Electronic Surveillance Threats
In 2017 the
Supreme Court ruled in a landmark judgment that privacy is a fundamental
right. From sophisticated spyware attacks to mass phishing via smartphones
and the rise of facial recognition technology, the range and reach of
surveillance threats to human rights defenders is growing.
For
security teams trying to keep activists safe, it is a cat-and-mouse game as
attackers rapidly adapt to developments aimed at protection.
“When
cyber-attackers see people are switching to using (messaging app) Signal, for
example, then they will try to target Signal. If people start changing to VPN
technology, they will start blocking VPN technology. If people are using Tor
browser, they will target Tor traffic,” says Ramy Raoof, tactical technologist
with Amnesty Tech.
Automated surveillance equipment has become increasingly common and connected, making the technique more covert and pervasive. Mobile hacking, social engineering, network monitoring, face recognition technologies, GPS tracking, and various other methods commonly employed to catch and prevent crime and terrorism can also be used against civilians.
Electronic
surveillance threats – defending a facility against electronic surveillance is
a serious challenge and one that hasn’t been made any easier by the
proliferation of computer networks and wireless. Not only are businesses under
threat from phone tapping, and video and audio surveillance, wired and wireless
computer networks offer attackers a new dimension of intrusion.
Even the simplest electronic surveillance devices are diverse, with room transmitters being among the most common. Their role is to detect all the environmental noise emanating from the location in which they’re planted.
Primary variations with room transmitters relate to differences in power sources. In this case, either battery or mains power and it’s the battery powered devices that are most diverse. Such devices can be secreted inside almost any object allowing for their minimal space requirements. Examples include the inside of pens, calculators, clocks, photo frames, under carpet, behind curtains and underneath or inside furniture.
The types of battery used to power these devices varies too, depending on the design, size and planned use of the device. Self-contained transmitters designed for surreptitious surveillance favour small button batteries or higher performance hearing aid batteries. When size is less of a concern and length of transmission a higher priority, larger and longer lasting batteries can be used, including the latest lithium types.
Average transmission devices typically have dimensions around 19mm x 12mm x 9mm. Should a small transmitter be built into a pen or a calculator, transmission range will be limited, around 15-20m, though the use of lithium batteries will increase the range.
Mains-powered room transmitters draw current either directly from the mains voltage or trickle charge a battery that’s also used to power the device. The advantages of this technique where electronic intruders are concerned include the fact there will be less impact on main power sources that could be monitored for fluctuations. Should mains power be lost the device will continue to operate.
The key technical issue for mains powered transmitters is to reduce 240V of alternating current to a direct current, low voltage output of 6-18V. Designers are required to combine transmission circuitry along with a voltage dropper, rectification, smoothing and voltage stabilization circuits.
As a rule, the most popular way to get the small current and voltage requirements is to use a high voltage capacitor to act as resistance at the 50/60Hz mains supply frequency. Low power can be partially offset by injecting some radio power into the mains.
Should there be enough room and a sufficiently low risk of detection, it’s sometimes possible for a stepdown transformer to be used – this is inherently more reliable that capacitor leakage or dropper resistance techniques. It’s also possible for a transformer to supply a far greater level of power to a strong transmitter.
AC units can be located inside walls, ceilings, under floors, inside office equipment, in mains-powered clocks and within lamps and lamp holders to name just a few possibilities. One of the favoured methods of installing an AC bug is to simply plug in a dummy double adaptor to a power point in the room you wish monitor. Despite the simplicity of this technique, only the most observant would notice and even then, would be most unlikely to consider the appearance of the unit a threat to security.
Electronic intruders wishing to secure a standalone mains-powered transmitter are usually supplied with a square plastic box about 50mm x 50mm x 18mm, or an encapsulating board. There will be a pair of trailing leads coming from these units for connection to the live and neutral lines of domestic AC.
There are still PSTN telephone transmitters. These are connected to target telephone systems and transmit information to a receiving station located nearby. The 2 basic models are the series-connected transmitter and the parallel-connected transmitter. Both types either draw their operating voltage from the PSTN phone line itself, or carry their own batteries that may be trickle-charged from the phone line.
