Você está na página 1de 36

O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K

W2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?
?W&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6X?
?7@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@)X
J@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M?gI4@@@@@@@@@@@@@@@@@@@@@1

Die Datenschleuder
7@@@@@@@@@@@@@0M ?I'@@@@@
?J@@@@@@@0M?
?7@@@@@(M? ?@@@@6X? @@@@hfN@@@@@L?
?3@@@@1?hf?J@@@@hf?3@@@@1?
?@@@@@(Y ?V'@@@@Lhf?7@@@@hf?N@@@@@?
?@@@@@H? N@@@@)X?he?@@@@@ 3@@@@L
J@@@@5
7@@@@H ?3@@@@)Xhe?@@@@@
?V'@@@@)X?h?@@@@@ N@@@@1
?@@@@@
@@@@@? V'@@@@1?h?@@@@@ ?@@@@@
@@@@@? ?V'@@@@Lh?@@@@@ ?3@@@@
@@@@@?
@@@@@? V'@@@)X?g?@@@@@
?N@@@@)Xg?3@@@@L? ?N@@@@
@@@@
@@@@@? 3@@@@)X?f?N@@@@)X @@@@
@@@@@? V'@@@@)Xg@@@@@)K? @@6Ke?@@@6X
@@@@@?
@@@@@? ?V'@@@@)X?f@@@@@@@@@@@6K? O2@@@@@@@@6K 3@@@6X?3@@@)X?
V'@@@@1?f@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KhV'@@@)XN@@@@)X
@@@@@? ?V'@@@@LgI4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?e?N@@@@)T@@@@@)X?e@@6X
@@@@@? N@@@@)X?gI4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?e3@@@@@R'@@@@1?e@@@1
@@@@@?
@@@@@? ?3@@@@)Xhe?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KS@@@@@LV'@@@@Le@@@@L?
?V'@@@@)X? I4@@@@@@@@@>@@@@1?N@@@@1e3@@@)X
@@@@@? V'@@@@)K I4@@@@@@>@@@@L?3@@@@L?N@@@@1
@@@@@? ?N@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KgI'@@@@@Y@@@)XV'@@@1??3@@@@
@@@@@? @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?S@@@@@@@@@@1?N@@@@L?N@@@@L?
@@@@@?
@@@@@? ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@Y@@@@@@@@@@L?3@@@1e@@@@1?
?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?@@@)XN@@@@L?3@@@@?
@@@@@? I4@@@@@@@@@@@@@@@@1?3@@@1?N@@@@?W2@@
@@@@@? ?I4@@@@@@@@@@@@@@LN@@@@??@@@@W&@@@
@@@@@?
@@@@@? O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?e@@@@@@@@@?@@@1?3@@@L?@@@@@@@@@
W2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?@@@@@@@@@@@@LN@@@1?3@@@@@@@5
@@@@@? ?W&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@1?@@@@e@@@@@@@Y
@@@@@? W&@@@@@@@@@@@@@0M?f?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@W@@@@W&@@@@@@@@@?
@@@@@?
@@@@@? ?W&@@@@@@@@0M?
W&@@@@@@0Mh?O2@@@6K @@@@@@@@@@@@@@@@@@Y@@@@@@@@@@@@@@?
