Clone of . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

428 lines
64 KiB

3 years ago
3 years ago
3 years ago
  1. ## Anonymity, Opsec & Privacy
  2. ### Table of Contents
  3. - [General](#general)
  4. - [Android/iOS/Mobile](#mobile)
  5. - [Browser Related](#browser)
  6. - [Communications Security](#comsec)
  7. - [Data Collection](#dcollect)
  8. - [De-anonymization](#de-anon)
  9. - [Documents/Writing](#writing)
  10. - [Facial Identification](#face)
  11. - [Informative/Educational](#informative)
  12. - [Journalism & Media Publishing](#media)
  13. - [Network Obfuscation](#obfuscation)
  14. - [Operational Security - OPSEC](#opsec)
  15. - [References/Resources](#ref)
  16. - [Wireless Radios](#)
  17. - [Tor](#tor)
  18. - [Traveling](#travel)
  19. - [Miscellaneous Stuff](#misc)
  20. - [Miscellaneous Tools](#misc-tools)
  21. - [Counter-Surveillance](#counter)
  22. - [Writeups](#cwriteup)
  23. - [Videos/Talks](#cvideos)
  24. - [Papers](#cpapers)
  25. - [Emissions Security](#emissions)
  26. - [Papers](#papers)
  27. - [Modern Surveillance](#modern)
  28. - [China](#china)
  29. - [United States](#usa)
  30. - [Disinformation](#disinfo)
  33. Remove hidden data and personal information by inspecting documents, presentations, or workbooks
  39. * [A DC Think Tank Used Fake Social Media Accounts, A Bogus Expert, And Fancy Events To Reach The NSA, FBI, And White House - Craig Silverman(BuzzFeed News)](
  40. * [Opting Out Like A Boss - The OSINT Way (Part 1) -](
  44. * [Creating Your Own Citizen Database - Aiganysh Aidarbekova](
  45. * [Manage connections from Windows operating system components to Microsoft services -](
  46. * [Cookies – what does ‘good’ look like? - UK Information Comissioner's Office - Ali Shah](
  51. * [Ghostbuster: Detecting the Presence of Hidden Eavesdroppers](
  52. * Propaganda
  53. * [Project Feels: How USA Today, ESPN and The New York Times are targeting ads to mood - digiday](
  54. * [The New York Times Advertising & Marketing Solutions Group Introduces ‘nytDEMO’: A Cross-Functional Team Focused on Bringing Insights and Data Solutions to Brands(2018)](
  55. * [A DC Think Tank Used Fake Social Media Accounts, A Bogus Expert, And Fancy Events To Reach The NSA, FBI, And White House - Craig Silverman](
  56. * [Toward an Information Operations Kill Chain - Bruce Schneier](
  57. * [Project Raven: Inside the UAE’s secret hacking team of American mercenaries(Christopher Bing, Joel Schectman)]
  58. * [How to Purge Google and Start Over – Part 2 - Mike Felch](
  59. * [Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92](
  60. * [Salamandra](
  61. * Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped frequencies. Based on the generated noise it can estimate how close or far away you are from the microphone.
  62. * [zwsp-steg](
  63. * Zero-Width Space Steganography. Encodes and decodes hidden messages as non printable/readable characters. [A demo can be found here](
  64. * [DEDA](
  65. * DEDA - tracking Dots Extraction, Decoding and Anonymisation toolkit; Document Colour Tracking Dots, or yellow dots, are small systematic dots which encode information about the printer and/or the printout itself. This process is integrated in almost every commercial colour laser printer. This means that almost every printout contains coded information about the source device, such as the serial number.
  66. *
  67. * [The Spy and the Traitor: The Greatest Espionage Story of the Cold War -](
  68. * [How a Bitcoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps - Nathaniel Popper](
  69. * [A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients - Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi, and Alessandro Mei(2/2015)](
  70. * [Forensic Analysis and Anonymisation of Printed Documents](
  71. * Contrary to popular belief, the paperless office has not yet established itself. Printer forensics is therefore still an important field today to protect the reliability of printed documents or to track criminals. An important task of this is to identify the source device of a printed document. There are many forensic approaches that try to determine the source device automatically and with commercially available recording devices. However, it is difficult to find intrinsic signatures that are robust against a variety of influences of the printing process and at the same time can identify the specific source device. In most cases, the identification rate only reaches up to the printer model. For this reason we reviewed document colour tracking dots, an extrinsic signature embedded in nearly all modern colour laser printers. We developed a refined and generic extraction algorithm, found a new tracking dot pattern and decoded pattern information. Through out we propose to reuse document colour tracking dots, in combination with passive printer forensic methods. From privacy perspective we additional investigated anonymization approaches to defeat arbitrary tracking. Finally we propose our toolkitdeda which implements the entire workflow of extracting, analysing and anonymisation of a tracking dot pattern.