Series connected transmitters are connected between a telephone socket and a telephone. In this configuration, only that extension will be accessed by the listener. But in the event a series transmitter is used and located on the incoming wires of a 2-pair cable on the other side of a telephone socket, all extensions of the line can be accessed.
Muliplex telephone systems make life extremely hard for electronic intruders trying to record communications. Because these systems multiplex more than one signal onto a 2-pair cable, an intruder would need to employ a de-multiplexer to access phones.
Partially connected transmitters are different. Both incoming feed wires are connected to the parallel connected device, and this means the information will be transmitted if either phone is used. With a series device, the wiring of the telephone must be disconnected to allow insertion of the transmitter. But installation doesn’t mean cutting and stripping of feed wires. Instead, the device can be installed in a junction box that offers sufficient room, or even in a telephone.
Series devices are easiest for security managers to detect using one of the counter surveillance devices on the market that alert security staff to temporary disconnection of phone lines. It’s possible for alarm panels monitoring alarm systems to also monitor phone lines for integrity, with any breaches then reported.
Parallel series devices, however, can be installed without temporary line breaks and without effect on resistance. This makes them harder to detect, though if the unit is drawing power from its host, this will cause a voltage drop. Parallel devices are often equipped with alligator clips requiring no more than a few millimetres of cable to be stripped or a pair of bare terminals.
Battery-powered types are harder to detect and more effective in their operation. With their greater operating current, they can achieve greater operating ranges than bugs, giving 500-1000m ranges instead of 25-50m. Even harder to detect are small rain-proof telephone transmitters that can be connected to any point of the exterior wiring as it leaves a building or joins a telephone pole. Such a device might never be detected.
Mobile phones are usually tapped using spyware. This is a whole other science – it’s possible for experts to search for spyware and users might notice quirks like rapid battery drain, though it can be difficult to know whether this is caused by an illicit piece of software, too many open apps, or simply an aging battery.
There are 2 primary groups of microphones available to an individual or organization seeking illicit access to communications. These are omnidirectional and unidirectional. Unidirectional microphones are portable and can be aimed at a target. They’re a parabolic dish-mount device that can be hand-held or tripod mounted. Such units offer excellent results for the electronic intruder. Using a 45cm reflector, high quality sound can be obtained at 250m. This performance increases fourfold if the reflector size is doubled but the unit becomes much more visible.
Omnidirectional units pick up audio signals coming from any point of the compass and in surveillance devices they usually have a diameter of about 6mm. As a rule, these devices will be more effective towards the front. Another type of microphone, the spike mike, is mounted on the end of a spike or probe. Microphones can be connected to the audio input of a miniature transmitter, allowing remote monitoring of conversations.
Like any other internet-connected device, surveillance systems can be vulnerable to attacks without the right cyber-security measures in place. Hackers can easily gain access to poorly configured devices with design flaws or faulty firmware and manipulate or steal data. With cyber-attacks accelerating, surveillance systems need to be protected from vulnerabilities, and require the same vigilance provided to IT systems.
Closed-circuit video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless links but transmit a signal to a specific place only. Not for open to all.
Cities in at least 56 countries worldwide have deployed surveillance technologies powered by automatic data mining, facial recognition, and other forms of artificial intelligence.
The ban that prohibits the purchase and
installation of video surveillance equipment from HikVision, Dahua and Hytera
Communications in federal installations – passed on year 2018 National Defense
Authorization Act (NDAA). In conjunction with the ban’s implementation, the
government has also published a Federal Acquisition Regulation
(FAR) that outlines interim rules for how it will be applied moving
forward. Like NFPA, now NDAA law accept globally.
