Low speed, p2p, wireless as a secure alternative to SMS and Signal-like services.
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets. Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications) hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting. These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions. To be continued...
To be continued...
SDR approaches are quite strong there due to the natural lack of centrally controlled physical constraints and spying upon the physically fixed transmission medium (cables). One can easily imagine a mobile messaging application on a phone or laptop, jacked out via its USB port into an inexpensive SDR dongle in a pocket / backpack / car, tuneable for long distance (intercontinental) down to short distance (neighborhood / city / region). The SDR and gear can all be community specified, wiki-howto'd, bulk crowdfund or off the shelf purchased, etc. So long as you're not tacked up all the time broadcasting pirate radio from a fixed location... extremely hard to find or shutdown. Search things like SDR, gnuradio, ettus, pirate radio, guerrilla radio, spread spectrum, encrypted spectrum, etc to get started.
On Sun, Oct 27, 2019 at 03:03:02PM +0000, Steven Schear wrote:
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike
We're on the page. Note though, it's not a mutually exclusive choice. The following terms are either synonymous, or directly related, to the concept "physical link which is not a govnet Internet/ ISP" link: - dark links - dark fibre (at least in some circumstances - know your provider, know your hardware) - wireless mesh networking (mobile phones, wireless routers etc) - ad hoc mesh net ("ships passing in the night", e.g. mobile phones between vehicles travelling in the same direction on a highway (or in opposite directions albeit for relative short connection durations)) - neighbour to neighbour (CAT5 across the fence, wireless mesh between neighbours) - [private] back haul - off govnet/ off Internet links - non ISP/govnet links - local physical friend node link - opportunistic mesh [network] link/connection - etc See for example the following email: https://lists.cpunks.org/pipermail/cypherpunks/2019-October/077105.html
approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets.
Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications)
One of the problems anarchists seem to regularly fall into is avoidance of the predominant group zeitgeist / tribal and political "present reality" and nature of humans generally, and therefore perpetuation of the problems we presently face, or we can say, effectively a tacit consent (by the mechanism of said avoidance) to said problems. Humans have millenia of tribalism embedded in their DNA/ psyche. Humans are plagued by the classical tribulations arising from the classical human natures: - fear - lust and indiscrimination - unsatiable greed/ desire for material possessions - slothfulness then opportunism then thievery - impatience then anger then hatred - envy and jealousy Each of these plagues of the mind have natural and peace inducing antidotes, but such require intent + will + action + persistence/ diligence (at least for the time required, which for some may be years to a lifetime): - courage, fake it till you make it - discrimination and consequence consideration - cognizance and gratitude for those things, moments and feelings existing now, in the present moment - planning, diligent action, compassion - patience, forgiveness, love - contentment and broad thinking In regards to SDSP vs SDR - it's NOT the terminology that will give you a pass! That is foolish oversight of the fundamental problem, which is present government backed by "voting" and the force of guns, police, courts and jail. How trivial it is to replace, no just add the term "SDSP" in the definitions of "SDR", in all statute laws in which the acronym "SDR" appears! Do not shirk or avoid or fail to behold the obvious, or that which you avoid shall dominate you! Statements of unshakable intention in relation to SDSP/SDR We are with the fundamental human right to freedom of communication, using any technical means at our disposal. Living this right, and establishing the freedom to exercise this right in various technical domains including but not limited to SDR, is an ongoing intention and set of specific and coordinated actions which we undertake from time to time.
hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting.
There are a few projects such as LimeSDR out there, which are a good start. We DO NOT live in isolated towers - we live in a world of humans and interactions amongst one another, and various systems which actually exist today such as supposedly "democratic" governments. Pick a target project, and get going in real life!
These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions.
To be continued...
