Donate for the Cryptome archive of files from June 1996 to the present

7 January 2012

Obama Called a Moron at Phone Security

From TSCM-220 mail list: http://groups.google.com/group/tscm-l2006?hl=en_US


Date: Fri, 06 Jan 2012 15:40:24 -0500
To: tscm-l2006[at]googlegroups.com
From:
Subject: [TSCM-L] {5984} POTUS telephones

There's a very nice collection of dozens of photos of current POTUS telephones in use on John Young's Cryptome site.  The trained eye will notice some interesting TSCM-related items. 

http://cryptome.org/2012-info/obama-phones/0015.htm


Date: Fri, 06 Jan 2012 17:00:07 -0500
From: "James M. Atkinson" <jmatk[at]tscm.com>
To: tscm-l2006[at]googlegroups.com
Subject: Re: [TSCM-L] {5986} POTUS telephones

Most of these are CISCO IP phones, or Avaya telephone sets.

Amazing complex instrument with some simply lovely security holes that an eavesdropper can exploit.

http://www.cisco.com/en/US/products/ps9748/index.html
http://www.cisco.com/en/US/products/ps8538/index.html
http://www.cisco.com/en/US/products/hw/phones/ps379/ps5440/index.html
http://www.cisco.com/en/US/products/hw/phones/ps379/index.html

A lot of these phones are also Lucent MLS of Definite phones (all an eavesdroppers paradise).

I really hate to have to mention this, but in the following image. You will notice the moron who is using a cell phone right next to a STE.

http://cryptome.org/2012-info/obama-phones/pict52.jpg

[Image]

Same here. Moron using cell phone in close proximity to a secure telephone:

http://cryptome.org/2012-info/obama-phones/pict30.jpg

[Image]

When you place a concentrated RF signal transmitter in close proximity to a piece of cryptographic gear (like a STU or STE) the RF signals and strong enough to intermix with the RF or magnetic signals and create a third signal.  This is most valuable with cryptographic equipment that used cables that was not in conduit as the cable (seem in these pictures) provides a high threat access point where all kinds of havoc can be caused if a cell phone is brought within 8-12 feet of a STU, or 16+ feet of a STE. You will notice that the moron holding the phone is well within those distances.

The following image just proved what a utter moron this guy is, and remember who is is:

http://cryptome.org/2012-info/obama-phones/pict29.jpg

[Image]

Notice that he is in a STE, in secure mode, and the STE (unencrypted voice path) is draped over a live RF transmitter.

I apologize Mr. President, but you sir are a fscking moron, just an utter moron.

Observers with sharp eyes will also notice the profoundly sloppy jobs of TSCM that is being done on these phones as well, and how the routing requirements for cables are not beign observered, but then that is the least of their probelms... their boss obviously does not care, so why shoudl they.

Dude, WTF... no seriously, WTF?

-jma

James M. Atkinson
President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662
Granite Island Group
jmatk[at]tscm.com
http://www.tscm.com/
(978) 546-3803


Date: Fri, 06 Jan 2012 17:53:00 -0500
To: tscm-l2006[at]googlegroups.com
From:
Subject: Re: [TSCM-L] {5987} POTUS telephones

Are executives at the highest levels expected to be TSCM, COMSEC, and TEMPEST experts who possess detailed technical knowledge and extensive related experience?

If yes, then why would any top executive have any need to hire experts in those fields?  Does JMA call his executive clients (who aren't as well-versed in those fields as he obviously is) "fucking morons?"  That doesn't seem like an effective business practice to me.

Perhaps the executive in the photo wasn't briefed by his experts on the finer points of proper COMSEC--such as not to use a cell phone near a STE.  If he wasn't, then perhaps those experts are to blame, not the executive.  Or maybe there's other protections in place which prevent that from being a COMSEC problem.  There is equipment in those photos that probably none of us know the workings of...