  72. * [NCCA Polygraph Countermeasure Course Files Leaked](
  73. * [Fooling automated surveillance cameras: adversarial patches to attack person detection - Simen Thys, Wiebe Van Ranst, Toon Goedemé](
  74. * Adversarial attacks on machine learning models have seen increasing interest in the past years. By making only subtle changes to the input of a convolutional neural network, the output of the network can be swayed to output a completely different result. The first attacks did this by changing pixel values of an input image slightly to fool a classifier to output the wrong class. Other approaches have tried to learn "patches" that can be applied to an object to fool detectors and classifiers. Some of these approaches have also shown that these attacks are feasible in the real-world, i.e. by modifying an object and filming it with a video camera. However, all of these approaches target classes that contain almost no intra-class variety (e.g. stop signs). The known structure of the object is then used to generate an adversarial patch on top of it. In this paper, we present an approach to generate adversarial patches to targets with lots of intra-class variety, namely persons. The goal is to generate a patch that is able successfully hide a person from a person detector. An attack that could for instance be used maliciously to circumvent surveillance systems, intruders can sneak around undetected by holding a small cardboard plate in front of their body aimed towards the surveillance camera. From our results we can see that our system is able significantly lower the accuracy of a person detector. Our approach also functions well in real-life scenarios where the patch is filmed by a camera. To the best of our knowledge we are the first to attempt this kind of attack on targets with a high level of intra-class variety like persons.
  75. --------------
  76. ### <a name="general"></a>General
  77. * **101**
  78. * [A Guide to Law Enforcement Spying Technology - EFF](
  79. * [Anonymity](
  80. * [Operations Security - Wikipedia](
  81. * **General**
  82. * [OS X Security and Privacy Guide](
  83. * [Bugger - Adam Curtis](
  84. * Maybe the real state secret is that spies aren't very good at their jobs and don't know much about the world
  85. * [Mobile Phone Data lookup](
  86. * [Privacy Online Test And Resource Compendium](
  87. * [Winning and Quitting the Privacy Game What it REALLY takes to have True Privacy in the 21st Century - Derbycon 7](
  88. * [We Should All Have Something To Hide - Moxie Marlinspike](
  89. * ['I've Got Nothing to Hide' and Other Misunderstandings of Privacy](
  90. * We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. In part, the ease with which they can obtain such information reflects the fact that our laws have failed to keep up with advances in technology. However, privacy enhancing technologies can offer real protections even when the law does not. That intelligence agencies like the NSA are able to collect records about every telephone call made in the United States, or engage in the bulk surveillance of Internet communications is only possible because so much of our data is transmitted in the clear. The privacy enhancing technologies required to make bulk surveillance impossible and targeted surveillance more difficult already exist. We just need to start using them.
  91. * [The Gruqgs blog](
  92. * [How to Cover Your Tracks -](
  93. * [Becoming Virtually Untraceable (Eps1.0_B4s!c_T3chn1qu3s.onion) - Ian Barwise](
  94. * [The Dating Brokers: An autopsy of online love - Joana Moll, Tactical Tech](
  95. * **Android/iOS/Mobile**<a name="mobile"></a>
  96. * [Click and Dragger: Denial and Deception on Android mobile](
  97. * [DEFCON 20: Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data](
  98. * [Can you track me now? - Defcon20](
  99. * [Phones and Privacy for Consumers - Matt Hoy (mattrix) and David Khudaverdyan (deltaflyer)](
  100. * [Hacking FinSpy - a Case Study - Atilla Marosi - Troopers15](
  101. * **Browser Related**<a name="browser"></a>
  102. * [Panopticlick](
  103. * Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.
  104. * [Discovering Browser Extensions via Web Accessible Resources - Chalmers security lab](
  105. * [Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting](
  106. * [Client Identification Mechanisms](
  107. * [Technical analysis of client identification mechanisms](
  108. * [What Happens Next Will Amaze You](
  109. * In this paper, we examine how web-based device fingerprinting currently works on the Internet. By analyzing the code of three popular browser-fingerprinting code providers, we reveal the techniques that allow websites to track users without the need of client-side identifiers. Among these techniques, we show how current commercial fingerprinting approaches use questionable practices, such as the circumvention of HTTP proxies to discover a user’s real IP address and the installation of intrusive browser plugins. At the same tim e, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browser- identifying techniques. With so many different vendors involved in browser development, we demonstrate how one can use diversions in the browsers’ implementation to distinguish successfully not only the browser-family, but also specific major and minor versions. Browser extensions that help users spoof the user-agent of their browsers are also evaluated. We show that current commercial approaches can bypass the extensions, and, in addition, take advantage of their shortcomings by using them as additional fingerprinting features.