O2@@@@6K?O2@@@@@@@@@@@?@@@@@@@@@@@@@@@?@@@@@@@@@@@@@5?
@@@@@?
@@@@@? ?W&@@@@@(MgO2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?@@@@@@@@@@@@@Y?
W&@@@@@(Y?fW2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@?
@@@@@? 7@@@@@(Yf?O&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@X@@@@@@@@
?J@@@@@(Y?f@@@@@@@@@@@@0Mhe?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@XV@@@@@@@@@
3@@@@? W&@@@@(Yf?J@@@@@0M? @@@@@@@@@@@@@@@@@@@@@XV@@@@@@X@@@5
N@@@@? ?W&@@@@(Y?f?7@@@@ @@@@@@@@@@@@@@@@@@@XV@@@@@@@V@@@@H
?@@@@? ?7@@@@(Yg?@@@@@ @@@@@? @@@@@@@@@@@@@@@@0MS@@@@@@@@@@@@@5?@6X?hg
?@@@@L J@@@@(Y?g?@@@@5 @@@@@? I4@@@@@@@0M?e?O&@@@@@@@X@@@@@HJ@@1?hg
?@@@@1 ?W&@@@@Hh?@@@@H @@@@@? ?O2@@@@@@@@@(R@@@@@@T&@@@?hg
?@@@@@ W&@@@@5?h?@@@@? @@@@@? O2@@@@@@@@@@@@@@@0YJ@@@@(R@@@@5?hg
?@@@@@
?3@@@@ ?W&@@@@(Y?h?@@@@?
W&@@@@(Yhe?@@@@L @@@@@?
?J@@@@@? ?W2@@@@@@@@@@@@@@@@0M?O&@@@@HJ@@@@H?hg
?7@@@@@@@@@@@@@@@0M?W2@@@@@5?7@@@@
?N@@@@L? 7@@@@(Y?he?@@@@1 ?7@@@@@? ?@@@@@@@@@@@@@0Me?W&@@@@@(YJ@@@@@
@@@@1?
@@@@@L ?J@@@@(Yhf?@@@@@
W&@@@(Y?hf?@@@@@ ?@@@@@5?
J@@@@@H? I4@@@@@@@0M?fO&@@@@@(Y?7@@@@5
O2@@@@@@(Y?J@@@@@H
@@@@@)X?
@@@@@@)K ?W&@@@@H
?7@@@@5? ?@@@@@hf?W&@@@@@
?@@@@5hfO&@@@@@@ O2@@@@@@@(Y?W&@@@@5?
O2@@@@@@@@@@(Ye7@@@@@H?
@@@@@@@@6K
@@@@@@@@@@@@@@6K ?@@@@0Y? ?@@@0Yh?O2@@@@@@@@5
?O2@@@@@@@@@@@@@@H @@@@@@@@@@@@@@@@@0Y??J@@@@@5
@@@@@@@@@@@@@@@0M?eW&@@@@(Y
3@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?
N@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@? 3@@@@@@@@@@@@0M?e?O&@@@@@H?
V4@@@@@@@@@0M?e?W2@@@@@@@
?3@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@5? I4@@@0M?gO&@@@@@@@@@@
?V'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@(Y?
V4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0Y O2@@@@@@@@@@@@L?
O2@@@@@@@@@@X@@@@@1?
?@@@@@@@@@@@0R'@@@@@@L
?@@@@@@@@@@XeV'@@@@@1
?@@@@@@@@@@)X??N@@@@@@L?hg
?@@@@@1?e3@@@@@1?hg
?@@@@@@?eV'@@@@@Lhg
J@@@@@@Le?N@@@@@)X?hf
7@@@@@@1f3@@@@@)Khf
?J@@@@@@@@fN@@@@@@@6Khe
?7@@@@@@@@f?3@@@@@@@@@@@@@@@@@@
J@@@@@@@@@L?e?N@@@@@@@@@@@@@@@@@@
7@@@@@@@@@1?f@@@@@@@@@@@@@@@@@@
?J@@@@@V'@@@@?f3@@@@@@@@@@@@@@@@@
?7@@@@5?N@@@@?fN@@@@?I4@@@@@@@@@0
J@@@@(Y??@@@@?f?@@@@Lhf
?W&@@@@He?@@@@?f?@@@@1hf
?7@@@@5?e?@@@@?f?@@@@@hf

