Browse the Archive

A Tough Targeting Challenge: Skype

Collapse Details
/2
1/2

DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) A Tough Targeting Challenge: Skype FROM: CT's Target Discovery (S2I61) Run Date: 11/29/2005 (TS//SI) NSA is faced with a tough new targeting challenge: Skype, a free, software-based multimedia communications tool. Easily downloaded from the Internet, it allows a user to place a free call from his computer to another Skype user anywhere in the world, or to a traditional phone anywhere in the world for generally pennies per minute. Skype permits a user to purchase a phone number and, for around 40 Euros (@$47) per year, allows that number, when called from the Public Switched Telephone Network, to ring to the Skype account. (U//FOUO) Skype also permits file sharing and chat, and will soon offer live video communications between Skype users. Skype communications are encrypted with combinations of two advanced encryption standards, AES and RSA, which makes the IP/Internet side of a Skype communication very secure. (TS//SI) The Skype application, by nature, defeats conventional intelligence targeting practices in the following ways: (S) Target Identification: Skype requires no user information upon registration other than a username and a password. Therefore, a Skype user can remain completely anonymous while on the Skype network. If a user wishes to utilize Skype's paid services, a credit card is used. However, it is easy for targets to avoid detection by using false or stolen credit cards. (TS//SI) Target Collection: Skype uses peer-to-peer networking. This means that the packets from the same voice call will take different network paths to their destination. This requires multiple SIGINT collection sites to be able to recognize and collect packets from the same voice call. Skype also attempts to resolve latency issues in packet transmission, which means that, as much as possible, Skype packets will keep to fiber- optic and other types of land-based infrastructure for transmission purposes. As the Skype network and the global Internet grows, only limited amounts of Skype traffic will be available over traditional FORNSAT collection. (TS//SI) Target Tracking: Skype can be implemented, without further modification, as a call center. A Skype user can be simultaneously logged on to the same Skype account on multiple computers in multiple places around the world. When a call is placed to that account, it rings to all of those computers - completely independent of geographic constraints - at the same time. Only when the user answers the call would a third party be able to identify the user's location based on the user's IP address. The effectiveness of this method, however, is hindered by the ability for a second individual, using the same account but different computer, to either make or answer a call. Therefore, the call metadata would reflect the same account being active in two simultaneous call events from possibly two geographically separate locations. This will render conventional target tracking analysis ineffective because both sets of metadata would be, in this case, true. (U//FOUO) Content Decryption: Skype communications are encrypted by default. According to a four month open-source assessment of Skype by Tom Berson of Anagram Labs (www.anagram.com): "The designers of Skype did not hesitate to employ cryptography widely and well in order to establish a foundation of trust, authenticity, and confidentiality for their peer-to-peer services. The implementers of Skype implemented the cryptographic functions correctly and efficiently. As a result, the confidentiality of a Skype session is far greater than that offered by a wired or wireless telephone call, or by email and email attachments." (TS//SI) The Skype application has swept the Internet in the past two years. Users are attracted to Skype's free services, extremely low costs (where costs are incurred), high call quality, and responsive support. At this time, SIGINT targets have a method to freely obscure their

communications on the global Internet, thus hindering our ability to collect vital communications intelligence. Greater analyst awareness of this and similar emerging technologies is what will lead to effective solutions for this problem in the years to come. (U//FOUO) For more information, please visit " Go Skype " on NSANet. "(U//FOUO) SIDtoday articles may not be republished or reposted outside NSANet without the consent of S0121 (DL sid_comms)." DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL DERIVED FROM: NSA/CSSM 1-52, DATED 08 JAN 2007 DECLASSIFY ON: 20320108

Filters SVG