We’ve been warning about this for literally three decades, ever since CALEA mandated wiretap-ready telecom infrastructure. And this is merely the latest example of how these dangerous interfaces can be turned against us by our adversaries.
https://mastodon.social/@fj/113253726161428151
Tl;dr: creating one-stop shopping for attackers is a bad idea.

Exploits of "lawful access" interfaces, such as the Chinese attack reported today by the WSJ, appeared almost immediately after they became standardized in the 90's. The most famous example is the case known as "the Athens Affair" https://spectrum.ieee.org/the-athens-affair .

It was a bad idea then, and still a bad idea now.

The Athens Affair

How some extremely smart hackers pulled off the most audacious cell-network break-in ever

IEEE Spectrum
The Athens Affair is interesting for a number of reasons, but it's particularly notable that the switch that was compromised didn't actually have the CALEA option installed from the factory (since it wasn't then required in Greece). But it was added through a software update (induced by the attacker), and then exploited.
Anyway, my "told you so" muscles are pretty weary at this point.
Also, I'd be remiss if I didn't note that all the reasons that "lawful access" features in telecom infrastructure are risky apply at least equally to the periodically revived proposals for "key escrow" backdoors in cryptographic systems. Fortunately, we've mostly held back the tide on those, but they come up every few years. It would be a security disaster if they're ever mandated.

Mandated wiretap interfaces and cryptographic backdoors are *expensive*, both in terms of money and, more importantly, exposure to risk. Worse, those burdens are borne inequitably.

Overall, almost no one is the subject of a lawful wiretap, even in places where wiretapping is an important investigative tool. Most people aren't suspects. But these mandates degrade security (and impose other costs) for *everyone*, the vast majority of whom will never be wiretapped.

A far more equitable, more secure, and less expensive approach is to devote law enforcement resources to targeting actual suspects, e.g., by the traditional methods such as informants and technical approaches such as "lawful hacking". While these aren't particularly pleasant for those targeted by warrants, they have the great virtue of allowing law enforcement to do its work without degrading security or privacy for the rest of us.
Every now and then the police execute search warrants on physical places. It would certainly be *easier* if we mandated that everyone keep their doors unlocked. But that would be crazy; in the name of solving crimes, we'd be vastly increasing the burglary rate. A much better approach - the one we use - is to buy the police lockpicks and battering rams for use in the relatively small number of cases where they're needed.
Another problem with these "lawful intercept" and "lawful access" mandates: they've suffered from automation creep. When CALEA was envisioned and passed, wiretaps would be at least partly manually provisioned, requiring someone at the central office to complete a work order or physically connect something. Over time, much of that work has been automated, controlled entirely by software. The effect has been an amplification of the risks. Compromises that were once retail are now wholesale.
And that seems to be exactly what we saw with the breach reported by the WSJ. In the "Athens Affair" two decades earlier, a hundred or so subscribers were intercepted, in a major offensive intelligence operation. But today, the Chinese government managed to compromise two major US telecom carriers, likely with similar levels of effort.

Also, these wiretapping systems have become so bloated and complicated (a security risk in and of itself) that there are now intermediate service providers that act as a buffer between carriers and law enforcement. Compromise one of them, and you've hit the interception jackpot.

I wouldn't be surprised if that's what happened here.

In a different context, the compromise of intermediary service providers was the primary vector by which Russian intelligence was able to breach many states' election system backends in 2016. It's a very powerful attack surface.

@mattblaze

“The purpose of a system is what it does.” 🤷🏻‍♂️

@mattblaze
Also no one ever remembers when post 9/11 AT&T, Sprint and Verizon had employees in the FBI anti-terror office with terminals to do quicker lookups. Pretty quickly the minimal paperwork was dispensed with and FBI agents would just write down phone numbers on post-it notes and hand it to them to get chains

Before the office of inspector general report came out, Obama's DoJ retroactively legalized it.

Backdoors don't just get hacked, they get abused.

@mattblaze Remember:

The only winning move is to commit "#AssetDenial" and commit to untappable communications with proper #E2EE via @torproject / #Tor.

  • @micahflee made #OnionShare which is basically the most idiot-proof way to communicate over Tor to this day!

https://onionshare.org

OnionShare

OnionShare is a tool for anonymous peer-to-peer file sharing, chatting, and web hosting.

