PRISM-as-a-Service: Not Subject to American Law
This write-up, originally presented at PyCon Canada 2013 (slides, and video), and updated for PyCon Ireland (slides), is a look at what PRISM is, how the cloud is affected, and how we can maintain privacy in the cloud.
Nor have I had any experience in three-letter-government-agencies-that-are-out-to-get-you, or currently work/have worked for a company involved in PRISM (or at least not that I’m aware of).
This post has no special insight nor conspiracy theories, just painting a story from publicly available research.
What is PRISM?
PRISM stands for “Planning Tool for Resource Integration, Synchronization, and Management” and is a clandestine electronic data mining program for the purpose of mass surveillance. PRISM aims to collect metadata that passes through US servers.
In general, the collected data includes email, voice & video chat, videos, photos, stored data, online social networking details, among others.
Who does it affect and who is involved?
It’s meant to target foreign communications and not specifically or intentionally target US citizens.
Starting with Microsoft in September 2007, PRISM started collecting data. Other companies include Yahoo (2008), Google (2009), Facebook (2009), PalTalk (2009), YouTube (2010), Skype (2011), AOL (2011), and Apple (2012).
How does it work?
From the NSA slides posted on Washington Post, and from the press releases from Google, Facebook, Apple, Microsoft, and others, the NSA does not have direct access to these companies’ servers. For the collection process, the FBI issues a directive to the company, and the company responds by supplying data (or, supposedly, denies or requests more information).
The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA.
The NSA then filters the data by type (voice, video, call records, internet records, etc.) followed by foreign versus American subject to reduce the intake of information about Americans.
What is XKeyscore?
XKeyscore complements PRISM, and is actually a system/framework for digital network intelligence exploitation revealed by The Guardian on July 31st, 2013. In the released NSA presentation, XKeyscore is detailed to have over 500-700 servers (numbers conflicting on page 4 and 6 of the document) that allows a federated query system of completely unfiltered data. The system houses collected email addresses, user activity, phone numbers, extracted files, and parsed client-side HTTP traffic, and can allow for real-time interception.
Example queries it supports include:
- Encrypted word documents from a particular country
- PGP usage from a particular country
- VPN connections in a particular country, and all data related to those connections to be decrypted (author’s open-ended question: where is XKeystore/NSA getting keys to decrypt data?)
- All Excel spreadhseets containing MAC addresses coming out of a particular country
- All exploitable machines in a particular country
- Email addresses tied to Google Map searches
- All documents that reference $Y subject
With each search within XKeyscore system, users can input any email address with a justification, like “target is in Africa” (just a text-input field! Seemingly no approval system!), and the system returns a list of emails, with users selecting and reading an email (unknown if entire body or just “metadata” of To, From, CC, BCC, Attachements, etc.) within NSA-viewing software.
Alarmingly, a user can also setup ongoing surveillance of someone just as easily. The user is required to select a “foreign factor”, including “The person is a user of storage media seized outside of the U.S.”. While unclear what qualifies as storage media, this puts into question anyone, including U.S. citizens, who has ever used storage abroad (any of my fellow American citizens use Fastmail?).
Mass Surveillance: Nothing New, and not just US
The lack of detail in both the involved companies’ statements and in the NSA slides and responses themselves leave a lot of questions. For instance:
- How is a target’s “foreignness” determined?
- How exactly are they identifying non-US citizens?
- Are foreign-born US residents included as foreigners?
- What if a US citizen and a foreigner communicate?
- What about US citizens abroad, or US citizens using services abroad?
- Does the NSA/FBI have jurisdiction on foreign persons/companies using services from US-based companies that are located/incorporated abroad? How does physical location of the person/company/service/hardware matter? If a company like Twitter says no to a request, can the NSA go to their PRISM-compliant hosts to get the desired information?
- What exactly do works like “backdoor”, “direct access”, and “intentional” mean? Do participating companies not know they are participating, therefore unaware of a “backdoor”? Or are companies knowingly allow access to their servers?
