ISO/IEC 27000:2016 “Terms and definitions”

BTI 7253: Network Security 17/160

Page 20: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Information assets

Information has monetary value. Thus we speak about information assets:I A body of information, defined and managed as a single unit so it can be

understood, shared, protected and exploited effectivelyI An atomic piece of information that has a meaning/value to the organization

or the individualI Has a recognizable and manageable value, risk, content and lifecycle.

BTI 7253: Network Security 18/160

Page 21: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Information Security Objectives: CIA & AAA

Confidentiality VertraulichkeitIntegrity Richtigkeit

Availability VerfügbarkeitAuthenticity Echtheit / RechtsgültigkeitAccountability VerantwortlichkeitAuditability NachvollziehbarkeitNon-repudiation Nachweisbarkeit, Unleugbarkeit

BTI 7253: Network Security 19/160

Page 22: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Risk

r = v · p (1)

Risk is value (cost of potential damage) multiplied by the probability of thisdamage occurring.

I Risk analysis estimates v and p and for high r tries to find mitigations whichlower v or p.

I A materialized risk is one that has occurred (p = 100%). Reactive plansminimize the damage from materialized risks.

BTI 7253: Network Security 20/160

Page 23: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Vulnerability

Inability of a system to withstand the effects of a hostile environment.

BTI 7253: Network Security 21/160

Page 24: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Threat

Possible danger that might exploit a vulnerability.

BTI 7253: Network Security 22/160

Page 25: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attack

Attempt to expose, alter, disable, destroy, steal or gain unauthorized access to ormake unauthorized use of an information asset.

BTI 7253: Network Security 23/160

Page 26: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Exploit

Action that takes advantage of a vulnerability.

BTI 7253: Network Security 24/160

Page 27: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Information security incident

Event that could lead to loss of control over an information asset.

BTI 7253: Network Security 25/160

Page 28: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Cryptography

Practice and study of techniques for secure communication in the presence ofadversaries.

BTI 7253: Network Security 26/160

Page 29: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Overview

Cryptography

Confidentiality

Public-Key

Encryp-tion

BlockCiphers,StreamCiphers

Origin Non-Repudiation

EntityAuthentication

DigitalSignatures

Zero-Knowledge

Proofs

DataAuthentication

MAC Al-gorithms

HashFunctions

AE

BTI 7253: Network Security 27/160

Page 30: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Cryptographic primitives

Primitives are the building blocks for cryptographic protocols.

Cryptographic protocols (or cryptosystems) provide (useful?) functionality (e.g.authenticated encrypted communication).

BTI 7253: Network Security 28/160

Page 31: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Keys

Keys are short information assets used for certain cryptographic operations.

BTI 7253: Network Security 29/160

Page 32: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Kerckhoffs’ principle

A cryptosystem should be secure even if everything about the system, except thekey, is public knowledge.

BTI 7253: Network Security 30/160

Page 33: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Brute-force

A brute-force attack involves trying all the keys (until the one that works is found).

BTI 7253: Network Security 31/160

Page 34: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Entropy

Entropy describes the information content of a key or message.

A key with 128 bits of entropy requires 2128 brute-force attempts.

I Planck constant h = 6.626 · 10−34J(s).I Global annual electricity consumption: 6.4 · 1019J.I Total energy output of the Sun per year: 1.2 · 1034J.I Estimated total mass-energy of observable universe: 4 · 1069J.

BTI 7253: Network Security 32/160

Page 35: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Digital signatures

Cryptographic method to add non-repudiation and message integrity features toan information asset.

BTI 7253: Network Security 33/160

Page 36: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Encryption

Encryption is the process of encoding of a message in such a way that onlyauthorized parties can access (“decrypt”) it.

plaintext→ ciphertext→ plaintext

BTI 7253: Network Security 34/160

Page 37: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part III: Hacking

BTI 7253: Network Security 35/160

Page 38: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attacker origins

I InsiderI Ex-insider (“disgruntled former employee”)I CompetitorI HacktivistI CriminalI State actorI Researcher

BTI 7253: Network Security 36/160

Page 39: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attacker origins

I InsiderI Ex-insider (“disgruntled former employee”)I CompetitorI HacktivistI CriminalI State actorI Researcher

BTI 7253: Network Security 36/160

Page 40: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attacker objectives

I Stealing information (business secrets, credentials)I Modifying information (e.g. bank transactions)I Abusing infected systems (e.g. spamming)I Attacking other systems (origin obfuscation)I Hiding (avoid detection, achieve long-term persistence)I Contact command and control (C2) for instructions

BTI 7253: Network Security 37/160

Page 41: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Vulnerability origins

