John Scott-Railton Profile picture
Feb 27, 2022 15 tweets 8 min read Read on X
Re: @elonmusk's starlink donation.

Good to see.

But remember: if #Putin controls the air above #Ukraine, users' uplink transmissions become beacons... for airstrikes.

Some background 1/
2/ #Russia has decades of experience hitting people by targeting their satellite communications.

In 1996, Chechen president Dzhokhar Dudayev was careful, but Russian aircraft reportedly found his satphone call & killed him with a missile strike.

rferl.org/a/1067831.html
3/ Satellite phones tend to send signals out in all directions.

Making them easy targets.

The technology for locating & intercepting them is well-honed.

This is different from starlink...
4/ In more recent years, other kids of tech has entered the conflict-zone game. Like VSATs.

In Syria, Libya, etc etc. VSATs have played a pivotal role in communications. Everyone uses them.

They have a more *directional* signal & typically provide broadband data.
5/ Still, here are various ways to spot, geolocate, & drop a missile on VSAT satellite internet terminals...

...and #Russia has recent battle-tested experience doing just this in Syria, where ISIS, FSA and everyone else has used them.

Pic: random .ru airstrike.
6/In Syria, ISIS reportedly came up w/ various tactics to avoid being killed by strikes against their satellite internet terminals.

E.g. Distancing dishes from their installations, covertly taking a connection from civilian internet cafes' VSATs, etc..

Deadly cat & mouse.
7/ Takeaway: early in a conflict w/disrupted internet, satellite internet feels like a savior.

But it quickly introduces *very real, deadly new vulnerabilities*

If you don't understand them, people die needlessly until they learn & adapt.

This has happened again. And again.
8/ I've skipped some tech like BGANs, but why should you take anything I say seriously?

Well: I've researched the role & risks of internet & satellite communications during armed conflicts...for a decade.

I'm writing this thread because I see a familiar mistake looming. Again.
9/ Want to read more about connectivity risks in armed conflict?

I wrote this case study to persuade policymakers & militaries to not encourage brave people to paint targets on their backs without knowing the risks.
LINK: digital-commons.usnwc.edu/cgi/viewconten…
10/ A well-resourced military tracks a massive variety of radio emissions during a war.

Even if capabilities are not initially specced out for a novel new communications protocol, if the transmission is interesting enough / the users worth killing, it will be worked on...
11/ People asking about tracking cellphones.

Cellphones are a giant-blinking-risk in a conflict zone. They emit a powerful signal that spills in every direction.

Most countries' militaries have suites of capabilities for them, from things in the air...to things in backpacks.
12/ Every tech should be considered & evaluated.

But if well-meaning people rush an untested-in-war new tech into an active conflict zone like #Ukraine & promote it as "safer"...

They may get people killed.

Russia has big electronic ears.
13/ Remember: encryption doesn't prevent GEOLOCATION based on radio emissions.

A smartphone or satcom user can be on encrypted call, using a VPN, etc. etc. correctly believing that nobody is LISTENING to them... right up until the instant they are nabbed.
14/ Connectivity in #Ukraine is necessary.

Now that Starlink devices are headed into an active conflict zone, though, *possible* risks are about to get battle tested.

I hope that OPSEC is front of mind as decisions are made about terminal distribution, use & placement,
15/ Speaking of... many correspondents in #Ukraine probably have the usual clutch of satphones & BGANs with them.

Many surely remember the tragic death of Marie Colvin & Rémi Ochlik.

I hope everyone is taking great care.

By @JillianYork & @trevortimm
eff.org/deeplinks/2012…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Dec 23
The volume of scam phone calls targeting elderly people in the US is insane.

Anyone that has visited an aging person knows what I'm talking about.

Ring after ring.

Several calls a day isn't out of the ordinary each of them a risk of wiping out their savings.

It's an untenable situation and will only get worse without focused government action.
Phone predators constantly target your parents.

Foreign scam call centers are running on an industrial scale.

Efforts phone companies are making are obviously not up to the task.

Just ask any retired person you know when they last got a scam call.
The constant phone scamming of elderly Americans is like an opportunistic infection.

It is a symptom showing that the US phone system's defenses against foreign abuses are diminished.

With increasingly clever AI/ deepfake voices & automation, the problem is set to get worse.
Read 4 tweets
Dec 23
VPN advertising is the most common source of security misinformation that I encounter.

By far.

So many people misplace their trust in dubious consumer VPN products.

The industry is a scourge.
VPNs don't do most of the things that podcasters imply they do.

Security:
Coffee shop attacks on unencrypted logins are a thing of a decade ago.

VPNs won't stop even the dumbest spyware & phishing.