- If the NSA is not intentionally targeting Americans, what do they do with the accidently-collected data? or the data received from Five Eyes that includes Americans?
- How is the PRISM-collected data handled by the NSA? Does the NSA maintain rigorous security measures to protect against threats?
- What exactly is the NSA doing with the data? Are they merely collecting, or analyzing it?
Effects on the cloud
The US cloud has started to feel the pain in the wake of PRISM being outed. The Cloud Security Alliance conducted a survey showing that 56% of foreign-based members are less likely to use US-based cloud providers, while 10% have all-out cancelled their contracts with US providers.
Governments themselves are starting to act: Germany has also banned (in German) all future transfer of data to non-EU-based clouds.
More recently, the Information Technology & Innovation Foundation released a report quantifying how much PRISM will cost the US computing industry (PDF):
The U.S. cloud computing industry stands to lose $22 to $35 billion over the next three years as a result of the recent revelations about the NSA’s electronic surveillance programs.
Not just on the corporate level, we’re also seeing services that aim for user privacy and anonymity shutting down, including Silent Circle, Lavabit (now in court over refusal to hand over SSL keys), Silk Road, and Tor.
What can we do?
It’s difficult to defend oneself against an attacker whose capabilities you do not know. We should approach protecting our privacy by asking some questions, defining threat scenarios, and building defenses around that.
Limit government exposure
There are, in general, three reasons a government may spy: industrial espionage, political reasons, and terrorism
By bringing cloud services within your company’s national jurisdiction, you effectively eliminate industrial espionage by a foreign government. It is very unlikely to be spied on for industrial espionage by your own government.
That said, it’s still unclear if the USA, UK, Europe, etc, can have access to data even if you host services within your own country. However, that starts to require political solutions rather than technical.
In the end, we have no idea what the technical capabilities of these “attackers” are. Random hackers usually do not have scale like governments do. We have to assume government spies can do anything, but then protection costs skyrocket. In general, though, a company’s data is not that important to governments. It’s personal profiles that is a bit part of any kind of PRISM-like scheme.
Solutions are simply moving your business elsewhere to your own jurisdiction. I can’t answer whether using US company’s services abroad, like Heroku’s european servers, will or will not protect you against the US government.
Being that hardware is getting a lot cheaper, do-it-yourself clouds like OpenStack, OpenShift, ownCloud, CloudStack, etc., will give you total knowledge of what is on your machines and total control of your response if and when a hacker (government or not) gets in. I have my own personal cloud thanks to the raspberry pi.
Know your neighbors
If you do decide to ‘do-it-yourself’ - know your neighbors! Where are your datacenters, where are your servers? Who is next door? [Fastmail](https://fastmail.fm, an Australian company that offers email for individuals or businesses, recently posted about their servers being in the US. The purpose of the post was to address privacy concerns, noting that they only subjected to Australian law. But the commendable part of that post was them talking about how despite not being subjected to US law and having encrypted everything from your keyboard to the moon and back, there are other possible ways to get data. Specifically, they state that their “colocation providers” aka the people they share data center space with, “could be compelled to give physical access to [their] servers” as well as simple brute force physical attack.
In general, though, a company’s data is not that important to governments. It’s personal profiles that is a bit part of any kind of PRISM-like scheme.
As nerds ourselves
Now the question is: what level of granularity are you okay with that your government knows? Or coming from a different direction, is it possible to go completely anonymous? I may sound like I’m wearing a tinfoil hat, but bare with me – this is more of a proof of concept that no, it is not possible to go completely anonymous.
I would imagine most folks are okay with a government knowing when you are inside its nation. But how granular are you okay with in being tracked?
It’s difficult to “go off the grid” entirely. As long as you carry a phone, you’re trackable. If you live in Maine or New Jersey, you’re lucky; but in the majority of the US, a search warrant is not needed to ask your cell phone carrier for your location data. You can certainly turn off your phone, but as soon as you turn it on, location is recorded when connecting to a cell tower or wifi connection spot. In London, a UK company is building smart trash cans that track every WiFi-enabled smartphone that passes by. In a one-week period with just 12 cans installed, more than 4 million devices were tracked.
