[perpass] fwd: GCHQ built browsing profiles on every Internet user

Yakov Shafranovich <yakov@noom.com> Fri, 25 September 2015 15:53 UTC

Return-Path: <yakov@noom.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4BA31A9037 for <perpass@ietfa.amsl.com>; Fri, 25 Sep 2015 08:53:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.721
X-Spam-Level:
X-Spam-Status: No, score=0.721 tagged_above=-999 required=5 tests=[BAYES_50=0.8, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KmLOIAtRwvGl for <perpass@ietfa.amsl.com>; Fri, 25 Sep 2015 08:53:47 -0700 (PDT)
Received: from mail-la0-f42.google.com (mail-la0-f42.google.com [209.85.215.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22BF71A9053 for <perpass@ietf.org>; Fri, 25 Sep 2015 08:53:45 -0700 (PDT)
Received: by lacrr8 with SMTP id rr8so23847308lac.2 for <perpass@ietf.org>; Fri, 25 Sep 2015 08:53:43 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type:content-transfer-encoding; bh=+MpER3S3tnchVzjYkT8Qig25tZWatTtX86HPBIGV9es=; b=N1MKgesBaAMZf3fQpOS3xFhyspkSj5Kg9b3nb26g/Jat0Q3twiLlc9EI4GGAVJv0aJ QWWBA3I6bpeW6hDOC2amJXFOUIauuRijopkofvF0OOWbryEi+L+FsMMo0MqpSM2TCaFg lECKg1m/buAHglRwoWNTVgBGWopQOsIKQOMQBDZ8jt52Rw9EWrUIr6zvK6JISbN051pQ GOYGClZAsynYan/Dy1pjUf3RNqoJoNI2/ZjMrPIxH5rrQy1vJ768E+yYvN7sO9+K7igK 7WAlYuMAum/ZMPtA/Nk6iWyClC57yafzx/SK28J9q5FqP6ukFViqgt6h7q+QsUgSCY9/ OBeg==
X-Gm-Message-State: ALoCoQnB4YTa9gAdtvC3LtnGyu3k88TTPv4lymTRJ8mZYXExXnbGW+pAArekGWT7TgrYfU/UCiE5
X-Received: by 10.152.181.36 with SMTP id dt4mr1917496lac.52.1443196423191; Fri, 25 Sep 2015 08:53:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.134.193 with HTTP; Fri, 25 Sep 2015 08:53:03 -0700 (PDT)
From: Yakov Shafranovich <yakov@noom.com>
Date: Fri, 25 Sep 2015 11:53:03 -0400
Message-ID: <CAB0piBtAJVgompZ=SqDnRg0=hhMmLVK3oxHUAb-mYGEUMy19Fg@mail.gmail.com>
To: perpass@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/4K2uhLRvubEY9rBS8Ot_QGVKHE0>
Subject: [perpass] fwd: GCHQ built browsing profiles on every Internet user
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Sep 2015 15:53:49 -0000

This is a really scary story from the Intercept, based on Snowden docs:

https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/

Important takeway is this:

In recent years, the biggest barrier to GCHQ’s mass collection of data
does not appear to have come in the form of legal or policy
restrictions. Rather, it is the increased use of encryption technology
that protects the privacy of communications that has posed the biggest
potential hindrance to the agency’s activities.

“The spread of encryption … threatens our ability to do effective
target discovery/development,” says a top-secret report co-authored by
an official from the British agency and an NSA employee in 2011.

“Pertinent metadata events will be locked within the encrypted
channels and difficult, if not impossible, to prise out,” the report
says, adding that the agencies were working on a plan that would
“(hopefully) allow our Internet Exploitation strategy to prevail.”

Yakov