The Snowden Affair”

Total Page:16

File Type:pdf, Size:1020Kb

The Snowden Affair” Lessons from “the Snowden Affair” @haroonmeer September 2014 What this talk is not IT DOESN’T MATTER CREST BUGSY CRISSCROSS A-PLUS BULLRUN DYNAMO GUMFISH LFS-2 CROSSBEAM ACRIDMINI BULLSEYE EBSR GURKHASSWORD LHR CROSSEYEDSLOTH AGILEVIEW BUMBLEBEEDANCE EDGEHILL HACIENDA LIFESAVER CRUMPET AGILITY BYSTANDER EINSTEIN HAMMERMILL LITHIUM CRYOSTAT AIGHANDLER BYZANTINEANCHOR ELATE HAPPYFOOT LOCKSTOCK CRYPTOENABLED AIRBAG BYZANTINEHADES ELEGANTCHAOS HAWKEYE LONGHAUL CULTWEAVE AIRGAP/COZEN CADENCE ENDUE HC12 LONGRUN CUSTOMS AIRWOLF CANDYGRAM ENTOURAGE HEADMOVIES LONGSHOT CYBERCOMMANDCONSOLE ALLIUMARCH CANNONLIGHT EVENINGEASEL HIGHCASTLE LOPERS CYCLONE ALTEREGOQFD CAPTIVATEDAUDIENCE EVILOLIVE HIGHLANDS LUMP DANCINGBEAR ANCESTRY CARBOY EWALK HIGHTIDE LUTEUSICARUS DANCINGOASIS ANCHORY CASPORT EXCALIBUR HOLLOWPOINT MADCAPOCELOT DAREDEVIL ANTICRISISGIRL CASTANET EXPOW HOMEBASE MAGNETIC DARKFIRE ANTOLPPROTOSSGUI CCDP FACELIFT HOMEPORTAL MAGNUMOPUS DARKQUEST APERTURESCIENCE CDRDIODE FAIRVIEW HOMINGPIGEON MAINCORE DARKTHUNDER AQUADOR CERBERUS FALLOUT HUSHPUPPY MAINWAY ARTEMIS CERBERUSSTATISTICSCOLLECTION! FASCIA HUSK MARINA DEADPOOL ARTIFICE CHALKFUN FASHIONCLEFT IBIS MAUI DEVILSHANDSHAKE ASPHALT CHANGELING FASTSCOPE ICE MESSIAH DIALD ASSOCIATION CHAOSOVERLORD FATYAK ICREACH METROTUBE DIKTER ASTRALPROJECTION CHASEFALCON FET ICREAST METTLESOME DIRTYEVIL AUTOSOURCE CHEWSTICK FISHBOWL IMP MINERALIZE DISCOROUTE AXLEGREASE CHIPPEWA FOGGYBOTTOM INCENSER MINIATUREHERO DISHFIRE BABYLON CHOCOLATESHIP FORESTWARRIOR INDRA MIRAGE DISTANTFOCUS BALLOONKNOT CIMBRI FOXACID INSPECTOR MIRROR DISTILLERY BANYAN CINEPLEX FOXSEARCH INTELINK MOBILEHOOVER DIVERSITY BEARSCRAPE COASTLINE FOXTRAIL INTERQUAKE MONKEYROCKET DOCKETDICTATE BEARTRAP COBALTFALCON FRA IRONSAND MONSTERMIND DOGCOLLAR BELLTOPPER CONDUIT FREEFLOW ISHTAR MOONLIGHTPATH DOGHANDLER BERRYTWISTER CONJECTURE FREEZEPOST JACKKNIFE MOONPENNY DRAGGABLEKITTEN BERRYTWISTER+ CONTRAOCTAVE FRONTO JAZZFUSION MOUTH DRAGON'SSHOUT BINOCULAR CONVEYANCE FRUITBOWL JAZZFUSION+ MTI DROPMIRE BIRDSONG CORALINE FUNNELOUT JEDI MUGSHOT DRTBOX BIRDSTRIKE CORALREEF FUSEWIRE JEEPFLEA MURPHYSLAW DRUID BLACKHEART COTRAVELER GALAXY JILES MUSCULAR PACKAGEGOODS BLACKPEARL OCTSKYWARD GAMUT JTRIG MUSKETEER PANOPLY BLARNEY OILSTOCK GARLICK JTRIGRADIANTSPLENDOURMUSTANG PARCHDUSK BLUEANCHOR OLYMPIA GENESIS JUGGERNAUT MUTANTBROTH PATHFINDER BLUEZEPHYR OMNIGAT GENTE KAMPUS MYSTIC PBX BOMBAYROLL ONEROOF GEOFUSION KEYRUT NAMEJACKER PHOTONTORPEDO BOTANICREALTY ONIONBREATH GHOSTMACHINE KOALAPUNCH NCSC PICASSO BOUNDLESSINFORMANTOPTICNERVE GILGAMESH LADYLOVE NEBULA PINWALE BRANDYSNAP ORANGEBLOSSOM GLASSBACK LANDINGPARTY NEVIS What do we learn from it ? What should we do differently? Caveat: It’s a short talk Best begin at.. http://www.theguardian.com/world/2013/jun/06/nsa- phone-records-verizon-court-order http://www.washingtonpost.com/investigations/us-intelligence-mining-data- from-nine-us-internet-companies-in-broad-secret-program/ 2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html The extent of the leak? How