  110. * [Invasion of Privacy - HackerFactor](
  111. * **Communication Security**<a name="comsec"></a>
  112. * [A Study of COMINT Personnel Security Standards and Practices](
  113. * [COMSEC Beyond Encryption](
  114. * [NSA operation ORCHESTRA: Annual Status Report(2014) - Poul-Henning Kamp - FOSDEM14](
  115. * **Data Collection**<a name="dcollect"></a>
  116. * [This Time, Facebook Is Sharing Its Employees’ Data: Some of the biggest companies turn over their workers’ most personal information to the troubled credit reporting agency Equifax](
  117. * [No boundaries: Exfiltration of personal data by session-replay scripts](
  118. * [Data release: list of websites that have third-party “session replay” scripts ](
  119. * [.NET Github: .NET core should not SPY on users by default #3093](
  120. * [.NET Github: Revisit Telemetry configuration #6086 ](
  121. * [iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests](
  122. * [Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica(2016)](
  123. * [No boundaries: Exfiltration of personal data by session-replay scripts - Freedom to Tinker](
  124. * **De-Anonymization**<a name="de-anon"></a>
  125. * **Articles/Blogposts/Writeups**
  126. * [De-Anonymizing Alt.Anonymous. Messages - Tom Ritter - Defcon21](
  127. * [De-Anonymizing Alt.Anonymous.Messages](
  128. * [Defeating and Detecting Browser Spoofing - Browserprint](
  129. * [Deanonymizing Windows users and capturing Microsoft and VPN accounts](
  130. * [De-anonymizing facebook users through CSP](
  131. * **Papers**
  132. * [Speaker Recognition in Encrypted Voice Streams - Michael Backes,Goran Doychev,Markus Durmuth,Boris Kopf](
  133. * We develop a novel approach for unveiling the identity of speakers who participate in encrypted voice communication, solely by eavesdropping on the encrypted traffic. Our approach exploits the concept of voice activity detection (VAD), a widely used technique for reducing the bandwidth consumption of voice traffic. We show that the reduction of traffic caused by VAD techniques creates patterns in the encrypted traffic, which in turn reveal the patterns of pauses in the underlying voice stream. We show that these patterns are speaker-characteristic, and that they are sufficient to undermine the anonymity of the speaker in encrypted voice communication. In an empirical setup with 20 speakers our analysis is able to correctly identify an unknown speaker in about 48% of all cases. Our work extends and generalizes existing work that exploits variable bit-rate encoding for identifying the conversation language and content of encrypted voice streams)
  134. * **Documents**<a name="writing"></a>
  135. * **Authorship Analysis/Identification**
  136. * [anonymouth](
  137. * Document Anonymization Tool, Version 0.5
  138. * [F⁠ingerprinting documents​ with steganography​](
  139. * [Text Authorship Verification through Watermarking - Stefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi](
  140. * **Obfuscation/Making it harder to OCR/Redaction Tactics and Methods**
  141. * [Redaction of PDF Files Using Adobe Acrobat Professional X - NSA](
  142. * [Why Government Agencies Use Ugly, Difficult to Use Scanned PDFs - There's More Than Meets the Eye -](
  143. * **Stegonagraphy**
  144. * [steganos](
  145. * This is a library to encode bits into text.... steganography in text!
  146. * [Content-preserving Text Watermarking through Unicode Homoglyph Substitution](
  147. * Digital watermarking has become crucially important in authentication and copyright protection of the digital contents, since more and more data are daily generated and shared online through digital archives, blogs and social networks. Out of all, text watermarking is a more difficult task in comparison to other media watermarking. Text cannot be always converted into image, it accounts for a far smaller amount of data (eg. social network posts) and the changes in short texts would strongly affect the meaning or the overall visual form. In this paper we propose a text watermarking technique based on homoglyph characters substitution for latin symbols1. The proposed method is able to efficiently embed a password based watermark in short texts by strictly preserving the content. In particular, it uses alternative Unicode symbols to ensure visual indistinguishability and length preservation, namely content-preservation. To evaluate our method, we use a real dataset of 1.8 million New York articles. The results show the effectiveness of our approach providing an average length of 101 characters needed to embed a 64bit password based watermark.
  148. * **Facial Identification**<a name="facial"></a>
  149. * [Achie­ving an­ony­mi­ty against major face re­co­gni­ti­on al­go­rith­ms - Be­ne­dikt Dries­sen, Mar­kus Dür­muth](
  150. * [IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color](
  151. * **Informative/Educational**<a name="informative"></a>
  152. * [Bugger - Adam Curtis](
  153. * Maybe the real state secret is that spies aren't very good at their jobs and don't know much about the world
  154. * [Detect Tor Exit doing sniffing by passively detecting unique DNS query (via HTML & PCAP parsing/viewing)](
  155. * [Dutch-Russian cyber crime case reveals how police tap the internet - ElectroSpaces](
  156. * [An Underground education](
  157. * [How to Spot a Spook](
  158. * **Journalism/Media Publishing**<a name="media"></a>
  159. * [Information Security For Journalist book - Centre for Investigative Journalism](
  160. * [Protecting Your Sources When Releasing Sensitive Documents](
  161. * **Network Obfuscation**<a name="obfuscation"></a>
  162. * [HORNET: High-speed Onion Routing at the Network Layer](
  163. * [Decoy Routing: Toward Unblockable Internet Communication](
  164. * We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked host/service, then decoy routing could be used to connect them to a blocked destination without coop- eration from the host. This is accomplished by placing the circumvention service in the network itself – where a single device could proxy traffic between a significant fraction of hosts – instead of at the edge.
  165. * [obfs4 (The obfourscator)](
  166. * This is a protocol obfuscation layer for TCP protocols. Its purpose is to keep a third party from telling what protocol is in use based on message contents. Unlike obfs3, obfs4 attempts to provide authentication and data integrity, though it is still designed primarily around providing a layer of obfuscation for an existing authenticated protocol like SSH or TLS.