Date: Fri, 06 Jan 2012 18:19:17 -0500
From: "James M. Atkinson" <jmatk[at]tscm.com>
To: tscm-l2006[at]googlegroups.com
Subject: Re: [TSCM-L] {5989} POTUS telephones

Actually yes.

He knows that he can not use a cellphone within X feet of a STU, STE, or security communications media because he can read the white papers on the matter, and has been briefed by the technical advisors until they were blue in the face, but he does not care, he likes his cell phones (because it makes him a more effective leader)

If a customer hires me to tell them about the problem, and I tell them about it, write numerous white papers on the subject for them, demonstrate the risk for them by recovering classified information, and even the CIK form a STU using only a nearby cell phone, and they still refuse to use proper communications security, and abide by stand-off distances (the space between the secure phone and the cell phone), then I will have no problems explain that they are a moron to their face (usually in private, but still).

You need only to watch the video of my testimony before Congress on related matters to see that I tend not to couch my words when it comes to national security matters like this.

The President of the United States is a fucking moron, but given the last pool of candidates he is less of a moron, then the other morons we had running at the time. But still, he is a moron, and an arrogant one at that.

-jma


Date: Fri, 06 Jan 2012 18:42:24 -0500
To: tscm-l2006[at]googlegroups.com
From:
Subject: Re: [TSCM-L] {5990} POTUS telephones

So you know this for a fact?  I would think POTUS has more important things to do than "read the white papers" about TSCM.  Arrogant?  Relative to whom?


Date: Fri, 06 Jan 2012 19:17:28 -0500
From: "James M. Atkinson" <jmatk[at]tscm.com>
To: tscm-l2006[at]googlegroups.com
Subject: Re: [TSCM-L] {5992} POTUS telephones

I wrote the white paper, and the paper has been repeatedly briefed to him by the DCI in his Daily Presidential Briefing. He has also read the white paper, but it has not dissuaded his cell phone mis-use. Several DCI staffers who prepare the PDB have assured me that the DCI has repeatedly included issue several times in the PDB, and POTUS just does not care.

The threat is known, the threat has been demonstrated, the threat has been replicated by others, it is a known and confirmed weakness, but he does not care, not even slightly.

Some Presidents like to ride around Dallas in open top limos, other are addicted to their cell phones... neither tend to remain in office too long.

He needs to smarten up, as he is risking national security and sabotaging international diplomacy (easily screwed up when secure communications are intercepted).

-jma


Date: Sat, 07 Jan 2012 11:44:11 -0500
From: "James M. Atkinson" <jmatk[at]tscm.com>
Subject: Re: Your Comments on Prez Phones
To: Cryptome

You have my permission to publish anything that you see on the TSCM-L list so long as I am the originator of the post.

You have my permission to publish the information that I published about the Presidents phone, and the comments I made in regards to his being warned not to do it.

Here is something about STU/STE and cell phones

http://www.tscm.com/stu.html

TEMPEST, HIJACK, NONSTOP, and TEAPOT Vulnerabilities A STU-III is a highly sophisticated digital device; however, they suffer from a particular nasty vulnerability to strong RF signals that if not properly addressed can cause the accidental disclosure of classified information, and recovery of the keys by an eavesdropper. While the unit itself is well shielded, the power line feeding the unit may not have a clean ground (thus negating the shielding).

If the encryption equipment is located within six to ten wavelengths of a radio transmitter (such as a cellular telephone, beeper, or two way radio) the RF signal can mix with the signals inside the STU and carry information to an eavesdropper. This six to ten wavelengths is referred to as the "near field" or the wave front where the magnetic field of the signal is stronger then the electrical field.

As a rule all COMSEC equipment should be kept out the "near field" by a factor of at least 2.5 to 3 times to get it outside of the field transition point. Simply put, there needs to be a "danger zone" or exclusion zone around any and all COMSEC gear 2.5 to 3 times the near field distance, or 16 to 30 times the longest signal wavelength (the lower the frequency the longer the wavelength).