Indeed ;)
In the academic sphere the favored, publicly released, applications of these technologies has been to improve spectrum utilization and jamming resistance. However, these same technologies can also confir covertness. While encryption can protect the content of communication covertness can deny an eavesdropper the more important metadata of who is talking with whom and when. It is well known that early Spread Spectrum (SS) methods (both frequency hopping, FHSS, and direct sequence, DSSS) were initially created for military purposes though are now part of wireless industry standards. There are other SS techniques, like chirp, chaotic and UWB, which have yet to find broad use in commercial or consumer products. There are yet other SS methods which are still either experimental or used only in military / government applications. Sometimes these approaches can be combined to significantly increase effectiveness. There is a general acknowledgement of relationships, in wired communications, between certain characteristics (e.g., latency) privacy and security. The same generally holds true for wireless. In addition, wireless links must often deal with varying and unpredictable channel conditions. Conversely, non-compliant wireless links (the only types of interest here) can dynamically choose whatever spectrum fits within the hardware and software capabilities and best suits the conversation at hand. It is also free of service provider restrictions and costs. One prominent way for wireless communications to acquire the covert characteristics needed is by effectively masquerading as noise. This noise can be from natural sources (e.g., lightning), non-communication radio emissions (e.g., discharge type street lamps), unintentional communication emissions or an uncontrolled mixture. SIGINT analyst Eve may use a variety of specialized spectrum analysis tools including Bragg Cell, electroptical, steering receivers to quickly scan wide swaths of spectrum for signals of interests which can then be investigated using narrower band devices. These devices can be terrestrial or mounted on satellites. All receivers have design tradeoffs mostly due to frequency coverage, instantaneous bandwidth, noise figures, etc. Automated identification and classification of unknown signals is an advancing art but still an inexact science. If Alice and Bob use weak (very low spectral density), intermittent, signals with very close similarity to noise they are, individually, problematic for Eve. As the number of simultaneous, unrelated and uncoordinated, parties share the spectrum the difficulty for Eve is magnified even if she records the spectrum and attempts non-realtime analysis. Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing. With proper covert tech the advantage can shift asymmetrically in favor of Alice and Bob. The situation has similarities to mixing of blockchain transactions. It's also similar to the challenge faced by parties defending their online servers from hackers. The defenders must block any intrusions the attackers must only find one good exploit to win. To be continued... On Sun, Oct 27, 2019, 3:03 PM Steven Schear <schear.steve@gmail.com> wrote:
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets.
Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications) hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting.
These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions.
To be continued...
Join
On Mon, 28 Oct 2019 11:33:28 +0000 Steven Schear <schear.steve@gmail.com> wrote:
Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
the same 'intelligence' agency, aka the americunt govcorp, will have you believe that their honeypots like the tor network are 'safe' and 'protect the human rights of 'journalists'' so what's needed here is actual knowdlegde of their 'capabilities. Your assumption that they are just bragging is complete bullshit.
Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives. They mostly indicate that with the proper covert tech and channel conditions its practical to avoid detection LPI and intercept LPI. I'll try to illuminate some of this and other issues (e.g., key exchange) in later posts. On Mon, Oct 28, 2019, 9:17 PM Punk - Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 28 Oct 2019 11:33:28 +0000 Steven Schear <schear.steve@gmail.com> wrote:
Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
the same 'intelligence' agency, aka the americunt govcorp, will have you believe that their honeypots like the tor network are 'safe' and 'protect the human rights of 'journalists''
so what's needed here is actual knowdlegde of their 'capabilities. Your assumption that they are just bragging is complete bullshit.
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, October 28, 2019 9:54 PM, Steven Schear <schear.steve@gmail.com> wrote:
Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives.
the least recommended method, but effective for certain! engage these sigint spooks and see what they've got. there was dirtbox deployed at Rio for DEF CON to catch some anons. loaded with custom exploits to stage always on Google Voice (open mic night) masquerade low power to encourage device to remain plugged in at room, PRL force pushes to prefer routes through middle towers, etc, etc. problem is when triggered by DHCP, you can DHCP RELAY for hundreds, maybe thousands! yes, you can fork bomb a dirtbox dead, if vuln like this :P one of many, find some yourself! best regards,
On Wed, 30 Oct 2019 02:26:33 +0000 coderman <coderman@protonmail.com> wrote:
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, October 28, 2019 9:54 PM, Steven Schear <schear.steve@gmail.com> wrote:
Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives.
the least recommended method, but effective for certain!
snowden didn't provide any useful information. Furthermore he has provided fucking patheric lies about tor - no doubt scum-master paul syverson and accomplices are happy.