I Hardware (host, network)I Software (host, network)I HumansI Environment

BTI 7253: Network Security 38/160

Page 42: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Vulnerability origins

I Hardware (host, network)I Software (host, network)I HumansI Environment

BTI 7253: Network Security 38/160

Page 43: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attack strategies

I Large scale attack: attack a large, untargeted population. Even if the successrate is low, the absolute number of infections and the resulting revenue can behigh. (“cyber crime”)

I Targeted attack: attack a few, selected users or their machines. Selecthigh-value target first, then learn about it as much as possible for a precisionstrike (“Advanced persistent threat”)

BTI 7253: Network Security 39/160

Page 44: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Defense strategies

I Access control (physical, logical)I Deterrance (legal, counter-attacks, auditing, accounting)I RedundancyI ObfuscationI Comprehension (simplification, transparency, education)I Monkey wrench / havocI Defense-in-depth

BTI 7253: Network Security 40/160

Page 45: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Defense strategies

I Access control (physical, logical)I Deterrance (legal, counter-attacks, auditing, accounting)I RedundancyI ObfuscationI Comprehension (simplification, transparency, education)I Monkey wrench / havocI Defense-in-depth

BTI 7253: Network Security 40/160

Page 46: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part IV: Software vulnerabilities

BTI 7253: Network Security 41/160

Page 47: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Technical vulnerabilities

There are many types of technical vulnerabilities in various parts of an IT system:I Misconfigured firewallsI Hardware bugsI Automatically executed software from CD/USB stick on old W32 systemsI etc.

The probabily most important class of technical vulnerabilities are software bugs.

BTI 7253: Network Security 42/160

Page 48: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Typical bugs

Software is often used to display data obtained over the network:1. User downloads file (PDF, MP4, etc.)2. User selects software to open file3. Software parses file4. Bug⇒malicious code execution

Common bugs include problems in the parsing or rendering logic, or scriptingfunctionality supported by the document format in combination with aninterpreter that is insufficiently sandboxed.

BTI 7253: Network Security 43/160

Page 49: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Data and code

The central goal for an attack is to turn data into code. Memory of a processcontains data and code! Thus:I Existing code may interpret the data (intentionally or unintentionally),

thereby allowing certain code sequences to be executed.I Existing code may be caused to jump to the data (once data page is set to

executable).I Execution may be passed to another program (shell, interpreter) that will

parse and run it.

BTI 7253: Network Security 44/160

Page 50: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Example exploit: SQL injection

In a PHP script, hopefully far, far away:

SELECT (user, first_name, last_name)FROM studentsWHERE (user == ’$user’);

Input:

Robert’); DROP TABLE students;--

BTI 7253: Network Security 45/160

Page 51: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

XKCD

BTI 7253: Network Security 46/160

Page 52: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Vulnerability timeline

BTI 7253: Network Security 47/160

Page 53: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Capitalism

BTI 7253: Network Security 48/160

Page 54: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Let’s look at how the US professionals do it...

BTI 7253: Network Security 49/160

Page 55: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 50/160

Page 56: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 51/160

Page 57: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 52/160

Page 58: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 53/160

Page 59: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 54/160

Page 60: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Let’s look at how the IT professionals do it...

BTI 7253: Network Security 55/160

Page 61: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 56/160

Page 62: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part V: Social Engineering

BTI 7253: Network Security 57/160

Page 63: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Introducing the Joint Threat Research and Intelligence Group(JTRIG)

2.3 (...) Generally, the language of JTRIG’s operations is characterised by termssuch as “discredit”, promote “distrust”, “dissuade”, “deceive”, “disrupt”, “de-lay”, “deny”, “denigrate/degrade”, and “deter”.

http://www.statewatch.org/news/2015/jun/behavioural-science-support-for-jtrigs-effects.pdf

BTI 7253: Network Security 58/160

Page 64: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 59/160

Page 65: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 60/160

Page 66: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 61/160

Page 67: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Join Threat Research and Intelligence Group (JTRIG)

“3.2 Theories and research in the field of social psychology may prove particu-larly useful for informing JTRIG’s effects and online HUMINT operations. Thefollowing topics would be particularly relevant for social influence:I Social cognition (including social perception and attribution)I AttitudesI Persuasive communicationsI ConformityI ObedienceI Interpersonal relationshipsI Trust and distrustI Psychological profiling

In addition, the application of social psychological ideas to marketing and adver-tising would be useful.” —Behavioural Science Support for JTRIG’s Effects andOnline HUMINT Operations (2011)

http://www.statewatch.org/news/2015/jun/behavioural-science-support-for-jtrigs-effects.pdf

BTI 7253: Network Security 62/160

Page 68: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 63/160

Page 69: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 64/160

Page 70: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 65/160

Page 71: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 66/160

Page 72: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 67/160

Page 73: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Distraction principle