Das wissenschaftliche Fachblatt für Datenreisende


J@@@@(Y?e?@@@@?f?@@@@@hf
?W&@@@@Hf?@@@@?f?@@@@@hf
?7@@@@5?f?@@@@?f?@@@@@hf
J@@@@@H?f?@@@@?f?@@@@5hf
7@@@@5g?@@@@?f?@@@@Hhf
@@@@@HgJ@@@@?f?@@@@?hf
@@@@5?g7@@@5?fJ@@@@?hf
@@@@H?g@@@@H?f7@@@5?hf
@@@@h@@@@f?J@@@@H?hf
@@@@g?J@@@@f?7@@@@hg
@@@@g?7@@@@fJ@@@@5hg
@@@@g?@@@@5e?W&@@@(Yhg
?@@@@HeO&@@@@H?hg
J@@@@?W2@@@@@5
7@@@@W&@@@@@(Y
@@@@@@@@@@@(Y?
?O2@@@@?@@@@@@@@@@(Y
?W2@@@@@@@@?@@@@?@@@@0Y?
W&@@@@@@@@@?@@@@?@@0M?
7@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
?@@@@5
?@@@@H
?@@@@?

Ein Organ des Chaos Computer Club


?@@@@L
?@@@@1
?@@@@@
?@@@@@
?@@@@@
?@@@@@L?
?3@@@@1?
?N@@@@@L
3@@@@1
N@@@@@L?
?3@@@@)X
?N@@@@@1
3@@@@@
V'@@@@
?V4@@@

◆ Eckpunkte der deutsche


◆ weisses Papier
◆ Chaos Communication Camp

ISSN 0930-1045
Sommer 1999, DM 5,00
Postvertriebsstück
Die Datenschleuder C11301F #67 Sommer 1999 #67
Impressum Adressen http://www.ccc.de/ChaosTreffs.html

Chaos im Internet: http://www.ccc.de & news:de.org.ccc

Die Datenschleuder Nr. 67 Erfa-Kreise


II. Quartal, Sommer 1999
Herausgeber: Hamburg: Lokstedter Weg 72, D-20251 Hamburg, mail@hamburg.
(Abos, Adressen etc.) ccc.de Web: http://hamburg.ccc.de Phone: +49 (40) 401801-0 Fax: +49
Chaos Computer Club e.V., (40)401 801 - 41 Voicemailbox +49 (40) 401801-31. Treffen jeden
Lokstedter Weg 72, Dienstag ab ca. 20.00 Uhr in den ClubrŠumen. Der jeweils erste
D-20251 Hamburg, Dienstag im Monat ist Chaos-Orga-Plenum (intern), an allen anderen
Tel. +49 (40) 401801-0, Dienstagen ist jede(r) Interessierte herzlich willkommen. …ffentliche
Fax +49 (40) 401801-41, Workshops im Chaos-Bildungswerk fast jeden Donnerstag. Termine
EMail: ofÞce@ccc.de aktuell unter http://www.hamburg.ccc.de/Workshops/index.html
Redaktion:
(Artikel, Leserbriefe etc.) Berlin: Club Discordia alle zwei Wochen Donnerstags zwischen 17
Redaktion Datenschleuder, und 23 Uhr in den ClubrŠumen in der Marienstr. 11, Hinterhof in
Postfach 640236, D-10048 Berlin, Berlin-Mitte. NŠhe U-/S-Friedrichstrasse. Tel. (030) 285986-00, Fax.
Tel +49 (30) 280 974 70 (030) 285986-56. Briefpost CCC Berlin, Postfach 640236, D-10048
Fax +49 (30) 285 986 56 Berlin. Aktuelle Termine unter http://www.ccc.de/berlin
EMail: ds@ccc.de
Druck: St. Pauli Druckerei Hamburg Kšln: Der Chaos Computer Club Cologne zieht gerade um. Aktuelle
Koordinaten bitte unter mail@koeln.ccc.de bzw. http://www.koeln.
CvD und ViSdP: dieser Ausgabe: ccc.de erfragen. Telefonische Erreichbarkeit erst wieder nach vollstŠn-
Andy MŸller-Maguhn(andy@ccc.de) digem Bezug neuer RŠume.

Mitarbeiter dieser Ausgabe: Ulm: Kontaktperson: Frank Kargl <frank.kargl@ulm.ccc.de>


Djenia, Henriette, Chris, Tim, Zapf Electronic Mail: contact@ccc.ulm.de Web: http://www.ulm.ccc.de/
Dingbatz Treffen: Jeden Montag ab 19.30h im 'CafŽ Einstein' in der
UniversitŠt Ulm.
Eigentumsvorbehalt:
Diese Zeitschrift ist solange Eigen- Bielefeld: Kontakt Sven Klose Phone: +49 (521) 1365797 EMail:
tum des Absenders, bis sie dem Ge- mail@bielefeld.ccc.de. Treffen Donnerstags, ab 19.30 Uhr in der
fangenen persšnlich ausgehŠndigt GaststŠtte 'Pinte', Rohrteichstr. 28, beim Landgericht in Bielefeld.
worden ist. Zur-Habe-Nahme ist Interessierte sind herzlich eingeladen.
keine persšnliche AushŠndigung im
Sinne des Vorbehalts. Wird die Zeit- Chaos-Treffs: Aus PlatzgrŸnden kšnnen wir die Details
schrift dem Gefangenen nicht ausge- aller Chaos-Treffs hier nicht abdrucken. Es gibt in den
hŠndigt, so ist sie dem Absender mit folgenden StŠdten Chaos-Treffs, mit Detailinformationen
dem Grund der NichtaushŠndigung unter http://www.ccc.de/ChaosTreffs.html:
in Form eines rechtsmittelfŠhigen Bochum/Essen, Bremen, Burghausen/Obb. und Umgebung, Calw,
Bescheides zurŸckzusenden. Dithmarschen/Itzehoe, Dresden, Emden / Ostfriesland, Eisenach,
Erlangen/NŸrnberg/FŸrth, Frankfurt a.M., Freiburg, Freudenstadt,
Copyright (C) bei den Autoren Giessen/Marburg, Hanau, Hannover, Ingolstadt, Karlsruhe, Kassel,
Abdruck fŸr nichtgewerbliche LŸneburg, Mannheim/Ludwigshafen/Heidelberg, Mšnchenglad-
Zwecke bei Quellenangabe erlaubt. bach, MŸnchen, MŸnster/Rheine/Coesfeld/Greeven/OsnabrŸck,
Rosenheim/Bad Endorf, Neunkirchen/Saarland, WŸrzburg,
Schweiz/Dreyeckland: Basel, …sterreich: Wien

