[Infowarrior] - How to DDOS a federal wiretap

Richard Forno rforno at infowarrior.org
Thu Nov 12 12:38:38 UTC 2009


(paper link@ http://micah.cis.upenn.edu/papers/calea.pdf)

How to DDOS a federal wiretap
By Robert McMillan
November 11, 2009 08:40 PM ET
http://www.computerworld.com/s/article/9140717/How_to_DDOS_a_federal_wiretap?taxonomyId=17

IDG News Service - Researchers at the University of Pennsylvania say  
they've discovered a way to circumvent the networking technology used  
by law enforcement to tap phone lines in the U.S.
The flaws they've found "represent a serious threat to the accuracy  
and completeness of wiretap records used for both criminal  
investigation and as evidence in trial," the researchers say in their  
paper, set to be presented Thursday at a computer security conference  
in Chicago.

Following up on earlier work on evading analog wiretap devices called  
loop extenders, the Penn researchers took a deep look at the newer  
technical standards used to enable wiretapping on telecommunication  
switches. They found that while these newer devices probably don't  
suffer from many of the bugs they'd found in the loop extender world,  
they do introduce new flaws. In fact, wiretaps could probably be  
rendered useless if the connection between the switches and law  
enforcement are overwhelmed with useless data, something known as a  
denial of service (DOS) attack.

Four years ago, the University of Pennsylvania team made headlines  
after hacking an analog loop extender device they'd bought on eBay.  
This time, the team wanted to look at newer devices, but they couldn't  
get a hold of a switch. So instead they took a close look at the  
telecommunication industry standard -- ANSI Standard J-STD-025 -- that  
defines how switches should transmit wiretapped information to  
authorities. This standard was developed in the 1990s to spell out how  
telecommunications companies could comply with the 1994 Communications  
Assistance for Law Enforcement Act (CALEA).

"We asked ourselves the question of whether this standard is  
sufficient to have reliable wiretapping," said Micah Sherr, a post- 
doctoral researcher at the university and one of the paper's co- 
authors. Eventually they were able to develop some proof-of-concept  
attacks that would disrupt devices. According to Sherr, the standard  
"really didn't consider the case of a wiretap subject who is trying to  
thwart or confuse the wiretap itself."

It turns out that the standard sets aside very little bandwidth -- 64K  
bits per second -- for keeping track of information about phone calls  
being made on the tapped line. When a wire tap is on, the switch is  
supposed to set up a 64Kbps Call Data Channel to send this information  
between the telco and the law enforcement agency doing the wiretap.  
Normally this channel has more than enough bandwidth for the whole  
system to work, but if someone tries to flood it with information by  
making dozens of SMS messages or VoIP (voice over Internet protocol)  
phone calls simultaneously, the channel could be overwhelmed and  
simply drop network traffic.

That means that law enforcement could lose records of who was called  
and when, and possibly miss entire call recordings as well, Sherr said.

Back in 2005, the FBI downplayed the Penn team's loop extender  
research, saying that it applied to only about 10 percent of wire  
taps. The J- standard studied in this paper is much more widely used,  
however, Sherr said. An FBI representative did not return messages  
seeking comment for this story.

The researchers wrote a program that connected to a server over  
Sprint's 3G wireless network 40 times per second, enough to flood the  
Call Data Channel. They say that they could get the same results by  
programming a computer to make seven VoIP calls per second or to fire  
off 42 SMS messages per second.

These techniques would work on mobile phones or VoIP systems, but not  
on analog devices, Sherr said.

Because the researchers weren't able to test their techniques on real- 
world systems they don't know for certain that they could thwart a  
wiretap. But Sherr believes that "there are definitely dangers" in the  
way the standard is written. "Because it's a black-box system, we  
don't know for sure."

Of course, criminals have plenty of easier ways to dodge police  
surveillance. They can use cash to buy prepaid mobile phones  
anonymously, or reach out to their accomplices with encrypted Skype  
calls, said Robert Graham, CEO with Errata Security. Luckily for the  
cops, criminals usually don't take their communications security that  
seriously. "Most criminals are stupid," he said. "They just use their  
same cell phone."


More information about the Infowarrior mailing list