“While you are distracted by what retains your interest, hustlers can do anythingto you and you won’t notice.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 68/160

Page 74: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Herd principle

“Even suspicious marks will let their guard down when everyone next to themappears to share the same risks. Safety in numbers? Not if they’re all conspiringagainst you.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 69/160

Page 75: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Dishonesty principle

“Anything illegal you do will be used against you by the fraudster, making itharder for you to seek help once you realize you’ve been had.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 70/160

Page 76: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Deception princple

“Things and people are not what they seem. Hustlers know how to manipulateyou to make you believe that they are.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 71/160

Page 77: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Need and Greed principle

“Your needs and desires make you vulnerable. Once hustlers know what youreally want, they can easily manipulate you.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 72/160

Page 78: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Time principle

“When you are under time pressure to make an important choice, you use a dif-ferent decision strategy. Hustlers steer you towards a strategy involving lessreasoning.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

BTI 7253: Network Security 73/160

Page 79: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The Social Compliance principle / Authority

“Society trains people not to question authority. Hustlers exploit this ‘suspensionof suspiciousness’ to make you do what they want.”—Frank Stajano, Paul Wilson, UCAM-CL-TR-754

This is related to Cialdini’s principle of persuasion on Authority:

“People respect authority. They want to follow the lead of real experts. Businesstitles, impressive clothing, and even driving an expensive, high-performing auto-mobile are proven factors in lending credibility to any individual.” —Dr. RobertCialdini

BTI 7253: Network Security 74/160

Page 80: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Reciprocity

“The implication is you have to go first. Give something: give information, givefree samples, give a positive experience to people and they will want to give yousomething in return.” —Dr. Robert Cialdini

BTI 7253: Network Security 75/160

Page 81: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Consistency

“People do not like to back out of deals. We’re more likely to do something afterwe’ve agreed to it verbally or in writing. People strive for consistency in theircommitments. They also prefer to follow pre-existing attitudes, values and ac-tions.” —Dr. Robert Cialdini

BTI 7253: Network Security 76/160

Page 82: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Liking — The Flattery Principle (?)

“People prefer to say ‘yes’ to those they know and like.” —Dr. Robert Cialdini

BTI 7253: Network Security 77/160

Page 83: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 78/160

Page 84: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

JTRIG “Collection” Tools

AIRWOLF Youtube profile, command and video collection.BIRDSTRIKE Twitter monitoring and profile collection.SPRING BISHOP Find private photographs of targets on Facebook.FUSEWIRE Provides 24/7 monitoring of forums for target postings/online

activity. Also allows staggered postings to be made.BIRDSONG Automated posting of Twitter updates.SYLVESTER Framework for automated interaction / alias management on online

social networks.

BTI 7253: Network Security 79/160

Page 85: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

JTRIG “Effects” Capabilities

CLEAN SWEEP Masquerade Facebook wall posts for individuals or entirecountries

BOMB BAY is the capability to increase website hits/rankings.UNDERPASS Change outcome of online pollsGESTATOR amplification of a given message, normally video, on popular

multimedia websites.PITBULL enabling large scale delivery of a tailored message to users of instant

messaging services.BADGER mass delivery of email messaging to support an information

operations campaign.WARPATH mass delivery of SMS messages to support an information operations

campaign.CANNONBALL is the capability to send repeated text messages to a single

target.BURLESQUE is the capability to send spoofed SMS text messages.SCRAPHEAP CHALLENGE Perfect spoofing of emails from Blackberry targets

BTI 7253: Network Security 80/160

Page 86: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

JTRIG “Effects” Capabilities

CHINESE FIRECRACKER overt brute login attempts against online forums.TORNADO ALLEY delivery method that can silently extract and run an

executable on a target’s machineSWAMP DONKEY silently locate files and encrypt them on a target’s machine.ANGRY PIRATE permanently disables target’s account on their computer.PREDATORS FACE Targeted denial of service against Web servers.ROLLING THUNDER Distributed denial of service using P2P.SILENT MOVIE Targeted denial of service against SSH servers.VIPERS TONGUE silently denial of service calls on a Satellite or GSM phone

BTI 7253: Network Security 81/160

Page 87: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The world is interdisciplinary

I MarketingI PoliticsI PsychologyI Computer scienceI StatisticsI WarfareI GamificationI Espionage

BTI 7253: Network Security 82/160

Page 88: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Five-Eye Victims

I United NationsI European UnionI UK (listed by GCHQ as an operations area!)I Argentina (Falklands)I Zimbabwe (“regime change”)I Africa (listed by GCHQ as a “country”)I Leaders of colonies (Hollande, Sarkozy, Merkel)I Amnesty InternationalI GreenpeaceI Journalists (Spiegel, Wikileaks)I Torrorists (Sebastian Hahn)I Occupy activists