  167. * [obfs3 (The Threebfuscator)](
  168. * This is a protocol obfuscation layer for TCP protocols. Its purpose is to keep a third party from telling what protocol is in use based on message contents. Like obfs2, it does not provide authentication or data integrity. It does not hide data lengths. It is more suitable for providing a layer of obfuscation for an existing authenticated protocol, like SSH or TLS.
  169. * **Online Influence Methods**
  170. * [The Art of Deception: Training for a New Generation of Online Covert Operations](
  171. * [How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - TheIntercept](
  172. * **OPSEC(Specifically)**<a name="opsec"></a>
  173. * [Operational Security and the Real World - The Grugq](
  174. * [CIA Vault7 Development Tradecraft DOs and DON'Ts](
  175. * [Campaign Information Security In Theory and Practice](
  176. * [Reminder: Oh, Won't You Please Shut Up? - USA](
  177. * [Underground Tradecraft Rules of Clandestine Operation](
  178. * [I know places we can hide Opsec tips from Taylor Swift](
  179. * [Operational Security and the Real World - The Grugq](
  180. * [Managing Pseudonyms with Compartmentalization: Identity Management of Personas](
  181. * [Because Jail is for WUFTPD - Legendary talk, a must watch.](
  182. * [OPSEC In the Age of The Egotistical Giraffe](
  183. * [OPSEC Concerns in Using Crypto](
  184. * [You're Leaking Trade Secrets - Defcon22 Michael Schrenk](
  185. * Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information is leaked because the secrets often fall into the hands of competitors. This talk uses a variety of real world examples to show how trade secrets are leaked online, and how organizational privacy is compromised by seemingly innocent use of The Internet.
  186. * [The Need for Identity Management - alienvault](
  187. * **Reference/Resources**<a name="ref"></a>
  188. * [The Paranoid's Bible: An anti-dox effort.](
  189. * [Debian-Privacy-Server-Guide](
  190. * This is a step-by-step guide to configuring and managing a domain, remote server and hosted services, such as VPN, a private and obfuscated Tor bridge, and encrypted chat, using the Debian GNU/Linux operating system and other free software.
  191. * [Anonymous’s Guide to OpSec](
  192. * **WiFi**<a name="wifi"></a>
  193. * [Wifi Tracking: Collecting the (probe) Breadcrumbs - David Switzer](
  194. * Wifi probes have provided giggles via Karma and Wifi Pineapples for years, but is there more fun to be had? Like going from sitting next to someone on a bus, to knowing where they live and hang out? Why try to MITM someone’s wireless device in an enterprise environment where they may notice — when getting them at their favorite burger joint is much easier. In this talk we will review ways of collecting and analyzing probes. We’ll use the resulting data to figure out where people live, their daily habits, and discuss uses (some nice, some not so nice) for this information. We’ll also dicuss how to make yourself a little less easy to track using these methods. Stingrays are price prohibitive, but for just tracking people’s movements.. this is cheap and easy.
  195. * **Tool Configuration**
  196. * [How to stop Firefox from making automatic connections](
  197. * **Tor**<a name="tor"></a>
  198. * **101**
  199. * [Tor - Wikipedia](
  200. * [Onion Routing](
  201. * [Tor Project Overview](
  202. * [Tor Official FAQ](
  203. * [Tor Official Documentation](
  204. * [Tor Wiki](
  205. * **Articles/Blogposts/Writeups**
  206. * [Trawling Tor Hidden Service – Mapping the DHT](
  207. * [How Tor Users Got Caught by Government Agencies](
  208. * **Talks/Presentations/Videos**
  209. * [How Tor Users Got Caught - Defcon 22](
  210. * [Part 2](
  211. * [Deep Dive Into Tor Onion Services - David Goulet](
  212. * **Tools**
  213. * [Nipe](
  214. * Nipe is a script to make Tor Network your default gateway.
  215. * [P.O.R.T.A.L.](
  216. * PORTAL is a project that aims to keep people out of jail. It is a dedicated hardware device (a router) which forces all internet traffic to be sent over the Tor network. This significantly increases the odds of using Tor effectively, and reduces the potential to make fatal mistakes.
  217. * [PORTAL of Pi](
  218. * This will guide you through configuring an Arch based RaspberryPi installation which transparently forwards all TCP traffic over the Tor network. There is also a Tor SOCKS proxy for explicitly interacting with the Tor network, either for more security, or to access a Hidden Service.
  219. * [Nipe](
  220. * Nipe is a script to make Tor Network your default gateway.
  221. * **Papers**
  222. * [SkypeMorph: Protocol Obfuscation for Tor Bridges](
  223. * The Tor network is designed to provide users with low- latency anonymous communications. Tor clients build circuits with publicly listed relays to anonymously reach their destinations. However, since the relays are publicly listed, they can be easily blocked by censoring adversaries. Consequently, the Tor project envisioned the possibility of unlisted entry points to the Tor network, commonly known as bridges. We address the issue of preventing censors from detecting the bridges by observing the communications between them and nodes in their network. We propose a model in which the client obfuscates its messages to the bridge in a widely used protocol over the Inter- net. We investigate using Skype video calls as our target protocol and our goal is to make it difficult for the censor- ing adversary to distinguish between the obfuscated bridge connections and actual Skype calls using statistical compar- isons. We have implemented our model as a proof-of-concept pluggable transport for Tor, which is available under an open-source licence. Using this implementation we observed the obfuscated bridge communications and compared it with those of Skype calls and presented the results.