On Tue, Oct 29, 2019 at 11:57:25PM -0300, Punk - Stasi 2.0 wrote:
On Wed, 30 Oct 2019 02:26:33 +0000 coderman <coderman@protonmail.com> wrote:
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, October 28, 2019 9:54 PM, Steven Schear <schear.steve@gmail.com> wrote:
Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives.
the least recommended method, but effective for certain!
snowden didn't provide any useful information. Furthermore he has provided fucking patheric lies about tor - no doubt scum-master paul syverson and accomplices are happy.
Dear Stasi 2.0, given Snowden's chosen exile in the modern Gulag 2.0, aka the world's <sinister musak> most evil villians Russia </>, and having just finished having his memoirs hard core promoted by the USA deep state ("oh no, must ban! must not publish this!"), we can be reasonably confident that the man known as Snowden likely now has sufficient quantities of time on his hands to engage in a meaningful discussion, question and consideration or three. If your will is sufficient then no doubt you shall bring this to pass - and for bonus points, engage (at least CC) the discussion here on this here venerable and austere conservative values mailing list, cypherpunks. We await ...
So if we're going to have a /. like QnA with Snowden, we first need to consider which questions, and follow up questions, would be worth asking Snowden. If folks are interested, it will happen. So here's a few to get the ball rolling: - you, your life, your upbringing, your views - how these have changed over time - your opinions on the world $TODAY - if you could snap your fingers and have technology X, what would that/they be? - how do you suggest we re-claim our lost freedoms - are you just a massive counter-revolutionary psy-op? - why did you put so much trust into the lame stream media? - why did you fail on fronts A, B and C and result in such lame/ ineffectual data releases? - how well do you think you were played by the deep state? - is there anything you failed to put into your memoirs which you should have included? - has your book been wildly successful financially? - since your plan bombed so badly, what suggestions do you have to future leakers, so they don't eff it up so badly? - are you shacked up with a gorgeous Russian mafia chickadeero yet? - Why is Russia so awesome? - does Putin really ride bears in the Russian wilderness? - are you running a Tor exit node? Can I drop box to you the greatest leak of all time? - are you planning on actually doing something useful with your life? - are you a programmer? - what's your cypherpunks nick? - if you don't have one, why the hell not?!@##!? Someone with a bit of empathy (certainly not this muffa) for the guy might write up a couple sentences of acknowledgement (say for the confront he has likely faced in the stand he appears to have taken (however misguidedly)). Perhaps keep some comedy questions so it's light hearted, as well as actual burning "I really want to hear his answer on this" type questions. Create your world, On Wed, Oct 30, 2019 at 02:16:02PM +1100, Zenaan Harkness wrote:
On Tue, Oct 29, 2019 at 11:57:25PM -0300, Punk - Stasi 2.0 wrote:
On Wed, 30 Oct 2019 02:26:33 +0000 coderman <coderman@protonmail.com> wrote:
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, October 28, 2019 9:54 PM, Steven Schear <schear.steve@gmail.com> wrote:
Unless a Snowden-like WB comes forward its quite unlikely to have internal documents admitting their limits. However, there are a number of relatively recent academic papers that look at this battle of limits from a jamming and other perspectives.
the least recommended method, but effective for certain!
snowden didn't provide any useful information. Furthermore he has provided fucking patheric lies about tor - no doubt scum-master paul syverson and accomplices are happy.
Dear Stasi 2.0,
given Snowden's chosen exile in the modern Gulag 2.0, aka the world's <sinister musak> most evil villians Russia </>,
and having just finished having his memoirs hard core promoted by the USA deep state ("oh no, must ban! must not publish this!"),
we can be reasonably confident that the man known as Snowden likely now has sufficient quantities of time on his hands to engage in a meaningful discussion, question and consideration or three.