A "wavelength" is inversely proportional to frequency being used which means that an 800 MHz cellular phone (near a STU) presents a greater direct threat that a higher frequency PCS phone operating in the 1.7 GHz region. On the other hand a PCS or CDMA telephone creates a greater spectral density and far more transitions which allows an eavesdropper to corelate on the signal with more precision.

We also have to consider the amplitude of the signals as well as the "danger zone" created by the transition point or radius of the near field (times 2.5 to 3). When any RF signals inside the "danger zone" exceed -50 dBm (or -77 dBm in some cases) there is still a problem even though the cryptographic equipment is some distance from the actual transmitter, cellular phone, pager, etc. These relatively high signal levels (above -50 dBm or -77 dBm) are actually strong enough that they create secondary fields or signals when they encounter the outside of the equipment case or any other conductive or non-linear element. This is called the "saturation effect", and if it is not properly addressed can result in the cryptographic equipment put at risk of disclosing secrets. Typically the ambient RF environment near any cryptographic equipment should be well below -80 dBm and in some cases well below -110 dBm. Fields of this strength are common near broadcast facilities such as FM or television transmission towers or cellular/PCS towers. If you have a concern of this nature then you should contact a TSCM professional and schedule an evaluation of the RF in the vicinity of where you will be using your encryption equipment.

The critical thing to remember in all of this is that the ciphering key is where all the magic is at, and that the eavesdropper will typically target the ciphering circuit (or "Scrambler") to obtain the secret key. Sure they are interested in the material being scrambled by the cryptographic system, and they will also be interested in the inner workings of the phone, but it is obtaining the secret ciphering key that is most important to the spy. An encryption box or cryptographic device may only be classified secret, and yet the keying material is top secret, and the keying material is far more sensitive then the box itself, and must be protected with much greater care.

On a related note, it should be mentioned that the ciphering key is actually of a fairly small length, and that is even if a very small segment of it is compromised the eavesdropper's may be able to reconstruct it in whole (depending on what segment they get). In some cases even a 200 bit ciphering key can be broken by obtaining a small fragment the cipher which can be "snatched from the airwaves in less a ten millionth of a second" (if the cryptographic ignition key is loaded when in the presence of a cellular phone or strong RF field). Once the key is loaded into the cryptographic device the amount of time required to reconstruct the key is significantly larger, but not at all prohibitive. Remember, the eavesdropper is only looking for a few bits of data (the payload of the key), and that this small number of bits can be "hijacked" by an external RF source like a cellular phone as a highjack requires an absolute minimum of bandwidth.

Since the signal of interest is of extremely narrow bandwidth, and the "illuminating" signal can be easily correlated to the "signal of interest" the eavesdropper can be a considerable distance away from the encryption device and still perform the highjack (called "correlation gain", which can be well over 40 dB). This assumes that someone using the encryption device has a cell phone or other RF device on their person, that while not on an active call is still checking in with the base station for status updates on a regular basis. Without this "correlation gain" the intercept may only be feasible within a few feet, but with it; the eavesdropper can be 500 and even 1500 feet away.

Remember that the most valuable "item of interest" is not directly the clear text communication itself, but the key used to protect the communication. Once the eavesdropper has the key, then the communication itself would be targeted and exploited. You must protect the key at all times.

NEXTEL or Motorola iDen phones based on a TDMA or "Time Domain" signal presents a really nasty threat as the cell phone is constantly strobing a specific predictable time slice, and basically illuminates the STU and turns it into a strobing lighthouse that will seriously compromise classified information. If a NEXTEL is present within 12-15 feet of a STU-III (when it goes secure or a CIK is loaded) the phone and information passed though it should be considered compromised. The STU should always be located in an area called an exclusion zone, and cellular phones, pagers, beepers, and other RF devices should be kept outside of a stand-off zone of at least 15-20 feet (30 foot is good practice).