  224. * [StegoTorus: A Camouflage Proxy for the Tor Anonymity System](
  225. * Internet censorship by governments is an increasingly common practice worldwide. Internet users and censors are locked in an arms race: as users find ways to evade censorship schemes, the censors develop countermeasures for the evasion tactics. One of the most popular and effective circumvention tools, Tor, must regularly adjust its network traffic signature to remain usable. We present StegoTorus, a tool that comprehensively disguises Tor from protocol analysis. To foil analysis of packet contents, Tor’s traffic is steganographed to resemble an innocuous cover protocol, such as HTTP. To foil analysis at the transport level, the Tor circuit is distributed over many shorter-lived connections with per-packet characteristics that mimic cover-protocol traffic. Our evaluation demonstrates that StegoTorus improves the resilience of Tor to fingerprinting attacks and delivers usable performance.
  226. * [Spoiled Onions](
  227. * In this research project, we were monitoring all exit relays for several months in order to expose, document, and thwart malicious or misconfigured relays. In particular, we monitor exit relays with two scanners we developed specifically for that purpose: exitmap and HoneyConnector. Since September 2013, we discovered 65 malicious or misconfigured exit relays which are listed in Table 1 and Table 2 in our research paper. These exit relays engaged in various attacks such as SSH and HTTPS MitM, HTML injection, SSL stripping, and traffic sniffing. We also found exit relays which were unintentionally interfering with network traffic because they were subject to DNS censorship.
  228. * **Travel**<a name="travel"></a>
  229. * [China travel laptop setup](
  230. * **Misc/Unsorted**
  231. * [Cat Videos and the Death of Clear Text](
  232. * [You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements - ACLU](
  233. * [A Technical Description of Psiphon](
  234. * **Papers**
  235. * [Deep-Spying: Spying using Smartwatch and Deep Learning - Tony Beltramelli](
  236. * **Miscellaneous Tools**<a name="tools-misc"></a>
  237. * [FakeNameGenerator](
  238. * [MAT: Metadata Anonymisation Toolkit](
  239. * MAT is a toolbox composed of a GUI application, a CLI application and a library.
  240. * [fteproxy](
  241. * fteproxy is fast, free, open source, and cross platform. It has been shown to circumvent network monitoring software such as bro, YAF, nProbe, l7-filter, and appid, as well as closed-source commercial DPI systems
  242. * [Streisand](
  243. * Streisand sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
  244. * [exitmap](
  245. * Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays. Modules can perform any TCP-based networking task; fetching a web page, uploading a file, connecting to an SSH server, or joining an IRC channel.
  246. * [OnionCat - an Anonymous VPN adapter](
  247. * [howmanypeoplearearound](
  248. * Count the number of people around you 👨‍👨‍👦 by monitoring wifi signals 📡
  249. * [Decentraleyes](
  250. * Protects you against tracking through "free", centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.
  251. * [Decentraleyes - Github](
  252. * A web browser extension that emulates Content Delivery Networks to improve your online privacy. It intercepts traffic, finds supported resources locally, and injects them into the environment. All of this happens automatically, so no prior configuration is required.
  253. * [Destroy-Windows-10-Spying](
  254. * Destroy Windows Spying tool
  255. * [meek](
  256. * meek is a blocking-resistant pluggable transport for Tor. It encodes a data stream as a sequence of HTTPS requests and responses. Requests are reflected through a hard-to-block third-party web server in order to avoid talking directly to a Tor bridge. HTTPS encryption hides fingerprintable byte patterns in Tor traffic.sek
  257. * [HTTPLeaks](
  258. * HTTPLeaks - All possible ways, a website can leak HTTP requests
  259. * [haven](
  260. * Android application that leverages on-device sensors to provide monitoring and protection of physical spaces.
  261. --------------------------
  262. ## <a name="counter"></a>Counter Surveillance
  263. * **Articles**
  264. * **Writeups**<a name="cwriteup"></a>
  265. * Detecting Surveillance - Spiderlabs blog
  266. * [1 Hardware Implants](
  267. * [2 Radio Frequency Exfiltration](
  268. * [3 Infected Firmware](
  269. * [A Simple Guide to TSCM Sweeps](
  270. * [Dutch-Russian cyber crime case reveals how police tap the internet - ElectroSpaces](
  271. * **Presentations/Talks/Videos**<a name="cvideos"></a>
  272. * [PISSED: Privacy In a Surveillance State Evading Detection - Joe Cicero - CYPHERCON11 ](
  273. * [Fuck These Guys: Practical Countersurveillance Lisa Lorenzin - BsidesSF15](
  274. * We've all seen the steady stream of revelations about the NSA's unconstitutional, illegal mass surveillance. Seems like there's a new transgression revealed every week! I'm getting outrage fatigue. So I decided to fight back... by looking for practical, realistic, everyday actions I can take to protect my privacy and civil liberties on the Internet, and sharing them with my friends. Join me in using encryption and privacy technology to resist eavesdropping and tracking, and to start to opt out of the bulk data collection that the NSA has unilaterally decided to secretly impose upon the world. Let's take back the Internet, one encrypted bit at a time.