If your will is sufficient then no doubt you shall bring this to pass - and for bonus points, engage (at least CC) the discussion here on this here venerable and austere conservative values mailing list, cypherpunks.
We await ...
http://www.ieee-ka.de/events/sigint-challenge/ On Mon, Oct 28, 2019, 9:17 PM Punk - Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 28 Oct 2019 11:33:28 +0000 Steven Schear <schear.steve@gmail.com> wrote:
Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
the same 'intelligence' agency, aka the americunt govcorp, will have you believe that their honeypots like the tor network are 'safe' and 'protect the human rights of 'journalists''
so what's needed here is actual knowdlegde of their 'capabilities. Your assumption that they are just bragging is complete bullshit.
Military SIGINT has historically relied heavily on intel agency resources. I think the following article is less a bid to get increased funding or disinformation than a realistic appraisal of how the emergence of low cost COTS signal processing has asymmetrically shifted the advantage from the U.S. to guerrillas. https://breakingdefense.com/2019/11/electronic-warfare-better-but-still-not-... On Mon, Oct 28, 2019, 9:17 PM Punk - Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 28 Oct 2019 11:33:28 +0000 Steven Schear <schear.steve@gmail.com> wrote:
Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
the same 'intelligence' agency, aka the americunt govcorp, will have you believe that their honeypots like the tor network are 'safe' and 'protect the human rights of 'journalists''
so what's needed here is actual knowdlegde of their 'capabilities. Your assumption that they are just bragging is complete bullshit.
Unlike encryption, which is generally practiced at intermediate wireless communication protocol layers, implementing covert features requires fundamental new tech at the PHY. In commercial stacks the PHY is invariably implemented in hardware so a prototype (or a limited production) device using this new tech requires the use of either a FPGA or software implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio. For pure wireless communications I prefer either Point-to-Point (PTP) or single hop satellite links. Satjacking Satellites, especially geosynchronous, have advantages in channel quality and bandwidth (often 100s of contiguous MHz spread across several transponders). However, they generally require a good directional antenna (to compensate for high path losses) and raise issues of being located by multi-satellite Time-of-Arrival (ToA) or ground based surveillance methods. Non-geosynchronous birds have individually limited ground visibility, require somewhat complex doppler shift compensation, expensive and complex tracking antenna mounts. ToA can be mitigated by proper tradecraft or by nearfield antenna techniques, sometimes employed in avionics to prevent ground based detection of aircraft missile targeting signals. The great advantage of satellites are their coverage area, high link quality and that most still use "bent pipe" relay architectures. Although recent implementations now use techniques (e.g., FFT and IFT) to clean uplink signals before retransmission they are limited to notching out frequencies and cannot be applied to offending broadband signals, especially of the type under consideration. To be continued... On Mon, Oct 28, 2019, 11:33 AM Steven Schear <schear.steve@gmail.com> wrote:
In the academic sphere the favored, publicly released, applications of these technologies has been to improve spectrum utilization and jamming resistance. However, these same technologies can also confir covertness. While encryption can protect the content of communication covertness can deny an eavesdropper the more important metadata of who is talking with whom and when.
It is well known that early Spread Spectrum (SS) methods (both frequency hopping, FHSS, and direct sequence, DSSS) were initially created for military purposes though are now part of wireless industry standards. There are other SS techniques, like chirp, chaotic and UWB, which have yet to find broad use in commercial or consumer products. There are yet other SS methods which are still either experimental or used only in military / government applications. Sometimes these approaches can be combined to significantly increase effectiveness.
There is a general acknowledgement of relationships, in wired communications, between certain characteristics (e.g., latency) privacy and security. The same generally holds true for wireless. In addition, wireless links must often deal with varying and unpredictable channel conditions.
Conversely, non-compliant wireless links (the only types of interest here) can dynamically choose whatever spectrum fits within the hardware and software capabilities and best suits the conversation at hand. It is also free of service provider restrictions and costs.
One prominent way for wireless communications to acquire the covert characteristics needed is by effectively masquerading as noise. This noise can be from natural sources (e.g., lightning), non-communication radio emissions (e.g., discharge type street lamps), unintentional communication emissions or an uncontrolled mixture.