many documents? http://www.reuters.com/article/2013/11/14/us-usa-security-nsa- idUSBRE9AD19B20131114 http://www.reuters.com/article/2013/11/14/us-usa-security-nsa-idUSBRE9AD19B20131114 http://world.time.com/2013/10/14/greenwald-on-snowden-leaks-the-worst-is-yet-to-come/ http://www.bbc.com/news/uk-25205846 They had no idea what he had Would You ? Are your execs properly trained ? http://www.theguardian.com/environment/2014/jan/30/snowden- nsa-spying-copenhagen-climate-talks http://www.theguardian.com/environment/2014/jan/30/snowden- nsa-spying-copenhagen-climate-talks http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted- communications-g20-summits http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted- communications-g20-summits Attackers like that don’t care about me / us http://www.spiegel.de/international/europe/british-spy-agency- gchq-hacked-belgian-telecoms-firm-a-923406.html https://gigaom.com/2014/02/01/nsa-and-gchq-hacked-belgian- cryptographer-report/ https://gigaom.com/2014/02/01/nsa-and-gchq-hacked-belgian- cryptographer-report/ https://firstlook.org/theintercept/2014/09/14/nsa-stellar/ http://www.spiegel.de/international/world/snowden- documents-indicate-nsa-has-breached-deutsche- telekom-a-991503.html These guys were collateral damage Does collaboration protect you from getting hacked? http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/ 2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html How many times were they spotted ? Complete failure of detection & compartmentalisation http://www.verizonenterprise.com/DBIR/ The good news is… Do sophisticated attackers exist ? not estonia not headline sophisticated not estonia http://blog.thinkst.com/p/cyberwar-why-your-threat-model-is.html http://blog.thinkst.com/p/cyberwar-why-your-threat-model-is.html Do sophisticated attackers exist ? This is profoundly important Device Based Security Anti Virus Pen Tests we said victory accomplished Device based Security Anti Virus http://www.wired.com/2012/06/internet-security-fail/ Anti Virus http://www.wired.com/2012/06/internet-security-fail/ Pen Tests http://blog.thinkst.com/2012/03/penetration-testing-considered-harmful.html We are not modelling the right threats Were all the attacks novel? Nope.. Not even the ANT stuff Many of these techniques were previously demonstrated Why didn't you know about them? talk graph - tscapes Q2 - 116 Security Events 257 conference days http://thinkst.com/ts/free Will the leaks make things better or worse? Intelligence reforms may or may not happen.. ! but, from the point of view of sophisticated attacks Courage is Contagious life imitates.. Caveat This doesn’t apply to everyone! biggest mistake is thinking you are all the same.. http://blog.thinkst.com/2013/01/your-companies-security-posture-is.html Summary • If everything is important, nothing is important • Your execs need training! • Sophisticated attackers do exist • It’s obvious the emperor has no clothes. • Things are going to get a lot worse for a bit Summary of Summary Understand your threat model Understand the space @haroonmeer http://thinkst.com/ts/free.