  275. * [Dr. Philip Polstra - Am I Being Spied On?](
  276. * Talk on cheap/free counter measures
  277. * [DNS May Be Hazardous to Your Health - Robert Stucke](
  278. * Great talk on attacking DNS
  279. * [Blinding The Surveillance State - Christopher Soghoian - DEF CON 22](
  280. * [CounterStrike Lawful Interception](
  281. * This short talk will cover the standards, devices and implementation of a mandatory part of our western Internet infrastructure. The central question is whether an overarching interception functionality might actually put national Internet infrastructure at a higher risk of being attacked successfully. The question is approached in this talk from a purely technical point of view, looking at how LI functionality is implemented by a major vendor and what issues arise from that implementation. Routers and other devices may get hurt in the process.
  282. * [Slides](
  283. * [Detecting and Defending Against a Surveillance State - Robert Rowley - DEF CON 22](
  284. * [Retail Surveillance / Retail Countersurveillance 50 most unwanted retail surveillance technologies / 50 most wanted countersurveillance technologies](
  285. * [Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring** - Defcon22](
  286. * Sometimes, hiding the existence of a communication is as important as hiding the contents of that communication. While simple network tunneling such as Tor or a VPN can keep the contents of communications confidential, under active network monitoring or a restrictive IDS such tunnels are red flags which can subject the user to extreme scrutiny. Format-Transforming Encryption FTE can be used to tunnel traffic within otherwise innocuous protocols, keeping both the contents and existence of the sensitive traffic hidden. However, more advanced automated intrusion detection, or moderately sophisticated manual inspection, raise other red flags when a host reporting to be a laser printer starts browsing the web or opening IM sessions, or when a machine which appears to be a Mac laptop sends network traffic using Windows-specific network settings. We present Masquerade: a system which combines FTE and host OS profile selection to allow the user to emulate a user-selected operating system and application-set in network traffic and settings, evading both automated detection and frustrating after-the-fact analysis.
  287. * [Slides](
  288. * [The NSA: Capabilities and Countermeasures** - Bruce Schneier - ShmooCon 2014](
  289. * Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on their offensive capabilities: packet injection attacks from the Internet backbone, exploits against endpoint computers and implants to exfiltrate information, fingerprinting computers through cookies and other means, and so on. I will then talk about what sorts of countermeasures are likely to frustrate the NSA. Basically, these are techniques to raise the cost of wholesale surveillance in favor of targeted surveillance: encryption, target hardening, dispersal, and so on.
  290. * [Wagging the Tail:Covert Passive Surveillance - Si, Agent X - DEF CON 26](
  291. * This talk will focus on mobile and foot surveillance techniques used by surveillance teams. It will also include tips on identifying if you are under surveillance and how to make their life difficult.
  292. * **Papers**<a name="cpapers"></a>
  293. * [Ghostbuster: Detecting the Presence of Hidden Eavesdroppers](
  294. * [Exploiting Lawful Intercept to Wiretap the Internet](
  295. * This paper will review Cisco's architecture for lawful intercept from asecurity perspective. We explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. We then provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.
  296. * [Protocol Misidentification Made Easy with Format-Transforming Encryption](
  297. * Deep packet inspection (DPI) technologies provide much needed visibility and control of network traffic using port- independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, we provide the first comprehensive evaluation of a large set of DPI systems from the point of view of protocol misidentification attacks, in which adver- saries on the network attempt to force the DPI to mislabel connections. Our approach uses a new cryptographic prim- itive called format-transforming encryption (FTE), which extends conventional symmetric encryption with the ability to transform the ciphertext into a format of our choosing. We design an FTE-based record layer that can encrypt arbitrary application-layer traffic, and we experimentally show that this forces misidentification for all of the evaluated DPI systems. This set includes a proprietary, enterprise-class DPI system used by large corporations and nation-states. We also show that using FTE as a proxy system incurs no latency overhead and as little as 16% bandwidth overhead compared to standard SSH tunnels. Finally, we integrate our FTE proxy into the Tor anonymity network and demon- strate that it evades real-world censorship by the Great Fire- wall of China
  298. * [Protocol Misidentification Made Easy with Format-Transforming Encryption](
  299. * Deep packet inspection DPI technologies provide much- needed visibility and control of network traffic using port- independent protocol identification, where a network ow is labeled with its application-layer protocol based on packet contents. In this paper, we provide the most comprehensive evaluation of a large set of DPI systems from the point of view of protocol misidentification attacks, in which adver- saries on the network attempt to force the DPI to mislabel connections. Our approach uses a new cryptographic primitive called format-transforming encryption FTE, which extends conventional symmetric encryption with the ability to transform the ciphertext into a format of our choosing. We design an FTE-based record layer that can encrypt arbi- trary application-layer traffic, and we experimentally show that this forces misidentification for all of the evaluated DPI systems. This set includes a proprietary, enterprise-class DPI system used by large corporations and nation-states. We also show that using FTE as a proxy system incurs no latency overhead and as little as 16% bandwidth overhead compared to standard SSH tunnels. Finally, we integrate our FTE proxy into the Tor anonymity network and demonstrate that it evades real-world censorship by the Great Firewall of China.