@mattblaze
Or just search during the day when people are at home and their doors are unlocked - oops wrong country.
@mattblaze Has the government ever proposed a master physical key for all locks?
@dexter Well, there are those TSA-approved luggage locks, which every baggage handler in the world has master keys for.
@mattblaze @dexter and everybody with a 3d printer as well as the keys were leaked in a photo on a wired covers story and somebody put the 3d print files on github.
@dexter
IIRC East Germany had locks where both halves of the pins in them could be over-lifted into the non-rotating part of the cylinder, so putting in a special tool looking like some kind of comb could push all the pins out of the way and apply torque.
@mattblaze

@mattblaze

So you want law enforcement to not report security-holes in software, because they will need them to stay open for "lawful hacking" purposes ?

That doesn't sound particular workable to me... ?

@bsdphk @mattblaze In fact, Matt and I and our co-authors said the exact opposite of your claim; see Section VI of https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1209&context=njtip. From ¶162: ‘Any policy short of full and immediate reporting is simply inadequate. “Report immediately” is the policy that any crime-prevention agency should have, even though such an approach will occasionally hamper an investigation.’

@SteveBellovin @mattblaze

Yeah, that's what I think too.

But Matt just said that court orders would have to be satisfied by "lawful hacking", so how does that work, if there are no vulnerabilities to exploit ?

To me it sounds like having your cake and eating it too:

You want perfect encryption and perfect software, and then police must rely on "lawful hacking" to satisfy a court-order for wiretapping.

What precisely is "lawful hacking" then ?

@SteveBellovin @mattblaze

The reason law-enforcement comes up with all these horrible ideas, and will get them legislated, is that nobody from the IT-side is willing to accept that court-orders is a necessary tool for any "Country Built On Laws", much less help come up with a compromise we all can live with.

@bsdphk @SteveBellovin If only we had written an entire paper about this, and if only Steve had included a link to it.

But I understand if you'd rather just yell at people on the Internet.

@mattblaze @SteveBellovin

I've read your paper, I dont recall you answering the question I asked anywhere in it ?

What have I overlooked ?

@bsdphk @SteveBellovin I don't believe that you actually have, frankly.
@bsdphk @mattblaze You believe in perfect software. I don’t, except as an ideal to aspire to. We're very far from it—look at, e.g., the number of critical holes in almost every Microsoft Patch Tuesday. (Open source? I run about a dozen Linux VMs and have to do apt update/apt upgrade several times a week to deal with security issues. BSD? Most of the 3rd party applications are the same save for OS-specific patches.)

@SteveBellovin @mattblaze

No, I do not believe in perfect software, and that has nothing to do with what I'm asking you guys:

Your suggestion is taht law enforcement can only execute wiretaps through "already present [...] software vulnerabilities".

My question is: How do you guarantee that there are already vulnerabilities available when a court order must be executed ?

And if there is a shortage, how will they be meted out ?

As I said: That is no way to run "A country built on laws"

@bsdphk @SteveBellovin The same way you guarantee that evidence sought in a search will be present, that witness will give reliable statements, or that people's faces will be recognizable on security cameras. You don't. There's no 100% reliable investigative technique, and never has been.
@bsdphk @SteveBellovin Anyway, forgive me for thinking you aren't being serious, since every aggressive "question" you've asked and every assertion you've made about our motivations is directly addressed in our papers. Bye now.

@mattblaze @SteveBellovin

You overlooked that I'm not from USA ?

Your paper does not address the situation in any other country, than USA.

And I will posit, that if your "solution" for USA is adopted, it will kneecap the judicial system in almost all other countries.

Because, surely you realize, that there can not be one solution for USA and another for Denmark, right ?

@bsdphk @mattblaze @SteveBellovin I didn't realize computers work differently in Denmark than in the US.
@bsdphk @mattblaze As I said, we believe that bugs are dense and that one *will* be available. As we describe in the papers, most of the code that they need is payload and is independent of the bug necessary to install it. And we don't want it to be too easy. Speaking in that case of GPS surveillance in US v Jones, Justice Sotomayor wrote ‘it evades the ordinary checks that constrain abusive law enforcement practices: “limited police resources and community hostility.”’ Too easy is bad.

@SteveBellovin @mattblaze

How do you expect a small country like Denmark will obtain an adequate supply of vulnerabilities ?

@bsdphk @SteveBellovin How does Denmark solve crimes now? And why do expect US law to solve Denmark's law enforcement problems?
@bsdphk @SteveBellovin Anyway, I'm bored with you now. Bye.
@bsdphk @mattblaze Read the whole paper (and https://www.cs.columbia.edu/~smb/papers/GoingBright.pdf for more technical details). Briefly, we believe that bugs are dense enough and patch rates slow enough that there will always be more bugs for them to exploit. (We've had long arguments with @dave_aitel about this…). Don't insist on new back doors, which hurt security, just use the ones that are there, report them—and take advantage of them until they're patched and the patches installed.
@bsdphk @SteveBellovin @mattblaze I think the software industry is doing an excellent job mitigating any risk of software perfection. 😂

@bsdphk "but what if no bugs" is dealt with in exactly the same way as every other form of "but what if no evidence": do something else to get the necessary evidence, or else learn to live with the fact that, in the real world, unlike TV, sometimes the bad guys get away with it.

