[liberationtech] New report on Internet Censorship and Surveillance in Turkmenistan
Rafal Rohozinski
r.rohozinski at psiphon.ca
Tue Jan 8 06:45:47 PST 2013
Jacob:
First of all, it's important to recognize that SORM is a system for lawful access to telephone and IP traffic. It is normalized under the laws of the Russian Federation and most of the countries of the former Soviet Union. In other words, it is not a " secret" system, but rather one which is well-known, well-documented and has been around for over 10 years.
The relevant Russia legislation is:
Order of the State Committee of the Russian Federation № 47 of 27.03.99
Order of the Ministry of Communications of the Russian Federation № 73 of 27.05.10.
The company that produces SORM - MFI-SOFT - is quite proud of its product, and others that they produce in the information security market. In fact, here is their marketing video. The part about SORM starts at 3:14
http://youtu.be/mNTWvyXNTLM?t=3m13s ( okay, it's lame, but at least they are advertising it)
As a consequence, the technical characteristics of SORM are quite well-documented. Also, because the system is installed at ISPs, the technical characteristics of its installation are also quite well-known.
By way of a general introduction, here are links to two technical presentations on SORM (2 and 3) the provide some of this technical information, and also a view of the user interface ( which gives you a sense of its capabilities).
SORM 2 - https://docs.google.com/open?id=0B4_SBxiVQGUOTzZhSVc4Q1JqZlk
SORM 3 - https://docs.google.com/open?id=0B4_SBxiVQGUOOHBHa1hDcnA1RzA
The files are in Russian, but nothing that Google translate can't help with :-)
I really don't know if anyone in Europe, Canada, or the US has procured NetBeholder. But the fact that the company stopped advertising it openly on their website in 2010 leads me to believe that their success in this market space was rather small. Contrary to popular belief, LEA tools are not big business, and bring a lot of liability to companies so usually they tend to sell to home markets where they have a guaranteed monopoly and stable revenues.
The only thing I can say about why they were marketing from Canada is related to some circumstantial evidence I received a few years ago that the Canadian subsidiary was selling Netbeholder as a "Canadian product" in a variety of south countries. However, I'd stress this is circumstantial evidence so nothing hard and fast. However, If you take a look at the SORM product page, you will see that they have adapted it to work with a wide range of equipment including Nortel, Broadworks and Ericsson, so it's not inconceivable that there may be existing installations in North America and elsewhere outside the CIS <http://www.mfisoft.ru/products/sorm/sorm1/nortel> . MFI claims its products are in 84 countries. If you look at the ALOE website, they do list a number of SIP providers in the US that use MFI equipment. However, since MFI/ALOE also resells VoIP soft switches, it's really unclear what they might be using. <http://www.aloe-systems.com/company/clients#usa>.
> This is a rather difficult thing to do - it seems not worth doing. These
> guys are already working on reducing detectability, aren't they?
Because the system is not secret, and is legally mandated, no, the builders have not made it particularly stealthy.
Rafal
On Jan 7, 2013, at 8:02 PM, Jacob Appelbaum <jacob at appelbaum.net> wrote:
> Rafal Rohozinski:
>> John,
>>
>> With respect to SORM-II, the "signatures" are based upon the
>> technical characteristics of the system rather than something that's
>> detectable by protocol scanning.
>
> What are the technical characteristics of SORM-II?
>
>> In a nutshell, SORM-II boxes
>> located on remote network segments (i.e. ISP's or other providers)
>> require a separate command channel for tasking and data backhaul.
>
> Detectable by what means? Is this the Kim Dot Com extra latency issue?
> Is this just another box found on a related network?
>
>> In some installations, this is a separate physical channel, and
>> others it is virtualized through the ISPs connection their upstream
>> provider or IXP (usually at the the central telephone switch).
>> Consequently, while the device itself does not have a detectable
>> signature, the control channel is a defining feature. The
>> challenge is in detecting the control channel. We have report
>> pending on SORM that should be released sometime during the late
>> spring of 2013.
>
> Can you give us a simple example?
>
>> We are trying to decide how and what to publish so
>> as to share usable knowledge without revealing tradecraft that would
>> allow the developers of SORM (II and III) to reduce detectability.
>
> Don't
>
>> BTW - SORM II is commercially available in the European, US and
>> Canadian under the brand name "NetBeholder" so those of you with
>> deep pockets should buy a set up and reverse engineer it
>> http://www.netbeholder.com/en/products.html … the company even has a
>> street address in Toronto, for those of you that want to visit. :-)
>>
>
> Has it been found on Canadian networks? Who uses it?
>
> All the best,
> Jacob
> --
> Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130108/e9b4ec30/attachment.html>
More information about the liberationtech
mailing list