  300. * [Unblocking the Internet: Social networks foil censors](
  301. * Many countries and administrative domains exploit control over their communication infrastructure to censor online content. This paper presents the design, im plementation and evaluation of Kaleidoscope , a peer-to-peer system of relays that enables users within a censored domain to access blocked content. The main challenge facing Kaleidoscope is to resist the cens or’s efforts to block the circumvention system itself. Kaleidoscope achieves blocking-resilienc e using restricted service discovery that allows each user to discover a small set of unblocked relays while only exposing a small fraction of relays to the censor. To restrict service discovery, Kaleidoscope leverages a trust network where links reflects real-world social relationships among users and uses a limited advertisement protocol based on random routes to disseminate relay addresses along the trust netwo rk; the number of nodes reached by a relay advertisement should ideally be inversely proportional to the maximum fraction of infiltration and is independent of the network size. To increase service availa bility in large networks with few exit relay nodes, Kaleidoscope forwards the actual data traffic across multiple relay hops without risking exposure of exit relays. Using detailed analysis and simulations, we show that Kaleidoscope provides > 90% service availability even under substantial infiltration (close to 0.5% of edges) and when only 30% of the relay nodes are online. We have implemented and deployed our system on a small scale serving over 100,000 requests to 40 censored users (relatively small user base to realize Kaleidoscope’s anti-blocking guarantees) spread across different countries and administrative domains over a 6-month period
  302. * [Chipping Away at Censorship Firewalls with User-Generated Content](
  303. * Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are relatively easy for a censor to discover and block. This paper offers a possible next step in the cen- sorship arms race: rather than relying on a single system or set of proxies to circumvent censorship firewalls, we explore whether the vast deployment of sites that host user-generated content can breach these firewalls. To explore this possibility, we have developed Collage, which allows users to exchange messages through hidden chan- nels in sites that host user-generated content. Collage has two components: a message vector layer for embedding content in cover traffic; and a rendezvous mechanism to allow parties to publish and retrieve messages in the cover traffic. Collage uses user-generated content (e.g. , photo-sharing sites) as “drop sites” for hidden messages. To send a message, a user embeds it into cover traffic and posts the content on some site, where receivers retrieve this content using a sequence of tasks. Collage makes it difficult for a censor to monitor or block these messages by exploiting the sheer number of sites where users can exchange messages and the variety of ways that a mes- sage can be hidden. Our evaluation of Collage shows that the performance overhead is acceptable for sending small messages (e.g., Web articles, email). We show how Collage can be used to build two applications: a direct messaging application, and a Web content delivery system
  304. * [Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability](
  305. * Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems allow users to conceal the destinations they communicate with, but do not hide the fact that the users are using them. The mere use of such systems may invite suspicion, or access to them may be blocked. We therefore propose Cirripede, a system that can be used for unobservable communication with Internet destinations. Cirripede is designed to be deployed by ISPs; it intercepts connections from clients to innocent-looking desti- nations and redirects them to the true destination requested by the client. The communication is encoded in a way that is indistinguishable from normal communications to anyone without the master secret key, while public-key cryptogra- phy is used to eliminate the need for any secret information that must be shared with Cirripede users. Cirripede is designed to work scalably with routers that handle large volumes of traffic while imposing minimal over- head on ISPs and not disrupting existing traffic. This allows Cirripede proxies to be strategically deployed at central lo- cations, making access to Cirripede very difficult to block. We built a proof-of-concept implementation of Cirripede and performed a testbed evaluation of its performance proper- ties
  306. * [TapDance: End-to-Middle Anticensorship without Flow Blocking](
  307. * In response to increasingly sophisticated state-sponsored Internet censorship, recent work has proposed a new ap- proach to censorship resistance: end-to-middle proxying. This concept, developed in systems such as Telex, Decoy Routing, and Cirripede, moves anticensorship technology into the core of the network, at large ISPs outside the censoring country. In this paper, we focus on two technical obstacles to the deployment of certain end-to-middle schemes: the need to selectively block flows and the need to observe both directions of a connection. We propose a new construction, TapDance, that removes these require- ments. TapDance employs a novel TCP-level technique that allows the anticensorship station at an ISP to function as a passive network tap, without an inline blocking com- ponent. We also apply a novel steganographic encoding to embed control messages in TLS ciphertext, allowing us to operate on HTTPS connections even under asymmetric routing. We implement and evaluate a TapDance proto- type that demonstrates how the system could function with minimal impact on an ISP’s network operations.
  308. * [Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92](
  309. * [Ghostbuster: Detecting the Presence of Hidden Eavesdroppers]()]
  310. * **Misc**
  311. * [Laser Surveillance Defeater - Shomer-Tec](
  312. --------------------------
  313. ### <a name="emissions"></a> Emissions Security
  314. * **101**
  315. * **Articles/Blogposts/Writeups**
  316. * **Presentations/Talks/Videos**
  317. * **Papers**
  318. * [Com­pro­mi­sing Re­flec­tions - or - How to Read LCD Mo­ni­tors Around the Cor­ner- Micha­el Ba­ckes, Mar­kus Dür­muth, Do­mi­ni­que Unruh](
  319. * We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our technique exploits reflections of the screen’s optical emanations in various objects that one commonly finds in close proximity to the screen and uses those reflections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons, plastic bottles, and even the eye of the user. We have demonstrated that this attack can be successfully mounted to spy on even small fonts using inexpensive, off-the-shelf equipment (less than 1500 dollars) from a distance of up to 10 meters. Relying on more expensive equipment allowed us to conduct this attack from over 30 meters away, demonstrating that similar at- tacks are feasible from the other side of the street or from a close-by building. We additionally establish theoretical limitations of the attack; these limitations may help to estimate the risk that this attack can be successfully mounted in a given environment.