I plus 9:10 unintended targets1

1

BTI 7253: Network Security 83/160

Page 89: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Five-Eye Victims

I United NationsI European UnionI UK (listed by GCHQ as an operations area!)I Argentina (Falklands)I Zimbabwe (“regime change”)I Africa (listed by GCHQ as a “country”)I Leaders of colonies (Hollande, Sarkozy, Merkel)I Amnesty InternationalI GreenpeaceI Journalists (Spiegel, Wikileaks)I Torrorists (Sebastian Hahn)I Occupy activistsI plus 9:10 unintended targets1

1http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html

BTI 7253: Network Security 83/160

Page 90: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Summary

GCHQ paid to train 150+ staff to perform arange of criminal acts:I Technical: manipulate messages, censor

access, spam with informationI Psychological: depriviation, emotional

distress, deception, abuse of authoritywith victims in other countries but alsodomestic to further UK political agenda:I overthrow governmentsI stiffle dissentI provide economic advantages

BTI 7253: Network Security 84/160

Page 91: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The UK merely joins the clubI Salutin Putin: inside a Russian troll house2

I Ukraine’s new online army in media war with Russia3

I Congress vs BJP: The curious case of trolls and politics4

I China’s Paid Trolls: Meet the 50-Cent Party5

“Das ist das Geheimnis der Propaganda; den, den die Propaganda fassen will,ganz mit den Ideen der Propaganda zu durchtränken, ohne dass er überhauptmerkt, dass er durchtränkt wird.”

—Joseph Goebbels

“Propaganda techniques include: Using stereotypes; substituting names/labelsfor neutral ones; censorship or systematic selection of information; repetition; as-sertions without arguments; and presenting a message for and against a subject.”

—TOP SECRET JTRIG Report on Behavioural Science2http://www.theguardian.com/world/2015/apr/02/

putin-kremlin-inside-russian-troll-house3http://www.bbc.co.uk/monitoring/

ukraines-new-online-army-in-media-war-with-russia4http://timesofindia.indiatimes.com/india/

Congress-vs-BJP-The-curious-case-of-trolls-and-politics/articleshow/23970818.cms

5http://www.newstatesman.com/politics/politics/2012/10/china%E2%80%99s-paid-trolls-meet-50-cent-party

BTI 7253: Network Security 85/160

Page 92: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part VI: Skynet

BTI 7253: Network Security 86/160

Page 93: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Statistics

I mathematical techniques for drawing general conclusions from data samplesI means, medians, distributions, samples, significance, biasI resulting aggregates may have meaning, or notI no hard assurances about individual inputs, only probabilities

BTI 7253: Network Security 87/160

Page 94: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Machine Learning

We have too much (statistical) data for humans to determine which ones havemeaning, so:I Ask computer to figure out which inputs matter!I Different techniques:

I Supervised learning: given example inputs and desired outputs, derive “generalrule”

I Unsupervised learning: find hidden structure in dataI Reinforecment learning: algorithm selects actions, receives feedback based on

result(s)

I Shared outcome: data in, statistical predictors out

BTI 7253: Network Security 88/160

Page 95: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Computer Security, Machine Learning & IoT

(8’2018)

BTI 7253: Network Security 89/160

Page 96: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part VII: Real-World Applications

BTI 7253: Network Security 90/160

Page 97: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Societal control technology: Analytics

-

BTI 7253: Network Security 91/160

Page 98: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 92/160

Page 99: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 93/160

Page 100: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 94/160

Page 101: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 95/160

Page 102: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 96/160

Page 103: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 97/160

Page 104: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 98/160

Page 105: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 99/160

Page 106: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

BTI 7253: Network Security 100/160

Page 107: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

192 Million people live in Pakistan.I 0.18% of the Pakistani population = 343,800 innocent citizensI 0.008% of the Pakistani population = 15,280 innocent citizens

This is with half of AQSL couriers surviving the genocide.

“We kill based on metadata.”—Michael Hayden (former NSA & CIA director)

BTI 7253: Network Security 101/160

Page 108: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

192 Million people live in Pakistan.I 0.18% of the Pakistani population = 343,800 innocent citizensI 0.008% of the Pakistani population = 15,280 innocent citizens

This is with half of AQSL couriers surviving the genocide.

“We kill based on metadata.”—Michael Hayden (former NSA & CIA director)

BTI 7253: Network Security 101/160

Page 109: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The NSA mathematician’s presentation only gives the percentages.