Rules outlined in this FAR include:
·
A “solicitation provision”
that requires government contractors to declare whether a bid includes covered
equipment under the act;
·
Defines covered equipment
to include commercial items, including commercially available off-the-shelf
(COTS) items, which the rule says, “may have a significant economic impact on a
substantial number of small entities;”
·
Requires government
procurement officers to modify indefinite delivery contracts to include the FAR
clause for future orders;
·
Extends the ban to
contracts at or below both the Micro-Purchase Threshold ($10,000) and
Simplified Acquisition Threshold ($250,000), which typically gives agencies the
ability to make purchases without federal acquisition rules applying.
·
Prohibits the purchase and
installation of equipment from Chinese telecom giants Huawei and ZTE
Corporation. This would also presumably extend to Huawei subsidiary Hisilicon,
whose chips are found in many network cameras;
· And, gives executive agency heads the ability grant a one-time waiver on a case-by-case basis for up to a two-year period.
Specifically, NDAA Section 889 creates
a general prohibition on telecommunications or video surveillance
equipment or services produced or provided by the following companies (and
associated subsidiaries or affiliates):
·
Huawei Technologies
Company; or
· ZTE Corporation
It also prohibits equipment or services
used specifically for national security purposes, such as public
safety or security of government facilities, provided by the following
companies (and associated subsidiaries or affiliates):
·
Hytera Communications
Corporation;
·
Hangzhou HikVision Digital
Technology Company; or
· Dahua Technology Company
While the prohibitions are initially limited to the five named companies, Section 889 authorizes the Secretary of Defense, in consultation with the Director of National Intelligence or the Director of the FBI, to extend these restrictions to additional companies based on their relationships to the Chinese Government. The prohibitions will take effect for executive-branch agencies on August 13, 2019, one year after the date of the enactment of the 2019 NDAA, and will extend to beneficiaries of any grants, loans, or subsidies from such agencies after an additional year.
The provisions of Section 889 are quite broad, and
key concepts are left undefined, such as how the Secretary of Defense is to
determine what constitutes an entity that is “owned or controlled by, or
otherwise connected to” a covered foreign country, or how the head of an agency
should determine whether a component is “substantial,” “essential,” or
“critical” to the system of which it is part. The statute also fails to address
the application of the prohibitions to equipment produced by U.S. manufacturers
that incorporate elements supplied by the covered entities as original
equipment manufacturers (“OEMs”) or other kinds of supplier relationships.
Section 889 contains two exceptions under which its
prohibitions do not apply:
(1) It allows Executive agencies to procure
services that connect to the facilities of a third party, “such as backhaul,
roaming, or interconnection arrangements.” This likely means telecommunications
providers are permitted to maintain common network arrangements with the
covered entities.
(2) It permits covered telecommunications equipment that is unable to “route or redirect user data traffic or permit visibility into any user data or packets” it might handle, meaning a contractor may still be able to provide services to the Government so long as any covered equipment provided is unable to interact or access the data it handles.
The Constitution of India guarantees every citizen
the right to life and personal liberty under Article 21. The Supreme Court,
in Justice K.S. Puttaswamy v. Union of India (2017), ruled
that privacy is a fundamental right. But this right is not unbridled or
absolute. The Central government, under Section 69 of the Information
Technology (IT) Act, 2000, has the power to impose reasonable restrictions on
this right and intercept, decrypt or monitor Internet traffic or electronic
data whenever there is a threat to national security, national integrity,
security of the state, and friendly relations with other countries, or in the
interest of public order and decency, or to prevent incitement to commission of
an offence.
Only in such exceptional circumstances, however,
can an individual’s right to privacy be superseded to protect national
interest. The Central government passed the IT (Procedure and Safeguards for
Interception, Monitoring and Decryption of Information) Rules, 2009, that allow
the Secretary in the Home Ministry/Home Departments to authorise agencies to
intercept, decrypt or monitor Internet traffic or electronic data. In emergency
situations, such approval can be given by a person not below the Joint
Secretary in the Indian government. In today’s times, when fake news and
illegal activities such as cyber terrorism on the dark web are on the rise, the
importance of reserving such powers to conduct surveillance cannot be
undermined.