SIGINT analyst Eve may use a variety of specialized spectrum analysis tools including Bragg Cell, electroptical, steering receivers to quickly scan wide swaths of spectrum for signals of interests which can then be investigated using narrower band devices. These devices can be terrestrial or mounted on satellites.
All receivers have design tradeoffs mostly due to frequency coverage, instantaneous bandwidth, noise figures, etc. Automated identification and classification of unknown signals is an advancing art but still an inexact science. If Alice and Bob use weak (very low spectral density), intermittent, signals with very close similarity to noise they are, individually, problematic for Eve. As the number of simultaneous, unrelated and uncoordinated, parties share the spectrum the difficulty for Eve is magnified even if she records the spectrum and attempts non-realtime analysis. Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
With proper covert tech the advantage can shift asymmetrically in favor of Alice and Bob. The situation has similarities to mixing of blockchain transactions. It's also similar to the challenge faced by parties defending their online servers from hackers. The defenders must block any intrusions the attackers must only find one good exploit to win.
To be continued...
On Sun, Oct 27, 2019, 3:03 PM Steven Schear <schear.steve@gmail.com> wrote:
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets.
Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications) hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting.
These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions.
To be continued...
Join
implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio.
Please, something libre - there's a cornucopia to choose from, from GNU R to GNU Octave, Scilab and Sagemath. https://www.gnu.org/software/octave/ https://en.wikipedia.org/wiki/GNU_Octave https://www.r-project.org/ https://en.wikipedia.org/wiki/R_(programming_language) https://rstudio.com/ https://opensource.com/alternatives/matlab http://www.scilab.org/ http://www.sagemath.org/index.html http://freemat.sourceforge.net/ http://www.jirka.org/genius.html http://maxima.sourceforge.net/ http://www.numpy.org/ http://www.sympy.org/en/index.html https://julialang.org/ ...
Thanks for the other links. I only mentioned two leading contenders. On Tue, Oct 29, 2019, 12:38 AM Zenaan Harkness <zen@freedbms.net> wrote:
implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio.
Please, something libre - there's a cornucopia to choose from, from GNU R to GNU Octave, Scilab and Sagemath.
https://www.gnu.org/software/octave/ https://en.wikipedia.org/wiki/GNU_Octave
https://www.r-project.org/ https://en.wikipedia.org/wiki/R_(programming_language) https://rstudio.com/
https://opensource.com/alternatives/matlab
http://www.sagemath.org/index.html
http://freemat.sourceforge.net/
http://www.jirka.org/genius.html
http://maxima.sourceforge.net/
http://www.numpy.org/ http://www.sympy.org/en/index.html
...
MF - HF spectrum Long distance, non-LoS, communications are possible using various ionospheric reflection techniques. Two of the most prominent means are skip and NVIS (Near Vertical Incident Skywave). With skip low elevation signals are reflected one or more times from the transmission point to various layers of the ionosphere and back to earth. The name skip is taken from the large geographic areas beneath the reflections which are skipped and receive little or no signals. This propagation mode is widely used for shortwave broadcasts, amateur radio and government communications. Though it suffers from limited temporal-frequency coherence / fading until the advent of satellite communications it was the workhorse for all longer distance wireless. Recently, there has been a resurgence of, mostly government, research of using this spectrum with wideband and multiple antenna techniques to mitigate propagation limitations. NVIS, invented by the Germans in WW II, uses different frequencies than skip and high elevation angle transmissions to take advantage of other ionospheric layers and reflect signals closer to the transmission point. Effective communication is limited to 500 km or so. It's been very useful for non-LoS in military theaters. Most use and almost all research in these bands has focused on narrow (generally below 4 kHz) voice and and very narrow band (digital) communications. However, the favorable results from wider band (for example Mitre corp.) research indicates low data rate SS techniques are practical if not legal for other than governments. Recent R&D grants indicate militaries are again looking to this spectrum as backup to possible satellite outages during conflicts. To be continued... On Mon, Oct 28, 2019, 11:45 PM Steven Schear <schear.steve@gmail.com> wrote:
Unlike encryption, which is generally practiced at intermediate wireless communication protocol layers, implementing covert features requires fundamental new tech at the PHY. In commercial stacks the PHY is invariably implemented in hardware so a prototype (or a limited production) device using this new tech requires the use of either a FPGA or software implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio.
For pure wireless communications I prefer either Point-to-Point (PTP) or single hop satellite links.
Satjacking Satellites, especially geosynchronous, have advantages in channel quality and bandwidth (often 100s of contiguous MHz spread across several transponders). However, they generally require a good directional antenna (to compensate for high path losses) and raise issues of being located by multi-satellite Time-of-Arrival (ToA) or ground based surveillance methods. Non-geosynchronous birds have individually limited ground visibility, require somewhat complex doppler shift compensation, expensive and complex tracking antenna mounts.
ToA can be mitigated by proper tradecraft or by nearfield antenna techniques, sometimes employed in avionics to prevent ground based detection of aircraft missile targeting signals.
The great advantage of satellites are their coverage area, high link quality and that most still use "bent pipe" relay architectures. Although recent implementations now use techniques (e.g., FFT and IFT) to clean uplink signals before retransmission they are limited to notching out frequencies and cannot be applied to offending broadband signals, especially of the type under consideration.
To be continued...
On Mon, Oct 28, 2019, 11:33 AM Steven Schear <schear.steve@gmail.com> wrote:
In the academic sphere the favored, publicly released, applications of these technologies has been to improve spectrum utilization and jamming resistance. However, these same technologies can also confir covertness. While encryption can protect the content of communication covertness can deny an eavesdropper the more important metadata of who is talking with whom and when.
It is well known that early Spread Spectrum (SS) methods (both frequency hopping, FHSS, and direct sequence, DSSS) were initially created for military purposes though are now part of wireless industry standards. There are other SS techniques, like chirp, chaotic and UWB, which have yet to find broad use in commercial or consumer products. There are yet other SS methods which are still either experimental or used only in military / government applications. Sometimes these approaches can be combined to significantly increase effectiveness.
There is a general acknowledgement of relationships, in wired communications, between certain characteristics (e.g., latency) privacy and security. The same generally holds true for wireless. In addition, wireless links must often deal with varying and unpredictable channel conditions.
Conversely, non-compliant wireless links (the only types of interest here) can dynamically choose whatever spectrum fits within the hardware and software capabilities and best suits the conversation at hand. It is also free of service provider restrictions and costs.
One prominent way for wireless communications to acquire the covert characteristics needed is by effectively masquerading as noise. This noise can be from natural sources (e.g., lightning), non-communication radio emissions (e.g., discharge type street lamps), unintentional communication emissions or an uncontrolled mixture.
SIGINT analyst Eve may use a variety of specialized spectrum analysis tools including Bragg Cell, electroptical, steering receivers to quickly scan wide swaths of spectrum for signals of interests which can then be investigated using narrower band devices. These devices can be terrestrial or mounted on satellites.
All receivers have design tradeoffs mostly due to frequency coverage, instantaneous bandwidth, noise figures, etc. Automated identification and classification of unknown signals is an advancing art but still an inexact science. If Alice and Bob use weak (very low spectral density), intermittent, signals with very close similarity to noise they are, individually, problematic for Eve. As the number of simultaneous, unrelated and uncoordinated, parties share the spectrum the difficulty for Eve is magnified even if she records the spectrum and attempts non-realtime analysis. Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
With proper covert tech the advantage can shift asymmetrically in favor of Alice and Bob. The situation has similarities to mixing of blockchain transactions. It's also similar to the challenge faced by parties defending their online servers from hackers. The defenders must block any intrusions the attackers must only find one good exploit to win.
To be continued...
On Sun, Oct 27, 2019, 3:03 PM Steven Schear <schear.steve@gmail.com> wrote:
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets.
Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications) hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting.
These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions.
To be continued...
Join
OK, spread 'em! As discussed, a key to effective covert wireless is conditioning transmissions to appear arbitrary close to noise in channels before and after your emissions. This invariably means keeping the spectral energy as low as practical. Additional benefits accrue if the coding and occupied spectrum change frequently (e.g., by frequency hopping and / or bandwidth hopping). With proper protocol design many other covert parties can simultaneously share the same relative spectral space (and minimized interference) with their individually specific coding, based on shared secret keys, creating a dynamic Uncoordinated Multiple Access (UMA). All receivers have noise floors below which received signals are hidden under the equipment's detection threshold. In order to patrol the huge, assumed, DC to Daylight, spectrum Eve uses a variety of gear each type with tradeoffs of spectrum coverage, scanning speed speed, noise floor and dynamic range. These tradeoffs appear to be baked into the physics of receiver tech, similar to Heisenberg's Uncertainty Principle. Because Alice and Bob are using tradecraft, protocols, HW and SW designed to focus on Eve's limitations the advantage can shift sufficiently to provide them an operational "umbrella". To be continued... On Tue, Oct 29, 2019, 9:46 AM Steven Schear <schear.steve@gmail.com> wrote:
MF - HF spectrum Long distance, non-LoS, communications are possible using various ionospheric reflection techniques. Two of the most prominent means are skip and NVIS (Near Vertical Incident Skywave).
With skip low elevation signals are reflected one or more times from the transmission point to various layers of the ionosphere and back to earth. The name skip is taken from the large geographic areas beneath the reflections which are skipped and receive little or no signals. This propagation mode is widely used for shortwave broadcasts, amateur radio and government communications. Though it suffers from limited temporal-frequency coherence / fading until the advent of satellite communications it was the workhorse for all longer distance wireless. Recently, there has been a resurgence of, mostly government, research of using this spectrum with wideband and multiple antenna techniques to mitigate propagation limitations.
NVIS, invented by the Germans in WW II, uses different frequencies than skip and high elevation angle transmissions to take advantage of other ionospheric layers and reflect signals closer to the transmission point. Effective communication is limited to 500 km or so. It's been very useful for non-LoS in military theaters.
Most use and almost all research in these bands has focused on narrow (generally below 4 kHz) voice and and very narrow band (digital) communications. However, the favorable results from wider band (for example Mitre corp.) research indicates low data rate SS techniques are practical if not legal for other than governments. Recent R&D grants indicate militaries are again looking to this spectrum as backup to possible satellite outages during conflicts.
To be continued...
On Mon, Oct 28, 2019, 11:45 PM Steven Schear <schear.steve@gmail.com> wrote:
Unlike encryption, which is generally practiced at intermediate wireless communication protocol layers, implementing covert features requires fundamental new tech at the PHY. In commercial stacks the PHY is invariably implemented in hardware so a prototype (or a limited production) device using this new tech requires the use of either a FPGA or software implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio.
For pure wireless communications I prefer either Point-to-Point (PTP) or single hop satellite links.
Satjacking Satellites, especially geosynchronous, have advantages in channel quality and bandwidth (often 100s of contiguous MHz spread across several transponders). However, they generally require a good directional antenna (to compensate for high path losses) and raise issues of being located by multi-satellite Time-of-Arrival (ToA) or ground based surveillance methods. Non-geosynchronous birds have individually limited ground visibility, require somewhat complex doppler shift compensation, expensive and complex tracking antenna mounts.
ToA can be mitigated by proper tradecraft or by nearfield antenna techniques, sometimes employed in avionics to prevent ground based detection of aircraft missile targeting signals.
The great advantage of satellites are their coverage area, high link quality and that most still use "bent pipe" relay architectures. Although recent implementations now use techniques (e.g., FFT and IFT) to clean uplink signals before retransmission they are limited to notching out frequencies and cannot be applied to offending broadband signals, especially of the type under consideration.
To be continued...
On Mon, Oct 28, 2019, 11:33 AM Steven Schear <schear.steve@gmail.com> wrote:
In the academic sphere the favored, publicly released, applications of these technologies has been to improve spectrum utilization and jamming resistance. However, these same technologies can also confir covertness. While encryption can protect the content of communication covertness can deny an eavesdropper the more important metadata of who is talking with whom and when.
