1 of 44

SIGPwny @ UIUC

Intro to Opsec

Spring 2017

2 of 44

Announcements

  • Manticore focus group
  • Thotcon & Defcon
    • May 4 & 5
  • Cyphercon
  • UIUCTF Challenge Idea Submissions - https://goo.gl/forms/fmp7eWsl6MEDqGyq1

3 of 44

News of the week

4 of 44

Disclaimers

  • Most of these slides are stolen from @thegrugq
  • I am not a lawyer
  • I’m not going to jail for you

5 of 44

What is Opsec?

  • Keeps information safe
  • Stops plans from going awry
  • Keeps you out of jail

6 of 44

7 of 44

Part One: Comsec

  • In order to operate, you need to communicate.
  • Communication is a great way to map out your organization for Vladimir.

8 of 44

Tenets

  • Confidentiality
    • No one can read your messages
  • Integrity
    • No one can modify your messages
  • Availability
    • Messages are hard to block (P25)
  • Cover
    • Helps avoid closer scrutiny
  • Concealment
    • If it looks like a duck, it’s probably not a spy plane
  • Compartmentalization
    • Limited sensitive information in any one place
    • PFS

9 of 44

Real Gs move in silence, like lasagna

10 of 44

Concealment

  • TOR traffic looks like TOR traffic
    • Even if you can’t tell where it’s going, it’s suspicious
  • PRC can identify VPN traffic easily
  • Use Signal for everything, with everyone
  • If it looks like HTTPS, no one will bat an eye
  • Steganography - not just for lazy CTF authors

11 of 44

I got two phones, one for the plug and one for the load

12 of 44

Compartmentalization

  • Information
    • Tell people only what they need to know to do their job.
    • You’re better off not knowing.
  • Communications
    • Cycle keys often.
  • Devices
    • Absolutely nothing traceable to you ever touches your throwaway devices. Ever.
  • Identity
    • Have an alternate persona strong enough to use when you need it.
    • Set this up well in advance.

13 of 44

I’mma look fresh as hell if the feds watchin’

14 of 44

Threat Modeling

  • FSB/Mossad/PRC
    • If it has wires, it’s spying on you
  • Russian Mafia
    • Well-resourced, technically sophisticated
  • Local Law Enforcement
    • Probably bound by the law
  • Disgruntled Ex
    • Limited technical expertise and resources, insider information
  • Bitter Enemies in the Electronics Hobbyist Community
    • Will destroy your pacemaker with a CB radio and a Pringles can.

15 of 44

“There is no such thing as tiger self-defence. You can’t just ‘train harder!’ and fight tigers one day.”

16 of 44

Why You Threat Model

  • Trying to authenticate messages?
    • PGP proves key-holder wrote a message
  • Fighting the FSB?
    • PGP provides a provable ring of conspirators
    • Signing = cryptographic proof you wrote an incriminating message
    • “--- BEGIN PGP SIGNED MESSAGE ---” = “Hey Vladimir, check this out”
  • Decide what you need from your tools, then choose tools accordingly. NOT the other way around.

17 of 44

“I don’t have to outrun the bear - I just have to outrun you!”

This is the worst analogy ever.

The Bear is LEO. With care and attention we can beat LEO, and we want to be in the woods ( where there are bears ), because the woods are full of heroin money… or honey or whatever metaphor thing everyone wants.

1. None of you can outrun the bear. Bears run at 60kph

2. The first person that gets caught by the bear won’t get eaten. They will snitch.

3. Next, the bear runs you all down, one by one, at 60kph, and kills you

4. The snitch will never do jail time, get a million dollars for their life story, and party at VICE.

So the moral, if anything, is “run slowly and learn to speak bear”

18 of 44

tl;dr

In the long run, CCC > CIA

19 of 44

Tools

  • Strong password + 2FA (Not SMS)
  • Signal
  • TOR
  • VPN
    • Algo
  • VM
    • Qubes
  • Windows
  • iOS
  • Chrome OS

20 of 44

Disposable Hardware

  • Raspberry Pi
    • Anything you won’t mind melting in thermite
  • Cellular Modem
  • VPS
    • Somewhere over international lines (preferably unfriendly country)
    • Pay in BTC
      • Tumble your bitcoins!
  • iPod Touch
    • No touch login
    • Long passcode
    • Only used for Signal