Recommended publications
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • Exhibit a Case 3:16-Cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86
    Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 1 of 86 Exhibit A Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86 Executive Order 12333 United States Intelligence Activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 134 70 (2008)) PREAMBLE Timely, accurate, and insightful information about the activities, capabilities, plans, and intentions of foreign powers , organizations, and persons, and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence possible. For that purpose, by virtue of the authority vested in me by the Constitution and the laws of the United States of America, including the National Security Act of 1947, as amended, (Act) and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows: PART 1 Goals, Directions, Duties, and Responsibilities with Respect to United States Intelligence Efforts 1.1 Goals. The United States intelligence effort shall provide the President, the National Security Council, and the Homeland Security Council with the necessary information on which to base decisions concerning the development and conduct of foreign, defense, and economic policies, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal. (a} All means, consistent with applicable Federal law and this order, and with full consideration of the rights of United States persons, shall be used to obtain reliable intelligence information to protect the United States and its interests.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Jus Algoritmi: How the NSA Remade Citizenship
    Extended Abstract Jus Algoritmi: How the NSA Remade Citizenship John Cheney-Lippold 1 1 University of Michigan / 500 S State St, Ann Arbor, MI 48109, United States of America / [email protected] Introduction It was the summer of 2013, and two discrete events were making analogous waves. First, Italy’s Minister for Integration, Cécile Kyenge was pushing for a change in the country’s citizenship laws. After a decades-long influx of immigrants from Asia, Africa, and Eastern Europe, the country’s demographic identity had become multicultural. In the face of growing neo-nationalist fascist movements in Europe, Kyenge pushed for a redefinition of Italian citizenship. She asked the state to abandon its practice of jus sanguinis, or citizenship rights by blood, and to adopt a practice of jus soli, or citizenship rights by landed birth. Second, Edward Snowden fled the United States and leaked to journalists hundreds of thousands of classified documents from the National Security Agency regarding its global surveillance and data mining programs. These materials unearthed the classified specifics of how billions of people’s data and personal details were being recorded and processed by an intergovernmental surveillant assemblage. These two moments are connected by more than time. They are both making radical moves in debates around citizenship, though one is obvious while the other remains furtive. In Italy, this debate is heavily ethnicized and racialized. According to jus sanguinis, to be a legitimate part of the Italian body politic is to have Italian blood running in your veins. Italian meant white. Italian meant ethnic- Italian. Italian meant Catholic.
    [Show full text]
  • PRISM/US-984XN Overview
    TOP SFCRF.T//SI//ORCON//NOFORX a msn Hotmail Go« „ paltalk™n- Youffl facebook Gr-iai! AOL b mail & PRISM/US-984XN Overview OR The SIGAD Used Most in NSA Reporting Overview PRISM Collection Manager, S35333 Derived From: NSA/CSSM 1-52 April 20L-3 Dated: 20070108 Declassify On: 20360901 TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK ® msnV Hotmail ^ paltalk.com Youi Google Ccnmj<K8t« Be>cnö Wxd6 facebook / ^ AU • GM i! AOL mail ty GOOglC ( TS//SI//NF) Introduction ILS. as World's Telecommunications Backbone Much of the world's communications flow through the U.S. • A target's phone call, e-mail or chat will take the cheapest path, not the physically most direct path - you can't always predict the path. • Your target's communications could easily be flowing into and through the U.S. International Internet Regional Bandwidth Capacity in 2011 Source: Telegeographv Research TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEQBN Hotmail msn Google ^iïftvgm paltalk™m YouSM) facebook Gm i ¡1 ^ ^ M V^fc i v w*jr ComnuMcatiw Bemm ^mmtmm fcyGooglc AOL & mail  xr^ (TS//SI//NF) FAA702 Operations U « '«PRISM/ -A Two Types of Collection 7 T vv Upstream •Collection of ;ommujai£ations on fiber You Should Use Both PRISM • Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google Facebook, PalTalk, AOL, Skype, YouTube Apple. TOP SECRET//SI//ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK Hotmail ® MM msn Google paltalk.com YOUE f^AVi r/irmiVAlfCcmmjotal«f Rhnnl'MirBe>coo WxdS6 GM i! facebook • ty Google AOL & mail Jk (TS//SI//NF) FAA702 Operations V Lfte 5o/7?: PRISM vs.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • E-Mails from Inside the NSA Bureaucracy
    7/28/2016 Electrospaces.net 6 More Next Blog» Create Blog Sign In June 24, 2016 Welcome to Electrospaces.net! Here you can read about: E-mails from inside the NSA bureaucracy - Signals Intelligence (SIGINT), - Communications Security (COMSEC), Earlier this month, the NSA declassified a huge set of internal e-mails, following FOIA- - Information Classification, requests about the issue of whether Edward Snowden had raised concerns about the and also about the equipment, from NSA's surveillance programs through proper channels inside the agency. past and present, which make that civilian and military leaders can > Download the declassified e-mails (very large pdf) communicate in order to fulfill their duties. Here, we will take a look at the administrative details these internal NSA e-mails The main focus will be on the United provide. Next time we will see what their content says about the concerns that States and its National Security Snowden claimed to have raised. Agency (NSA), but attention will also be paid to other countries and subjects. Any comments, additions, corrections, questions or suggestions will be very appreciated! There's no login or registration required for commenting. twitter.com/electrospaces info (at) electrospaces.net PGP Public Key ID: FD9FD4E6 The postings on this weblog are updated frequently as new information about the NSA is still being revealed. Therefore, revisit this weblog and check the articles for updates! Index of all postings Internal e-mail from NSA director Michael Rogers. In the signature block we see his NSANet and SIPRNet e-mail addresses and his non-secure phone number (all redacted) (Click to enlarge - See also: NSA director Alexander's phones) Recent Posts E-mails from inside the NSA bureaucracy E-mail addresses German journalists about working with the Snowden documents http://electrospaces.blogspot.dk/ 1/18 7/28/2016 Electrospaces.net Except from the classification markings, the NSA's internal e-mails aren't very different from those exchanged by most other people around the world.
    [Show full text]
  • İSTİHBARATIN TEŞKİLATLANMA Ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ
    T.C. İSTANBUL ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ SİYASET BİLİMİ VE KAMU YÖNETİMİ ANABİLİM DALI YÜKSEK LİSANS TEZİ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK 2501110836 TEZ DANIŞMANI DOÇ. DR Pelin Pınar GİRİTLİOĞLU İSTANBUL - 2019 ÖZ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK Günümüzde teknolojinin gelişimi ve küreselleşme dünyayı uçtan uca değiştirdi. Toplumlar ve ülkeler birbiri ile etkileşime geçtikçe bireysel özgürlükler ve demokrasi konusunda hassas alanlar giderek artmaktadır. Bu etkileşim ülkelerin güvenliğini ve bireysel özgürlük alanlarınıda etkilemektedir. Bu hızlı değişime karşın ülkeler geçmişin soğuk savaş anlayışı ve güvenlik hassasiyetlerini de aynı zamanda taşımaya devam etmektedirler. Gelişmiş demokrasilere sahip ülkelerin başında gelen Amerika Birleşik Devletleri’nde (ABD) mevcut güvenlik ve istihbarat anlayışı, faaliyetleri ve denetimi işte bu çatışmanın uzun sürede meydana geldiği denge üzerine kuruludur. ABD açısından istihbarat teşkilatlanma süreci yeni problemler, hak arayışları, çatışma ve çözümler doğurmaktadır. Tüm bunların ışığında bu tezin temel amacı istihbarat problemlerini ABD istihbarat teşkilatlanma süreci üzerinden analiz edip karşılaşılan problemleri neden sonuç ilişkisi içerisinde tespit etmektir. Bu çalışmada Amerika Birleşik Devletleri’nde istihbaratın yönetim modeli, teşkilatlanması ve hukuki alt yapısı incelenmiştir. Birinci bölümde kavramsal anlamda istihbarat incelemesi literatüre önemli bir katkı olarak görülebilir. İkinci bölümde
