NSA Converged Analysis of Smartphone Device

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

1

(U) Converged Analysis of

Smartphone Devices

Identification/Processing/Tasking –

All in a day’s work

Paula Kuruc, NSA

May 2010

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

2

Smartphone

Converged mobile devices

offering advanced capabilities,

often with PC-like

functionality. No set industry

standard definition.

Boasts powerful processors,

memory, larger screens and

open operating systems.

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

3

Economics of Transportation

!  The gradual “blurring” of

telecommunications, computers, and the
Internet

!  Multifaceted layering technologies
!  Examples of convergence in SIGINT:

" Blackberry, iPhone data, Smartphones
" VOIP
" Wireless Local Loop
" GPRS – General Packet Radio Service

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

SmartPhone Applications

!  Visual Communicator – Free application that

combines Instant Messaging, Photo-Messaging
and Push2Talk capabilities on a mobile
platform. VC used on GPRS or 3G networks;
heavily used in AQI Mosul Network

!  Symbian Operating System supporting

encryption programs.

!  WinZip, compression and encryption program.

4

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Usage/Features

!  Social Networking via Flixster
Social Networking site allowing users to share

movie ratings, discover new movies and meet
others with similar movie taste.

!  Google Maps features
!  Photo capture and editing capabilities
!  Phone settings
!  Mobile Facebook Apps (iPhone/Android)

6

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Location Based Services

Where is the target?

!  GPRS Dataset – breaking down barriers
!  Providers catering to users based on location
!  Android Phones pass GPS data in the clear
!  No longer DNI/DNR


7

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Taking a Closer Look

Photo Capture Software -

!  iPhone Geotags for Photos
Raw tags coming through from a variety of

devices

!  Flixster App uses GPRS
!  Flickr/Photobucket
!  Mobile Facebook Apps Uploads

8

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Processing

All in the Metadata, not the pretty pictures
!  Unique applications require unique analysis
!  GPS Indicators (sent to the server and towers

for both phone and application)

!  VoIP Indicators (multiple services)
!  Type of Phone and Apps



9

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Identification via Xkeyscore

!  Make use of fingerprints in Xkeyscore via the

EXIF metadata plugin

!  Fingerprints for images (jpeg, tiff, gifs etc.)
!  Examine the raw XML
!  Provides device and time/location for the image

fingerprint('image/exif/gpsCoordinates') =
file_ext('jpeg' or 'pjpeg' or 'jpg' or 'pjpg' or 'tiff' or 'gif' or 'png' or 'riff' or

'wav') and

'exif:GPSLatitude' or 'exif:GPSLongitude' or 'exif:GPSDestLatitude' or

'exif:GPSDestLongitude';

10

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Golden Nugget!

Perfect Scenario – Target uploading

photo to a social media site taken
with a mobile device.

What can we get?


11

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

User Activity Leads

!  Examine settings of phone as well as service

providers for geo-location; specific to a certain
region

!  Networks connected
!  Websites visited
!  Buddy Lists
!  Documents Downloaded
!  Encryption used and supported
!  User Agents

12

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Targeting

13

Targeting both Telephony and DNI systems
!  Call Logs
!  SMS
!  SIM Card Leads
!  Email address
!  IMEI/IMSI
!  Unique Identifiers
!  Blackberry PINS

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Why do we care?

14

• Additional exploitation

• Target Knowledge/Leads

• Location

• Target Technology

• Denote Media used

background image

TOP SECRET//COMINT/REL TO USA, FVEY

TOP SECRET//COMINT/REL TO USA, FVEY

Conclusion

!  Challenge is how to tag data for analysts
!  We can geo phones from virtually anywhere
!  Buried GeoStamp from Phone or Apps
!  Xkeyscore/Marina
!  Tasking systems

15


Wyszukiwarka

Podobne podstrony:
NSA Analysis of Converged Data
ANALYSIS OF CONTROL STRATEGIES OF A FULL CONVERTER IN A DIRECT DRIVE WIND TURBINE
An%20Analysis%20of%20the%20Data%20Obtained%20from%20Ventilat
A Contrastive Analysis of Engli Nieznany (3)
Analysis of soil fertility and its anomalies using an objective model
Pancharatnam A Study on the Computer Aided Acoustic Analysis of an Auditorium (CATT)
Butterworth Finite element analysis of Structural Steelwork Beam to Column Bolted Connections (2)
Analysis of the Persian Gulf War
Extensive Analysis of Government Spending and?lancing the
Analysis of the Holocaust
7 Modal Analysis of a Cantilever Beam
Illiad, The Analysis of Homer's use of Similes
Analysis of the Infamous Watergate Scandal
Road Not Taken, The Extensive Analysis of the Poem
Analysis of the End of World War I
Night Analysis of the Novel
Preliminary Analysis of the Botany, Zoology, and Mineralogy of the Voynich Manuscript
1801 Design Analysis of Fixed Pitch Straight Bladed Vertical Axis Wind Turbines
8 Harmonic Analysis of a Cantilever Beam

więcej podobnych podstron