Compartmentalization is an unconscious psychological defense mechanism usedto avoid cognitive dissonance, or the mental discomfort and anxiety caused by aperson’s having conflicting values, cognitions, emotions, beliefs, etc. withinthemselves.

BTI 7253: Network Security 102/160

Page 110: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Compartmentalization

The NSA mathematician’s presentation only gives the percentages.

Compartmentalization is an unconscious psychological defense mechanism usedto avoid cognitive dissonance, or the mental discomfort and anxiety caused by aperson’s having conflicting values, cognitions, emotions, beliefs, etc. withinthemselves.

BTI 7253: Network Security 102/160

Page 111: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Meta Data

Suppose Alice and Bob communicate using encryption.

What can Eve still learn here?

Eve cannot read the data Alice and Bob are sending, but:I Eve knows that Alice and Bob are communicating.I Eve knows the amount of data they are sending and can observe patterns.⇒ Patterns may even allow Eve to figure out the data

BTI 7253: Network Security 103/160

Page 112: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Meta Data

Suppose Alice and Bob communicate using encryption.

What can Eve still learn here?

Eve cannot read the data Alice and Bob are sending, but:I Eve knows that Alice and Bob are communicating.I Eve knows the amount of data they are sending and can observe patterns.⇒ Patterns may even allow Eve to figure out the data

BTI 7253: Network Security 103/160

Page 113: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

How Much does TLS leak?

“We present a traffic analysis attack against over 6000 webpages spanning theHTTPS deployments of 10 widely used, industry-leading websites in areas such as

healthcare, finance, legal services and streaming video. Our attack identifiesindividual pages in the same website with 89% accuracy, exposing personaldetails including medical conditions, financial and legal affairs and sexual

orientation. We examine evaluation methodology and reveal accuracy variationsas large as 18% caused by assumptions affecting caching and cookies.” [?]

BTI 7253: Network Security 104/160

Page 114: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

https://www.youtube.com/watch?v=V2rVYvylvZc (5’2014)

Page 115: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Definitions

Merriam-Webster:1. not named or identified: “an anonymous author”, “they wish to remain

anonymous”2. of unknown authorship or origin: “an anonymous tip”3. lacking individuality, distinction, or recognizability: “the anonymous faces in

the crowd”, “the gray anonymous streets” – William Styron

BTI 7253: Network Security 106/160

Page 116: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Definitions

Andreas Pfitzmann et. al.:

“Anonymity is the state of being not identifiablewithin a set of subjects, the anonymity set.”

EFF:

“Instead of using their true names to communicate, (...) people choose to speakusing pseudonyms (assumed names) or anonymously (no name at all).”

Mine:

A user’s action is anonymous if the adversary cannot link the action to theuser’s identity

BTI 7253: Network Security 107/160

Page 117: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Definitions

Andreas Pfitzmann et. al.:

“Anonymity is the state of being not identifiablewithin a set of subjects, the anonymity set.”

EFF:

“Instead of using their true names to communicate, (...) people choose to speakusing pseudonyms (assumed names) or anonymously (no name at all).”

Mine:

A user’s action is anonymous if the adversary cannot link the action to theuser’s identity

BTI 7253: Network Security 107/160

Page 118: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Definitions

Andreas Pfitzmann et. al.:

“Anonymity is the state of being not identifiablewithin a set of subjects, the anonymity set.”

EFF:

“Instead of using their true names to communicate, (...) people choose to speakusing pseudonyms (assumed names) or anonymously (no name at all).”

Mine:

A user’s action is anonymous if the adversary cannot link the action to theuser’s identity

BTI 7253: Network Security 107/160

Page 119: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

The user’s identity

includes personally identifiable information, such as:I real nameI fingerprintI passport numberI IP addressI MAC addressI login nameI ...

BTI 7253: Network Security 108/160

Page 120: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Actions

include:I Internet accessI speachI participation in demonstrationI purchase in a storeI walking across the streetI ...

BTI 7253: Network Security 109/160

Page 121: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity: Terminology

I Sender Anonymity: The initiator of a message is anonymous. However, theremay be a path back to the initiator.

?

I Receiver Anonymity: The receiver of a message is anonymous.

?

BTI 7253: Network Security 110/160

Page 122: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Pseudonymity

BTI 7253: Network Security 111/160

Page 123: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Pseudonymity

I A pseudonym is an identity for an entity in the system. It is a “false identity”and not the true identity of the holder of the pseudonym.

I Nobody, but (maybe) a trusted party may be able to link a pseudonym to thetrue identity of the holder of the pseudonym.

I A pseudonym can be tracked. We can observe its behaviour, but we do notlearn who it is.

BTI 7253: Network Security 112/160

Page 124: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Evaluating Anonymity

How much anonymity does a given system provide?I Number of known attacks?I Lowest complexity of successful attacks?I Information leaked through messages and maintenance procedures?I Number of users?

BTI 7253: Network Security 113/160

Page 125: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity: Basics

I Anonymity Set is the set of suspectsI Attacker computes a probability distribution describing the likelyhood of

each participant to be the responsible party.I Anonymity is the stronger, the larger the anonymity set and the more evenly

distributed the subjects within that set are.

BTI 7253: Network Security 114/160

Page 126: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Metric: Anonymity Set Size

Let U be the attacker’s probability distribution and pu = U(u) describing theprobability that user u ∈ Ψ is responsible.

ASS :=∑u∈Ψpu>0

1 (2)

BTI 7253: Network Security 115/160

Page 127: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Large Anonymity Sets

Examples of large anonymity sets:I Any human

I Any human with Internet accessI Any human speaking GermanI Any human speaking German with Internet access awake at 3am CEST

BTI 7253: Network Security 116/160

Page 128: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Large Anonymity Sets

Examples of large anonymity sets:I Any humanI Any human with Internet access

I Any human speaking GermanI Any human speaking German with Internet access awake at 3am CEST

BTI 7253: Network Security 116/160

Page 129: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Large Anonymity Sets

Examples of large anonymity sets:I Any humanI Any human with Internet accessI Any human speaking German

I Any human speaking German with Internet access awake at 3am CEST

BTI 7253: Network Security 116/160

Page 130: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Large Anonymity Sets

Examples of large anonymity sets:I Any humanI Any human with Internet accessI Any human speaking GermanI Any human speaking German with Internet access awake at 3am CEST

BTI 7253: Network Security 116/160

Page 131: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Metric: Maximum Likelihood

Let U be the attacker’s probability distribution describing the probability that useru ∈ Ψ is responsible.

ML := maxu∈Ψ

pu (3)

BTI 7253: Network Security 117/160

Page 132: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Metric: Maximum Likelihood

I For successful criminal prosecution in the US, the law requires ML close to 1(“beyond reasonable doubt”)

I For successful civil prosecution in the US, the law requires ML > 12 (“more

likely than not”)I For a given anonymity set, the best anonymity is achieved if

ML =1

ASS(4)

BTI 7253: Network Security 118/160

Page 133: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity Metric: Entropy

Let U be the attacker’s probability distribution describing the probability that useru ∈ Ψ is responsible. Define the effective size S of the anonymity distribution U tobe:

S := −∑u∈Ψ

pu log2 pu (5)

where pu = U(u).

BTI 7253: Network Security 119/160

Page 134: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Interpretation of Entropy

S = −∑u∈Ψ

pu log2 pu (6)

This is the expected number of bits of additional information that the attackerneeds to definitely identify the user (with absolute certainty).

BTI 7253: Network Security 120/160

Page 135: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Entropy Calculation Example

Suppose we have 101 suspects including Bob. Furthermore, suppose for Bob theattacker has a probability of 0.9 and for all the 100 other suspects the probability is0.001.

What is S?

I For 101 nodes Hmax = 6.7I

S = −100 · log2 0.0011000

− 9 · log2 0.910

(7)

≈ 0.9965 + 0.1368 (8)= 1.133... (9)

BTI 7253: Network Security 121/160

Page 136: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Entropy Calculation Example

Suppose we have 101 suspects including Bob. Furthermore, suppose for Bob theattacker has a probability of 0.9 and for all the 100 other suspects the probability is0.001.

What is S?

I For 101 nodes Hmax = 6.7I

S = −100 · log2 0.0011000

− 9 · log2 0.910

(7)

≈ 0.9965 + 0.1368 (8)= 1.133... (9)

BTI 7253: Network Security 121/160

Page 137: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Attacks to avoid

Hopeless situations include:I All nodes collaborate against the victimI All directly adjacent nodes collaborateI All non-collaborating adjacent nodes are made unreachable from the victimI The victim is required to prove his innocence

BTI 7253: Network Security 122/160

Page 138: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Economics & Anonymity

R. Dingledine and P. Syverson wrote about Open Issues in the Economics ofAnonymity:I Providing anonymity services has economic disincentives (DoS, legal liability)I Anonymity requires introducing inefficiencies⇒ Who pays for that?

The anonymizing server that has the best reputation (performance, most traffic) ispresumably compromised.

BTI 7253: Network Security 123/160

Page 139: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Economics & Anonymity

R. Dingledine and P. Syverson wrote about Open Issues in the Economics ofAnonymity:I Providing anonymity services has economic disincentives (DoS, legal liability)I Anonymity requires introducing inefficiencies⇒ Who pays for that?

The anonymizing server that has the best reputation (performance, most traffic) ispresumably compromised.

BTI 7253: Network Security 123/160

Page 140: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Anonymity: Dining Cryptographers

“Three cryptographers are sitting down to dinner. The waiter informs them thatthe bill will be paid anonymously. One of the cryptographers maybe paying fordinner, or it might be the NSA. The three cryptographers respect each other’s rightto make an anonymous payment, but they wonder if the NSA is paying.” – DavidChaum

BTI 7253: Network Security 124/160

Page 141: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

MixingDavid Chaum’s mix (1981) and cascades of mixes are the traditional basis fordestroying linkability:

BTI 7253: Network Security 125/160

Page 142: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

MixingDavid Chaum’s mix (1981) and cascades of mixes are the traditional basis fordestroying linkability:

BTI 7253: Network Security 126/160

Page 143: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Threshold Mix

BTI 7253: Network Security 127/160

Page 144: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Timed Mix

BTI 7253: Network Security 128/160

Page 145: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Pool mix

BTI 7253: Network Security 129/160

Page 146: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Break

BTI 7253: Network Security 130/160

Page 147: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Tor

I Tor is a P2P network of low-latency mixes which are used to provideanonymous communication between parties on the Internet.

I Tor works for any TCP-based protocolI TCP traffic enters the Tor network via a SOCKS proxyI Common usage: client anonymity for web browsing

BTI 7253: Network Security 131/160

Page 148: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Onion Routing

I Multiple mix serversI Path of mix servers chosen by initiatorI Chosen mix servers create “circuit”

I Initiator contacts first server S1, sets up symmetric key KS1

I Then asks first server to connect to second server S2; through this connectionsets up symmetric key with second server KS2

I ...I Repeat with server Si until circuit of desired length n constructed

BTI 7253: Network Security 132/160

Page 149: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Onion Routing Example

I Client sets up symmetric key KS1 with server S1

S1

S2

Client

Exchange

KS1

BTI 7253: Network Security 133/160

Page 150: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Onion Routing Example

I Via S1 Client sets up symmetric key KS2 with server S2

S1

S2

Client

Exchange

KS2

BTI 7253: Network Security 134/160

Page 151: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Onion Routing Example

I Client encrypts m as KS1(KS2(m)) and sends to S1

S1

S2

Client

(KS2

KS1

(m))

BTI 7253: Network Security 135/160

Page 152: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Onion Routing Example

I S1 decrypts, sends on to S2, S2 decrypts, revealing m

S1

S2

Client

(KS2

KS1

(m))KS

2(m)

BTI 7253: Network Security 136/160

Page 153: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Tor - How it Works

I Low latency P2P Network of mix serversI Designed for interactive traffic (https, ssh, etc.)I ”Directory Servers“ store list of participating servers

I Contact information, public keys, statisticsI Directory servers are replicated for security

I Clients choose servers randomly with bias towards high BW/uptimeI Clients build long lived Onion routes ”circuits“ using these serversI Circuits are bi-directionalI Circuits are of length three

BTI 7253: Network Security 137/160

Page 154: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Tor - How it Works - Example

I Example of Tor client circuit

Client

Server

Tor Node 1 Tor Node 2 Tor Node 3

Tor Node 4 Tor Node 5 Tor Node 6

Tor Node 7 Tor Node 8 Tor Node 9

BTI 7253: Network Security 138/160

Page 155: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Tor - How it Works - Servers

I Servers are classified into three categories for usability, security and operatorpreference

I Entry nodes (aka guards) - chosen for first hop in circuitI Generally long lived ”good“ nodesI Small set chosen by client which are used for client lifetime (security)

I Middle nodes - chosen for second hop in circuit, least restricted setI Exit nodes - last hop in circuit

I Visible to outside destinationI Support filtering of outgoing trafficI Most vulerable position of nodes

BTI 7253: Network Security 139/160

Page 156: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services in Tor

I Hidden services allow Tor servers to receive incoming connectionsanonymously

I Can provide access to services available only via TorI Web, IRC, etc.I For example, host a website without your ISP knowing

BTI 7253: Network Security 140/160

Page 157: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 1

BTI 7253: Network Security 141/160

Page 158: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 2

BTI 7253: Network Security 142/160

Page 159: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 3

BTI 7253: Network Security 143/160

Page 160: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 4

BTI 7253: Network Security 144/160

Page 161: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 5

BTI 7253: Network Security 145/160

Page 162: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hidden Services Example 6

BTI 7253: Network Security 146/160

Page 163: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Types of Attacks on Tor

I Exit Relay SnoopingI Website fingerprintingI Traffic AnalysisI Intersection AttackI DoS

BTI 7253: Network Security 147/160

Page 164: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Exercise

I Install TorI Configure Tor relayI Setup hidden serviceI Perform risk analysis for deanonymization

BTI 7253: Network Security 148/160

Page 165: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Part VIII: Ethical Case Studies

BTI 7253: Network Security 149/160

Page 166: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Objective

I Ethical case studies provide a systematic way to determine an ethical cause ofaction for a particular ethical problem

I Case studies are in-depth investigations of a question by a single person,group, event or community.

I Ethical case studies do not prescribe a particular ethical theory, rule set orvirtue order — you need to pick one!

I Ethical dilemmas are ethical problems where (seemingly) no ethical cause ofaction exists

BTI 7253: Network Security 150/160

Page 167: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Method

I Read and examine the case thoroughlyI Identify key problems:

I Why do the problems exist?I Which virtues and vices are implicated (at the center, or peripherally)?I Which laws or rules are implicated (at the center, or peripherally)?I What are the potential consequences (direct, indirect)?

I Uncover possible resolutions. Carefully consider the implications of those.I Propose an ethical resolution and justify it.I For dilemmas, propose strategies to avoid them in the future.

BTI 7253: Network Security 151/160

Page 168: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Deontology for computer scientists

BTI 7253: Network Security 152/160

Page 169: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Hacker ethics

“The hacker ethic refers to the feelings of right and wrong, to the ethical ideas thiscommunity of people had — that knowledge should be shared with other people

who can benefit from it, and that important resources should be utilized ratherthan wasted.” –Richard Stallman

Dr. Stallman will give a talk on “Computing, Freedom and Privacy” at the aula ofthe BFH Wednesday, May 15th at 16:30.

BTI 7253: Network Security 153/160

Page 170: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

General tenets (by Steven Levy)

I SharingI OpennessI DecentralizationI Free access to computersI World improvement

BTI 7253: Network Security 154/160

Page 171: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

CCC Hackerethik

I Der Zugang zu Computern und allem, was einem zeigen kann, wie dieseWelt funktioniert, sollte unbegrenzt und vollständig sein.

I Alle Informationen müssen frei sein.I Mißtraue Autoritäten — fördere Dezentralisierung.I Beurteile einen Hacker nach dem, was er tut, und nicht nach üblichen

Kriterien wie Aussehen, Alter, Herkunft, Spezies, Geschlecht odergesellschaftliche Stellung.

I Man kann mit einem Computer Kunst und Schönheit schaffen.I Computer können dein Leben zum Besseren verändern.I Mülle nicht in den Daten anderer Leute.I Öffentliche Daten nützen, private Daten schützen.

BTI 7253: Network Security 155/160

Page 172: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

IEEE Code of Ethics

1. to hold paramount the safety, health, and welfare of the public, to strive to comply with ethicaldesign and sustainable development practices, and to disclose promptly factors that mightendanger the public or the environment;

2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affectedparties when they do exist;

3. to be honest and realistic in stating claims or estimates based on available data;

4. to reject bribery in all its forms;

5. to improve the understanding by individuals and society of the capabilities and societalimplications of conventional and emerging technologies, including intelligent systems;

6. to maintain and improve our technical competence and to undertake technological tasks forothers only if qualified by training or experience, or after full disclosure of pertinent limitations;

7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors,and to credit properly the contributions of others;

8. to treat fairly all persons and to not engage in acts of discrimination based on race, religion,gender, disability, age, national origin, sexual orientation, gender identity, or gender expression;

9. to avoid injuring others, their property, reputation, or employment by false or malicious action;

10. to assist colleagues and co-workers in their professional development and to support them infollowing this code of ethics.

BTI 7253: Network Security 156/160

Page 173: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

More ethics guides

I https://ethics.acm.org/code-of-ethics/

I https://gi.de/ueber-uns/organisation/unsere-ethischen-leitlinien/

BTI 7253: Network Security 157/160

Page 174: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Case study: Track Me!

“A company is developing a new App allowing users to track their locations.With the explicit consent of the users, their location data is sent to the company’sdatabase which analyzes the travel patterns and alerts users if it predicts interest-ing events (traffic jams, environmental hazards, friends nearby) that are likely tobe useful to user in the future.”

BTI 7253: Network Security 158/160

Page 175: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Conclusion

We need to be careful about which technology we adopt.

BTI 7253: Network Security 159/160

Page 176: BTI 7253: Network Security · TemperanceEat not to Dullness. Drink not to Elevation. SilenceSpeak not but what may benefit others or yourself. Avoid trifling Conversation. OrderLet

Questions?

“The most unpardonable sin in society is independence of thought.” –Emma Goldman

BTI 7253: Network Security 160/160