Privacy:
Advertisers still know it's you when you turn on a VPN... they use many other identifying signals from your device, like your browser & advertising IDs. Those don't change when you turn on a VPN.
Trust:
A lot of VPN companies are shady.... and the industry is consolidating fast around some questionable players with concerning histories.

When you turn on a VPN you entrust all of your data to those companies.
Read 7 tweets
Dec 21
BREAKING: NSO Group liable for #Pegasus hacking of @WhatsApp users.

Big win for spyware victims.

Big loss for NSO.

Bad time to be a spyware company.

Landmark case. Huge implications. 1/ 🧵Image
Image
Image
Image
2/ In 2019, 1,400 @WhatsApp users were targeted with #Pegasus.

WhatsApp did the right thing & sued NSO Group.

NSO has spent 5 years trying to claim that they are above the law.

And engaged in all sorts of maneuvering.

With this order, the music stopped and NSO is now without a chair.Image
Image
3/ Today, the court decided that enough was enough with NSO's gambits & efforts to hide source code.

Judge Hamilton granted @WhatsApp's motion for summary judgement against the #Pegasus spyware maker.

The judge finds NSO's hacking violated the federal Computer Fraud & Abuse Act (#CFAA), California state anti-fraud law #CDFA, and was a breach of contract.

What happens next? The trial proceeds only on the issue of resolving damages stemming from NSO's hacking.

Order: storage.courtlistener.com/recap/gov.usco…Image
Read 12 tweets
Dec 18
NEW: US considering ban on @TPLINK routers.

Company has a majority of the US market share for homes & small biz.

Concerns stem from repeated use in cyberattacks from #China & concerns over supply chain security.

Reportedly an office of @CommerceGov has subpoenaed the company. 1/

Story by @heathersomervil @dnvolz & @aviswanathaImage
Image
Image
Image
2/ @TPLINK has quickly grown market share, even as concerns have grown over vulnerabilities in the routers being used in #China-linked hacking operations.

wsj.com/politics/natio…Image
3/ As Microsoft's @MsftSecIntel reported earlier this year, for example, #TPLINK routers make up the bulk of the CovertNetwork-1658 attack infrastructure.

This operator was conducting so-called password spray attacks, and taking steps to be discrete.

The credentials are then used by multiple #China-based threat actors....

microsoft.com/en-us/security…Image
Image
Image
Image
Read 4 tweets
Dec 18
Use only end-to-end encrypted communications says @CISAgov.

YES!

End-to-end encryption is critical infrastructure for a safe society.

Plenty of other solid guidance for mobile users at risk here.

Let's look at their #iPhone & #Android-specific recs... 1/Image
Image
Image
2/ @CISAgov's top recommendation for Apple users is to✅ enable #LockdownMode

It's my top guidance for high-risk #iPhone users..

Because as researchers tracking sophisticated threats we see Lockdown Mode blunt advanced attacks...

Other solid guidance:

✅Protect your DNS
✅Disable fallback to SMS
✅Enroll in iCloud Private Relay
✅Trim App permissions.Image
Image
3/ @CISAgov's guidance for #Android starts from the unavoidable fact that many Android manufacturers truly don't respect users security or privacy.

So ✅pick a company that won't leave you insecure after 2-3 years.

Other good guidance here includes...
✅ Only use RCS with end-to-end encryption
✅ Using Android Private DNS
✅ Use Enhanced Protection for Safe Browsing
✅ Google Play Protect
✅ Manage permissions.

cisa.gov/sites/default/…Image
Image
Read 4 tweets
Dec 17
NEW: #China #Russia #Iran & #Israel are spying on 🇺🇸Americans using telecom weaknesses says @DHSgov

Deeply concerning on heels of #SaltTyphoon breaches.

All US carriers vulnerable to some extent.

We know this thanks to Sen @RonWyden's tireless work to expose #SS7 & #Diameter vulnerabilities.

Here's how they work...

Story by @josephfcox 1/Image
Image
2/ Here's the thing about the global network for routing calls.

Requests are trusted by default. Whatever operator they come from!

Since requests can let you do things like intercept calls, texts & track phones locations...

...a lot of governments & some shady companies have come running.

All they needed was a "Global Title" which is not hard to get in some jurisdictions.

Result? A tidal wave from around the globe of shady requests for the purpose of spying on people.

Including Americans. In the US.

We @citizenlab exposed Circles, one such player...

Story: 404media.co/dhs-says-china…Image
3/ There's an active global market for companies whose product line revolves around abusing the trusting nature of call routing to conduct surveillance.

We @citizenlab ran scans & mapped deployments of this tech by one such player: Circles.

Circles had previously merged with NSO Group, which makes #Pegasus.

citizenlab.ca/2020/12/runnin…Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(