    [Show full text]
  • Content Acquisition Optimization
    TOP SECRET//SI//NOFORN Special Source Operations Content Acquisition Optimization TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Yahoo Webmessenger 4'1?Ario • Update data sent to individuals logged into Yahoo's Instant Messenger service online — Online contact status, unread emails in Yahoo inbox — Usually small sessions (2-4kB) • Sporadic collection (30,000 — 60,000 sessions per day) • Intermittent bursts of collection against contacts of targets — Large numbers of sessions (20,000+) against a single targeted selector — Not collected against the target (online presence/unread email from target) — No owner attribution (metadata value limited to fact-of comms for emails, online presence events for buddies) • Over a dozen selectors detasked in two weeks — Because a target's contact was using/idling on Yahoo Webmessenger — Several very timely selectors (Libyan transition, Greek financial related) TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books 4'1?Ario • Email address books for most major webmail are collected as stand-alone sessions (no content present*) • Address books are repetitive, large, and metadata-rich • Data is stored multiple times (MARINA/MAINWAY, PINWALE, CLOUDs) • Fewer and fewer address books attributable to users, targets • Address books account for — 22% of SSO's major accesses (up from — 12% in August) Access (10 Jan 12) Total Sessions Address Books - Provider Collected Attributed Attributed% US-3171 1488453 237067 (16% of traffic) Yahoo 444743 11009 2.48% DS-200B 938378 311113 (33% of traffic) Hotmail 105068
    [Show full text]
  • NSA ANT Catalog PDF from EFF.Org
    SECRET//COMINT//REL TO USA. FVEY DEITYBOUNCE ANT Product Data (TS//SI//REL) DEITYBOUNCE provides software application persistence on Dell PowerEdge servers by exploiting the motherboard BIOS and utilizing System Management Mode (SMM) to gain periodic execution while the Operating System loads. _________________ _________________________________________ TUMI KG FORK Post Proc*t*ftg Target Systems (TS//SM/REL) DEITYBOUNCE Extended Concept ot Operations (TS//SI//REL) This technique supports multi-processor systems with RAID hardware and Microsoft Windows 2000. 2003. and XP. It currently targets Dell PowerEdge A A 1850/2850/1950/2950 RAID servers, using BIOS versions A02. A05. A 0 6 .1.1.0. " " 1.2.0. or 1.3.7. (TS//SI//REL) Through remote access or interdiction. ARKSTREAM is used to re­ flash the BIOS on a target machine to implant DEITYBOUNCE and its payload (the implant installer). Implantation via interdiction may be accomplished by non­ technical operator though use of a USB thumb drive. Once implanted. DEITYBOUNCE's frequency of execution (dropping the payload) is configurable and will occur when the target machine powers on. Status: Released / Deployed. Ready for Unit Cost: $0 Immediate Delivery POC: S32221. | Oenverl From: NSAfCSSM 1-52 Dated: 20070108 Oeclaisify On: 20320108 SECRET//COMINT//REL TO USA. FVEY TOP SECRET//COMINT//REL TO USA. FVEY IRONCHEF ANT Product Data (TS//SI//REL) IRONCHEF provides access persistence to target systems by exploiting the motherboard BIOS and utilizing System Management Mode (SMM) to 07/14/08 communicate with a hardware implant that provides two-way RF communication. CRUMPET COVERT CLOSED NETWORK NETW ORK (CCN ) (Tefgef So*col CCN STRAITBIZAKRE N ode Compute* Node r -\— 0 - - j CCN S e rv e r STRAITBIZARRE Node CCN Computer UNITCORAKt Computer Node I Futoie Nodoe UNITE ORA KE Server Node I (TS//SI//REL) IRONCHEF Extended Concept of Operations (TS//SI/REL) This technique supports the HP Proliant 380DL G5 server, onto which a hardware implant has been installed that communicates over the l?C Interface (WAGONBED).
    [Show full text]