  320. * [Acoustic Side-Channel Attacks on Printers -Michael Backes,Markus Drmuth,Sebastian Gerling,Manfred Pinkal,Caroline Sporleder](
  321. * We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dot- matrix printer processing English text is printing based on a record of the sound it makes, if the microphone is close enough to the printer. In our experiments, the attack recovers up to 72% of printed words, and up to 95% if we assume contextual knowledge about the text, with a microphone at a distance of 10 cm from the printer. After an upfront training phase, the attack is fully automated and uses a combination of machine learning, audio processing, and speech recognition techniques, including spectrum features, Hidden Markov Models and linear classification; moreover, it allows for feedback-based incremental learning. We evaluate the effectiveness of countermeasures, and we describe how we successfully mounted the attack in-field (with appropriate privacy protections) in a doctor’s practice to recover the content of medical prescriptions.
  322. * [Tempest in a Teapot: Compromising Reflections Revisited](
  323. * Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user’s shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user’s eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user’s clothes, and provide information- theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures
  324. * [GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies - usenix conference](
  325. * **Tools**
  326. * **Miscellaneous**
  327. -------------------------
  328. ### <a name="modern"></a> Modern Surveillance
  329. * **Vendors**
  330. * [](
  331. * **Articles**
  332. * [Understanding & Improving Privacy "Audits" under FTC Orders](
  333. * This new white paper, entitled “Understanding and Improving Privacy ‘Audits’ under FTC Orders,” carefully parses the third-party audits that Google and Facebook are required to conduct under their 2012 Federal Trade Commission consent orders. Using only publicly available documents, the article contrasts the FTC’s high expectations for the audits with what the FTC actually received (as released to the public in redacted form). These audits, as a practical matter, are often the only “tooth” in FTC orders to protect consumer privacy. They are critically important to accomplishing the agency’s privacy mission. As such, a failure to attend to their robust enforcement can have unintended consequences, and arguably, provide consumers with a false sense of security. The paper shows how the audits are not actually audits as commonly understood. Instead, because the FTC order language only requires third-party “assessments,” the companies submit reports that are termed “attestations.” Attestations fundamentally rely on a few vague privacy program aspects that are self-selected by the companies themselves. While the FTC could reject attestation-type assessments, the agency could also insist the companies bolster certain characteristics of the attestation assessments to make them more effective and replicate audit attributes. For example, the FTC could require a broader and deeper scope for the assessments. The agency could also require that assessors evaluate Fair Information Practices, data flows, notice/consent effectiveness, all company privacy assurances, and known order violations.
  334. * **China**<a name="china"></a>
  335. * [ China's Xinjiang Region A Surveillance State Unlike Any the World Has Ever Seen -](
  336. * [China's 5 Steps for Recruiting Spies - Wired](
  337. * **France**
  338. * **Germany**
  339. * **United States**<a name="usa"></a>
  340. * **Japan**
  341. * [The Untold Story of Japan’s Secret Spy Agency - TheIntercept](
  342. * **License Plate Tracking**
  343. * [Private companies know where you've been, thanks to license plate cameras -](
  344. * **Things**
  345. * [RF-Capture](
  346. * RF-Capture is a device that captures a human figure through walls and occlusions. It transmits wireless signals and reconstructs a human figure by analyzing the signals' reflections. RF-Capture does not require the person to wear any sensor, and its transmitted power is 10,000 times lower than that of a standard cell-phone.
  347. * [Paper](
  348. -----
  349. ### <a name="talks">General
  350. * **General**
  351. * [Russia Convention on International Information Security](
  352. * [The Gentleperson’s Guide to Forum Spies](
  353. * [A Digital World Full of Ghost Armies](
  354. * **Articles/BlogPosts/Writeups**
  355. * [25 Rules of Disinformation](
  356. * [8 Traits of the Disinformationalist](
  357. * [Attribution As A Weapon & Marketing Tool: Hubris In INFOSEC & NATSEC](
  358. * [Disinformation of Charlie Hebdo and The Fake BBC Website](
  359. * [Counterintelligence, False Flags, Disinformation, and Network Defense - krypt3ia](
  360. * [PsyOps and Socialbots](
  361. * [IRA Code Words Spell Real Threat](
  362. * [‘A man who’s seen society's black underbelly’ Meduza meets ‘Anonymous International’](
  363. * [Down the Memory Hole: NYT Erases CIA’s Efforts to Overthrow Syria’s Government](
  364. * **Talks**
  365. * [Governments and UFOs: A Historical Analysis of Disinformation and Deception - Richard Thieme](
  366. * [[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction](