[liberationtech] Blogged: So, what about Cybercrime in Switzerland? A visit to KOBIK

Moritz Bartl moritz at torservers.net
Tue Mar 27 02:13:40 PDT 2012


So, what about Cybercrime in Switzerland?

Swiss Cybercrime Coordination Unit (KOBIK)

Yesterday, I joined some people from Chaos Computer Club ZC<rich (CCCZH)
to visit the Cybercrime Coordination Unit (KOBIK) in Bern. The
background was a Freedom of Information Act based request by the CCCZH:
KOBIK provides a list of domain names that host child pornography. It is
seen as a voluntary DNS blacklist for ISPs (and all the large Swiss ISPs
apply this list). Naturally, groups like the CCCZH are worried given the
non-public and intransparent nature of this list, lack of independent
monitoring, and its possible implications for future expansion to other
areas. This is not a theoretical danger, given that a court ordered
Swiss ISPs to block swissjustice.net for bdefamatory statementsb.

$ dig @8.8.8.8 swissjustice.net any +short # google dns
"v=spf1 a mx ip4:72.34.40.81 ?all"
0 swissjustice.net.
ns1.mh.tc. accounts.elinuxservers.com. 2011102801 86400 7200 3600000 86400
ns1.mh.tc.
ns2.mh.tc.
72.34.40.86
$ dig @62.2.24.162 swissjustice.net any +short # cablecom.ch dns
$

KOBIK, the Cybercrime Unit, invited us to look at the list. The head of
the organization and his assistant gave a presentation on the background
of the unit and their main activities. We asked several questions, and
were repeatedly encouraged to write more questions or come for another
visit any time.

Down to Earth in Switzerland

The atmosphere was very friendly, and we felt welcome. In some way they
even wanted us to be there, to hear their side of the story. I have no
reason not to believe what they told us, and I did not sense any hidden
agenda. In contrast to other law enforcement agents I had contact with
in the past, they did not seem to be much depressed about external
influences or wrong decisions being made babove themb. In some way,
Switzerland seems to be successful in buying its freedom in some areas,
and, due to this independence and size, does not appear to be under the
same non-stop heat of lobbyism as I am used to in Germany.

Knowing about our background, they constantly tried to assure us that
they were against all sorts of botherb blocking activities, and that the
lists were provided more as a side project to providers who asked about
them, not because anyone would believe it is a particularly useful
measure against child pornography, but to bspare children and families
from accidentially stumbling across the contentb. At the same time, they
contact ISP and local law enforcement. They are well aware that DNS
level blocks are no defense mechanism at all, and argue against IP level
blocks for their coarse granularity and side effects (and any other
categories of blocking for that matter).

Cybercrimebs Just Images

I reckon itbs still not much different in other European countries, but
it still came as a surpise to us to experience that the whole
Switzerland Cybercrime Coordination Unit, the (quote) bcenter of
excellence for the public, authorities and Internet service providers
about legal, technical and criminological issues on Internet crimesb
plus bcontact for foreign cybercrime authoritiesb (my emphases), has
only 10 employees at a ~$1m budget. Maybe a somewhat special situation
in Switzerland and for historical reasons, it still almost completely
focusses on child pornography and display of violence (hard pornography
illegal in Switzerland). They will slowly expand into other directions
in the future, but specifically grew out of a working group around a
large child pornography case in the 90s, Operation Genesis. Also, they
themselves argue that most crimes involve the real world and are better
suited to be dealt with in the traditional departments.

Yes, Porn

How do they find the sites in the first place? They have three main
sources: a form where anyone can report suspicious websites
banonymouslyb (they do log IPs and donbt offer HTTPS!). Secondly,
INTERPOL seems to maintain a somewhat broader list, but KOBIK verifies
each site again for specific violations of Swiss law. They also seem to
conduct a limited number of own investigations. The head of department
didnbt go into detail about this area, not only because they cannot talk
too much about their operational strategies, but also because the whole
event was more focussed on blacklist creation, distribution and
verification. I donbt believe the budget allows for many investigations
after all. (a few numbers are at the end of this post)

Once the sites are added to the list, they are regularly checked again
to see if content has changed. It sounded like a low number of countries
and ISPs donbt cooperate well (but most do), and there isnbt much else
they can do in such cases. The situation is different with pictures that
directly involve Swiss citizens. In those cases they work together with
the traditional pedocrime unit and try to seize the server.

Independent monitoring

So far there is no external inspection. Some ISPs seem to verify the
content themselves before redirecting DNS (not all ISPs block all
hostnames), which according to the KOBIK lawyer is perfectly legal to do
in Switzerland. You get to see the website depicted in the screenshot,
which ISPs can either self-host or use one hosted by KOBIK. Alledgely,
IPs hitting the blocked sites are not stored/analyzed in any way, nor
does KOBIK operate any honeypots or have legal or technical access to
visitor information (no DPI/logging at ISPs). Most of the sites they
deal with, at least concerning the blocks, are public websites full of
advertisements and clearly not binsider exchangesb, and tend to move
quickly. The turnaround time for the full list is only a few days (until
most or all sites are either taken down or moved somewhere else), and
most sites and pictures pop up again under a different name.

Need some hash?

Another growing area for KOBIK is the maintenance of a database of b100%
illegal child pornographyb hashes for various commercial forensic tools
used by the different Kantons (states). Looking for (or at) evidence in
child pornography cases is arguably not a very delightful job, so
investigators more and more turn to automatic tools for that. KOBIK
stated that they are careful about only including definitive matches and
pick out only 100% clear-cut child pornography images for this.

Encryption and Tor

Given my background, I was naturally quite interested in their take on
Tor, and how often they come across encryption. While they are not
involved in the seizure or forensic analysis of machines very much, they
did say that bapparently most pedo criminals have their blood somewhere
elseb.

KOBIK uses Tor in their investigations.

Technical

Once ISPs subscribe to the service and sign some paperwork, they get
SFTP access to a daily updated and zipped textfiles of hostnames.

KOBIK seemed genuinely interested in extending the cooperation towards
research institutes, especially since they donbt have the manpower to
properly follow up on developing trends (what kind of ISPs and ASNs are
more involved than others in this business etc).

Conclusion

The current staff seems to have its heart at the right place. The list
serves a well-intentioned purpose and was not introduced by external
pressure, but as an internal idea, not alone to save the investigators
the trouble to have to justify that some websites might still be up
bdays after a report came in.b Still, changes in political climate can
come faster than KOBIK expects. Even if they can hold powers back for a
while, in the end either heads will roll or, more likely, some people
will want to keep their job. What if, some day rather sooner than later,
something like Cleanfeed UK repeats in Switzerland? Will KOBIK stand
against a court order? Not likely. And Torproject.org is already listed
in several bcivilizedb blocklists around the globe. This is real.

Some numbers

 * 5000-7000 reports coming in from the public p.a.
 * at the time of our visit, the blocklist contained 148 hostnames
 * the Interpol list was said to be a bit larger, but the same order of
magnitude
 * 10 employees (including head of department)
 * budget around CHF 1m ($USD 1.1m)
 * ~200 access providers exist in Switzerland, around 10% use the list
(large ISPs, cover 90% of the population)

http://www.hackerbus.eu/blog/2012/03/27/so-what-about-cybercrime-in-switzerland.html

-- 
Moritz Bartl
https://www.torservers.net/
_______________________________________________
liberationtech mailing list
liberationtech at lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?"

You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list