Risk of Electronic Security Threats to EHR/HIS is a
critical issue because as per the privacy and security rule of The Health
Insurance Portability and Accountability Act (HIPAA) the patient’s medical
records are to be secured and private which can be accessible only the hospital
authorities and the doctors in charge of the patient and the patient himself.
More advanced techniques now no longer require a target to actively click on a link in order to infect a device, explains Amnesty Tech security researcher Etienne Maynier. An attack using NSO spyware on an activist in Morocco covertly intercepted the activist’s web browsing to infect their phone with spyware. “Instead of waiting for you to click on a link, they instead hijack your web browser’s traffic and redirect you to a malicious website which tries to secretly install spyware,” says Maynier.
Successful targeting of well-protected phones is becoming more common and security teams are under added pressure from a burgeoning industry in so-called ‘zero-day’ exploits, in which unscrupulous hackers seek to find unknown vulnerabilities in software to sell. In May 2019, NSO Group exploited a zero-day vulnerability in WhatsApp that was used to target more than 100 human rights activists across the world with spyware.
How to keep your communications safe:
Using public Wi-Fi and VPNs: When you connect to Wi-Fi in a cafe or airport your internet activities are routed through that network. If attackers are on the network, they could capture your personal data. By using a VPN app on your devices, you protect your online activities when accessing public connections, preventing your internet activities from being seen by others on the same network. If you want to explore options, try NordVPN and TunnelBear.
Password management: Using a password manager means you don’t have to worry about forgetting passwords and can avoid using the same ones. It’s a tool that creates and safely stores strong passwords for you, so you can use many different passwords on different sites and services. There are various password managers such as KeePassXC , 1Password or Lastpass. Remember to back up your password manager database. Do not use password like password, ddmmyyyy, admin@123, administrator, administrator1, Super@1234 etc.
Messaging apps: When we advise human rights defenders about messaging apps, we assess each app on its policies (such as terms of service, privacy agreement), its technology (if it’s open source, available for review, has been audited, security) and finally the situation (if the app provides the features and functionality that fits the need and threat model). Generally speaking, Signal and Wire are two apps with strong privacy features. Remember: Signal requires a SIM card to register, and for Wire you can sign up with a username/email.
Phone basics for iPhone or Android: Only download apps from the official app store to
prevent your personal information from being accessed without your consent and
to minimise the risk of attacks. Update your system and apps frequently to
ensure they have the latest security patches. Enable ‘account recovery’ in case
you lose access to your phone. Finally, choose a mobile screen lock that is not
easily guessed, such as an 8-digit pin or an alphanumeric code.
ReplyDeleteVery nice and informative blog. It really helped me add some useful points in my knowledge. Thanks for sharing!
Also check out these amazing Cisco products if you want:
WS-C2960S-48TD-L
WS-C2960X-48LPD-L
WS-C2960+48TC-L
ReplyDeleteIt is very useful and knowledgeable. Therefore, I would like to thank you for the efforts you have made in writing this article.
jl256a
jl261a
jl262a
ReplyDeleteIt is very useful and knowledgeable. Therefore, I would like to thank you for the efforts you have made in writing this article.
jl256a
jl261a
jl262a
I came to this blog and it helped me to add few new points to my knowledge. You have really shared an informative and interesting blog post with people.
ReplyDeletejl256a
jl255a
j9774a
j9776a
Firetech fire monitors designed with advanced technology provide the high quality water jet and fog patterns.
ReplyDeletepump skid
It is very useful and knowledgeable. Therefore, I would like to thank you for the efforts you have made in writing this article.WS-C3850-24T-E
ReplyDeleteIt is very useful and knowledgeable. Therefore, I would like to thank you for the efforts you have made in writing this articleWS-C3850-24XS-S
ReplyDeleteasgsdfdsf dfsad fdsf dsafds f AMD 3600X
ReplyDeletedafdsgsdsf sadf sad fdsa fdsa fds d AMD 3995wx
ReplyDelete
ReplyDeleteryzen threadripper 3970x
ReplyDeleteamd ryzen 3970x