@dave_aitel @SteveBellovin @mattblaze

@womble @dave_aitel @SteveBellovin @mattblaze

Then any non-stupid asshole is totally free to send dick-picks to any woman he can find coordinates for ?

Ask you mom if she is OK with that ?

Today most instances of intimidation, harassment and blackmail are never investigated, much less resolved or brought to justice.

I wonder how people like you can miss the connection between "almost all communication is digital" and "almost all crime involves digital communication" ?

@bsdphk I don't miss that connection, because it's not true. I also don't miss that the overwhelming majority of cases of intimidation, blackmail and harassment are over media which is already entirely accessible to law enforcement, which means that the reason they're not investigated has nothing to do with a lack of lawful access to the evidence.

@dave_aitel @SteveBellovin @mattblaze

@womble @dave_aitel @SteveBellovin @mattblaze

And you say this because you live in USA, right ?

Countries like Luxembourg and Denmark do not have police resources on the scale that FBI do.

A lot of services which are "entirely accessible" to FBI are not accessible to police in countries which cannot intimidate the owners of said service.

This is why I say: EU are going to legislate something which works for police in all EU countries, so "solutions" must not depend on massive resources.

@bsdphk no, I do not live in the USA.

Your arguments that police need access to everyone's private communications all the time are nonsense, because even the crimes that *can* be prosecuted with existing available evidence aren't, so the problem isn't a lack of evidence.

@dave_aitel @SteveBellovin @mattblaze

@womble @dave_aitel @SteveBellovin @mattblaze

I have said nothing remotely like that.

What societies built on laws need, is for court orders to be executed.

IT-liberalists insist that /everything/ must be encrypted so that it can /never/ become evidence in a court of law.

Clausewitz warns to never back your enemy into a corner, from which the only way out is through your own destruction.

IT-liberalists did that.

PS: My next column in queue.acm.org will be about this very problem.

@womble @dave_aitel @SteveBellovin @mattblaze

And yes, it is possible and valid to hold a nuanced opinion which is neither "wiretap it all" and "encrypt it all", and I do that.

It's called "A compromise" Look it up.

@mattblaze I have an early core career memory where I want to download a router OS and discovered that there were images with a "lawful interception" feature. I remember being horrified that this was a thing, and going down a rabbit hole to discover the details.

@mattblaze The other area of focus that people are missing, with the same foundational arguments, are our OS and Phone makers spying on us for advertisement reasons. While these companies lament that making backdoors for gov is impossible, they've certainly put forth a solid effort to syphon the same data for their revenue. All this data should be protected in both cases; but people, I feel, have lost sight and subsequently control of their data by these companies.

After all, they are the ones buying, selling, trading and loosing our data on a daily basis. I'm less concerned now with the gov backdoor concerns than what is being forced to coerced by big tech.

@dntlookbehindu Well, of course that's a huge concern, too. But these are additive risks. We don't have to only worry about one.

And it's not the government abusing its legal access I'm worried about here (that's a different question). It's that the architectural burden that implementing it imposes makes everything vulnerable to *illegal* access. As with adware, too.

@mattblaze I'm feeling we are past the architectural burden for this stuff when my phone see's an encrypted Singal conversation, and provides a popup of "do you want this translated from XX to English" without my permission or request (and no foreign language being used as well). The companies are screen scraping our encrypted conversations with poor AI systems, and turning their data into business transactions.

In short, I feel these companies have already made the backdoors and related infrastructure, and the malware, doing so under the color of adtech and revenue. All the keystroke loggers, screen scrapers, etc.

@dntlookbehindu Certainly true. But surveillance design mandates mean there's no way out - it becomes illegal to create or market a secure alternative.
@mattblaze aaaah i see your point now. Okay. Where I'm really concerned then is that big tech has demonstrated they can do it to the gov... and I don't know whose box is being opened now... Pandora's or Schrodinger's.
@mattblaze why pki/qkd/bb84 and e2ee should basically be mandatory, it is happening albeit somewhat slowly - 3 letter really should lean fwd but they don't make policy just enforce. metadata will still be plentiful