Now if this wasn't confusing enough; portable Inmarsat stations also present a similar problem, but only if the STU is located in front of the transmitter antenna or within the side lobes of the signal (about 45 degrees off the center axis of the antenna).

The best way to deal with this is to never have a cellular telephone or pager on your person when using a STU, or within a radius of at least thirty feet (in any direction) from an operational STU (even with a good ground). If the STU is being used in a SCIF or secure facility a cell phone is supposed to be an excluded item, but it is simply amazing how many government people (who know better) forget to turn off their phone before entering controlled areas and thus cause classified materials to be compromised.

Spook Hint: If you have a powered up NEXTEL on your belt and you walk within 12 feet of a STU-III in secure mode you have just compromised the classified key.

In the case where the STU is being used on a cell phone or satellite phone your best option is to keep the phone in analog mode (a STU, not a STE) and locate the STU a good 6-12 feet away from the antenna. In the case of an Inmarsat terminal simply keep the STU BEHIND the antenna by at least 10-15 feet (this is why Inmarsat terminals have long cables for the antenna). If you can obtain a digital Inmarsat connection you can get a very high quality connection, but the equipment is fairly costly, the terminal is quite large, and the digital service quite expensive.

At no time should a STU-III be operated in the presence of an RF field that exceeds -105 dBm for any signal with less then 30 kHz of occupied bandwidth. In the case of a signal which the occupied bandwidth exceeds 30 kHz the RF levels should not exceed -138 dBm.

Convenience and Security are Always Inversely Proportional.

- James M. Atkinson, 1982

Here is some further unclassified background on the matter (the data on the matter was in my written testimony).

http://www.tscm.com/DeepWaterDooDoo/

http://www.tscm.com/DeepWaterDooDoo/JamesAtkinsonwrittenTestimony.pdf

TEMPEST in a TEAPOT and HIJACK Exploits

Between the TEMPEST and TSCM fields of study there is also an area of our field that deals with unmodified or quasi-modified equipment and signals, which interact with each other. This is the case where in effect a classified signal or classified information is accidentally impressed onto an unclassified signal. Thus, the unclassified signal carrying the classified data with it is accidentally transmitted a considerable distance allowing for eavesdropping by those who should not possess the information. This is usually the result of TEMPEST standards not being rigorously followed during equipment design, installation, and maintenance.

The investigation, study, and control of intentional compromising emanations from telecommunications and automated information systems equipment that was created, provoked, or induced by a spy is known by the code name of “TEAPOT”. An example of this would be the positioning of a rack of two way radios need a secure telephone, or by installing RED cable near to a BLACK cable. This can also involve modifications to software, to slight breaches to the configuration of equipment.

An example of this would be a case where a cable, which contains only unclassified radar, navigation, or communications signals, is placed near a cable, which carries highly classified information. On a maritime vessel an example of an unclassified signal would be the VHF marine radios, the unencrypted HF (shortwave) radio communication systems, and sections of the radar and IFF systems. Should any of these cables or equipment be placed near the classified systems an eavesdropper could intercept the classified information that was riding-on-the-back-of the unclassified signals.

Another example of this would be a warship that downloads classified spy satellite imagery through the onboard satellite communication system.

The problem is that the installer of the classified system has not properly installed the system that creates considerable TEMPEST problems causing these signals to leak off the ship a short distance. This is further complicated by several cables which do not carry classified information but which pass in close proximity to the classified cables.

Due to the unclassified cable, perhaps being a high power antenna link the classified information can now leak out of the ship and be monitored by spies from dozens, if not hundreds of miles distant.

Testimony of James M. Atkinson, President and Sr. Engineer, Granite Island Group 9 of 168
Before the House Committee on Transportation and Infrastructure
U.S. Coast Guard Budget and Oversight Hearing, April 18, 2007

There is other related information in the above PDF file, all of which you have permission to publish on Cryptome as you see fit.

Warmest Regards,

-jma