Sure, you could rotate through pay-as-you-go phones. You’ll have to pay with cash, but it’s unclear if ATMs log bill numbers with account numbers. If you do have unmarked bills, then where do you buy the phone? What store reliably does not have security cameras? The phone has a barcode to scan when purchasing; would logs of purchases be tied to camera footage? You may ask, “would the government really care? Am I that dangerous to be tracked?” Yet in the UK for instance, your every move is already being watched.
In terms of the internet, your internet service provider (ISP) will always know your connections, and can always be intercepted. Even if you are not using a line that is tied to your name, your location can still be identified because of the MAC address associated with your connection.
It’s not truly clear one can avoid location tracking if connected to the internet at all.
Assume that you can avoid being tracked by location. You’re still trackable.
What you do online creates a nice behavior profile on you. When do you go online? Who do you email? What websites do you visit? This behavior is always visible to your ISP because they need to route you.
Even when you flip open an incognito tab with Chrome, it clearly states what information is not being hidden:
One popular way to increase anonymity is using the Tor project. Note, however, simply using Tor does not encrypt all of your internet activities. However, there are certain habits that can be done to increase the effectiveness of Tor.
Tor only gives you anonymity, though. It does not provide privacy. For instance, using Tor allows you to connect to sites without being traced back to you. Privacy protests your data, anonymity protects you. To protect privacy, VPN is your answer. When choosing a VPN, be sure to do your research. If you are to use both Tor and VPN, be sure you know what you’re doing, or you may end up like this guy.
Assuming if both your Tor connection and your browser is secure, you’re using a trusty VPN service, and not downloading exploitable files, how can you avoid being profiled? It’s still difficult to hide pure browsing activity (unless you write scripts to simulate fake activity). At this point, not much else can be done.
What about email? PGP/GPG only encrypts the body of the email. Therefore, who you email, any x-headers, routing information, and subject of the email is not encrypted. Perhaps use an obfuscatory or minimal subject line. If you really don’t want folks knowing who you’re emailing, then perhaps a private, self-hosted forum is the way to communicate. How far do you want to go?
And SSL? Can we trust it? The general status of SSL should be considered unclear on a technical level. With BEAST, CRIME, and BREACH attacks on SSL presented in three consecutive years, is SSL enough? There may be more attacks against SSL that is not public if two dudes are able to publicly present three SSL attacks three years in a row.
Assuming that SSL is technically secure, a government can still go to a root Certificate Authority and demand its private key to facilitate man-in-the-middle attacks, or the CA itself could be compromised. One way to ensure trusted certificates are being used and avoid MITM attacks is certificate pinning.
One concern with PRISM is that the “NSA logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis”. Perfect Forward Secrecy is one defense against this:
When PFS is used, the compromise of an SSL site’s private key does not necessarily reveal the secrets of past private communication; connections to SSL sites which use PFS have a per-session key which is not revealed if the long-term private key is compromised. The security of PFS depends on both parties discarding the shared secret after the transaction is complete (or after a reasonable period to allow for session resumption).
Quick note though: PFS does not protect against MITM attacks:
Someone with access to the server’s private key can, of course, perform an active man in the middle attack and impersonate the server. However, they can do that only when the communication is taking place. It is not possible to pile up a mountain of encrypted traffic and decrypt it later.
It essentially comes down to the questions:
- How do we deal with SSL?
- How much can we trust it?
- Do we need to “reboot” our encryption protocols and habits entirely?
- Should we reevaluate the whole idea of the certificate authority system?
Whether the NSA has “direct” access to PRISM-cooperating companies’ servers or has effectively hacked cryptographic constructs, our privacy has been challenged. Our data is being collected, and while it may seem trivial now, one day you may be deemed a terrorist like this kid here.
comments powered by Disqus