It is well known that early Spread Spectrum (SS) methods (both frequency hopping, FHSS, and direct sequence, DSSS) were initially created for military purposes though are now part of wireless industry standards. There are other SS techniques, like chirp, chaotic and UWB, which have yet to find broad use in commercial or consumer products. There are yet other SS methods which are still either experimental or used only in military / government applications. Sometimes these approaches can be combined to significantly increase effectiveness.
There is a general acknowledgement of relationships, in wired communications, between certain characteristics (e.g., latency) privacy and security. The same generally holds true for wireless. In addition, wireless links must often deal with varying and unpredictable channel conditions.
Conversely, non-compliant wireless links (the only types of interest here) can dynamically choose whatever spectrum fits within the hardware and software capabilities and best suits the conversation at hand. It is also free of service provider restrictions and costs.
One prominent way for wireless communications to acquire the covert characteristics needed is by effectively masquerading as noise. This noise can be from natural sources (e.g., lightning), non-communication radio emissions (e.g., discharge type street lamps), unintentional communication emissions or an uncontrolled mixture.
SIGINT analyst Eve may use a variety of specialized spectrum analysis tools including Bragg Cell, electroptical, steering receivers to quickly scan wide swaths of spectrum for signals of interests which can then be investigated using narrower band devices. These devices can be terrestrial or mounted on satellites.
All receivers have design tradeoffs mostly due to frequency coverage, instantaneous bandwidth, noise figures, etc. Automated identification and classification of unknown signals is an advancing art but still an inexact science. If Alice and Bob use weak (very low spectral density), intermittent, signals with very close similarity to noise they are, individually, problematic for Eve. As the number of simultaneous, unrelated and uncoordinated, parties share the spectrum the difficulty for Eve is magnified even if she records the spectrum and attempts non-realtime analysis. Despite massive SIGINT investments she is at disadvantage but the intel agency narratives would have others believe they are all-seeing all-knowing.
With proper covert tech the advantage can shift asymmetrically in favor of Alice and Bob. The situation has similarities to mixing of blockchain transactions. It's also similar to the challenge faced by parties defending their online servers from hackers. The defenders must block any intrusions the attackers must only find one good exploit to win.
To be continued...
On Sun, Oct 27, 2019, 3:03 PM Steven Schear <schear.steve@gmail.com> wrote:
By choosing a different physical transport means a different and, I maintain, better set of security tradeoffs become available. Unlike approaches which invariably depend on the Internet and heavily monitored commercial gateways, I propose using infrastructure-less or non-permissioned commercial, single-hop, relays. It's not the electromagnetic spectrum isn't also monitored but that the efficacy of that monitoring is, unlike the former environment, much more limited by physics, channel conditions, information theory and the proper application of tradecraft by possible targets.
Both as a hobbyist and professional I've delved into the practicality of utilizing and building on commonly available, even consumer grade, Software Defined Signal Processing (SDSP, the use of the term SDR is verboten in my world due to its inherent regulatory implications) hardware and open source software. My investigations (some openly shared at Cypherpunk-oriented tech conferences) have led me to believe that even a moderate uptake of these SDSP technologies would effectively neutralize most or all SIGINT against parties who aren't already the subject of individual targeting.
These technologies aren't some magical new creation but rather the integration and adoption of ideas already well studied and reported in academia but whose implementations are often not openly available for tailoring and testing, mostly due to unfounded fears of regulatory actions.
To be continued...
Join
On Mon, 28 Oct 2019 23:45:34 +0000 Steven Schear <schear.steve@gmail.com> wrote:
Satjacking Satellites, especially geosynchronous, have advantages in channel quality and bandwidth
yeah and the best thing about satellites is that you can buy them in the grocery store. Pretty 'over teh counter'.
participants (5)
-
coderman
-
grarpamp
-
Punk - Stasi 2.0
-
Steven Schear
-
Zenaan Harkness