21 of 44

Cash rules everything around me

22 of 44

Random Talking Points

  • End-to-End or GTFO
  • TOR → VPN, because VPN → TOR gets you arrested
  • Snitches get reduced sentences
  • STFU

23 of 44

Part two: Opsec rules

24 of 44

Required Reading

25 of 44

Have a Believable Legend

  • Do research, seem normal
    • Travel brochures are a gold mine
  • Don’t make things up on the spot
  • Carry proper documentation
    • “Pocket Litter” - small details that make your persona more believable

26 of 44

If the devil’s in the details, then I’m satanic

27 of 44

Compartmentalize Harder

  • Never reveal underground activities to anyone
  • Maintain pseudonymous relationship with co-conspirators
    • Anonymity is probably overkill
  • 7: This rule is so underrated \ Keep your family and business completely separated \ Money and Blood don’t mix.
  • Don’t mix recreation with clandestine operations
    • Number four: know you heard this before \ never get high on your own supply.

28 of 44

Mo’ People, Mo’ Problems

  • Cap your organization at five people
  • Risk of compromise increases exponentially with every person you add
  • If you’re running a large-scale intelligence agency, design your hierarchy so cell size is small

29 of 44

Breakin' the law with no codefendant

Go to jail, I get a lesser sentence

30 of 44

Go with the Flow

  • Blend in
  • Lull adversaries into a false sense of complacency
  • You are what you appear to be
    • Project confidence
    • Camouflage

31 of 44

STFU

  • Loose lips kill
  • Rule nombre uno: never let no one know \ how much dough you hold.
  • Number two: never let ‘em know your next move \ don’t you know bad boys move in silence or violence?
  • Retroactive paranoia doesn’t work
  • Protecting your tweets doesn’t count
  • There’s no such thing as a famous hacker

32 of 44

Trust No One

  • Number three: never trust nobody \ your mom’ll set that ass up.
  • Assume everyone is under opposition control.
    • Adversaries will try to trap you

33 of 44

Be Disciplined

  • Lateness is a good indicator of compromise.
    • Never wait more than ten minutes for a meeting.
  • Never contaminate compartments. Your life depends on it.
  • It only takes one screw-up to land yourself in the Gulag.

34 of 44

Prepare Chaos

  • Plan your moves well in advance.
    • Opportunity should be used sparingly.
  • Don’t follow a routine. Vary your patterns as much as you can while still blending in.
    • Machine Learning
  • Have an escape plan

35 of 44

Need to Know

  • Never reveal more information than absolutely necessary to a co-conspirator
  • This applies to you too
    • If you don’t need to know it, then you’re better off not knowing.

36 of 44

Know which Channels are Open

  • Avoid use of flagged keywords in public
  • Use innocuous code phrases
  • Stick to pre-existing secure channels whenever possible

37 of 44

Leave no Trace

  • Wipe fingerprints
  • Delete logs
  • Securely wipe hard drives
  • Melt equipment in thermite
  • Know which purchases can be tracked
    • Printers are evil
    • Pay for things in cash (or bitcoin)
  • Avoid possible means of tracking
    • RFID Infrastructure
    • Wireless Transmitters
  • Destroy evidence proactively

38 of 44

Hide Compromising Material

  • Memorization > Encrypted storage
  • Store things in locations that fit your cover
  • Number five: never sell no crack where you rest at
    • Applies both to storage and operations. Nothing happens at home. Nothing.
  • Number eight: never keep no weight on you.

39 of 44

Coast Guard come, a hundred going overboard

40 of 44

Know the Landscape

  • Know how to get around your area of operations without technological aids
  • Do more research than you need to
  • Monitor your adversaries
    • Google Ads

41 of 44

Don’t Snitch

  • Number nine shoulda been number 1 for me: \ if you ain’t gettin’ bagged stay the f*ck from police
  • You’re getting gulag’ed either way.

42 of 44

Assume Snitches

  • If any member is compromised, assume they’ve told Vlad everything they know.
  • Immediately take precautions. Overkill doesn’t hurt.

43 of 44

https://www.youtube.com/watch?v=avsqkevmCIM

44 of 44

Challenge

  • http://bit.ly/2mq0RcO
    • When was this photo taken, and where?
  • What’s Eric’s password?
  • What’s Eric’s home address?