Die Datenschleuder #67 Sommer 1999


Sommer 1999 Die Datenschleuder #67
Worte an die Leser

Glaubten einige von uns bisher, nur mehr oder Deutschland von AuslŠndischen Interessenten
minder minder gesetzestreue Hacker, die sich mit erworben wurden. Dezentrale Recherchen
VerschlŸsselungs- und Sicherheitstechnologie angenehm. Sinn wŸrde es machen: Die
beschŠftigen sind in der Gefahr, unter unklaren amerikanische Gesetzeslage z.B. gilt ja auch fŸr
UmstŠnden zu verunglŸcken, so ist das Firmen in amerikanischem Besitz.
spŠtestens seit Anfang Mai vorbei. Der
Referatsleiter des Bundeswirtschaftsministeriums, Apropos Amerika: Unsere Werte Justizministerin
der den in dieser Ausgabe dokumentierten bekam jŸngst Post aus Amerika. Sie hat zwar von
Kabinettsbeschlu§ zu den Eckpunkten der dem Thema keine Ahnung, wurde aber trotzdem
deutschen Kryptopolitik verfasst hat, Þel aus von einer entsprechenden Stelle gebeten, dafŸr zu
bislang ungeklŠrten GrŸnden noch in der Nacht sorgen da§ keine harten Kryptoprodukte unter
nach Versand des Dokuments an das dem Wassenaar-Begriff ãpublic domainÒ fallen.
Innenministerium aus dem Fenster seiner im Andere nennen es deutsch-amerikanische
dritten Stock gelegenen Wohnung - und Freundschaft.
Ÿberlebte, schwerverletzt. Noch im Dezember
hatte er auf dem Chaos Communication Congress Auf dem Camp (6.-8. August, www.ccc.de/camp)
Ÿber die aktuelle Frontlage des Kryptowars und werden wir daher hoffentlich nicht nur viel Spa§
den Wassenaarverhandlungen berichtet. am GerŠt haben; viele internationale Gruppen wie
NatŸrlich wird es sich alles tragischer aber z.B. die Cypherpunks haben sich angekŸndigt um
zufŠlliger Unfall entpuppen. mit uns die Lage zu verbessern. Auch im
Reengineering-Bereich gibt«s einiges zu
Trotzdem verbleibt ein bitterer Nachgeschmack untersuchen; bringt mal mit, was es noch zu
angesichts der offen liegenden ZusammenhŠnge, untersuchen gilt.
in denen man sich beim Einsatz fŸr freie
VerschlŸsselung nicht nur beliebt macht. Zum Thema Untersuchen haben wir in dieser
Dokumentieren kšnnen wir immerhin den Ausgabe eine EinfŸhrung in die Befreiung von
zwischenzeitlich verabschiedeten Bits aus Chipkarten; ob das Hacken oder
Eckpunktekatalog; ein anderes Projekt des Fšrderung der Sicherheitsindustrie ist, sollten wir
verunglŸckten ist derweil ins Stocken gekommen. angesichts des derzeitgen Umfelds mal im Detail
So gibt es bisher nicht veriÞzierte Hinweise, da§ auf dem Camp diskutieren. Bis dahin viel Spa§
es die oft genannte deutsche Kryptoindustrie gar beim Sachenpacken... andy@ccc.de
nicht mehr gibt; die Firmen mit Sitz in

Impressum -1 /ds67/counterintelligence
Kontaktadressen -1 Interception Capabilities 2000 ■❏❏■■
Editorial / Index ❏❏❏❏❏ Minister enttarnte den eigenen
Kurzmeldungen ❏❏❏❏■ Geheimdienst ■❏■■■
NSA-Patente ■■❏❏❏
/ds67/cryptowar /ds67/infowar
Eckpunkte der dt. Kryptopolitik ❏❏❏■■ Information Operations:
Trend: full disclosure ❏❏■❏■ Protocol I Violation ■■❏■■

/ds67/hack Termine im Jahre 1999 33


Chipkartenhacken..Šh sicher machen ❏❏■■■ Bestellfetzen 34

Die Datenschleuder #67 Sommer 1999


Chaos Realitäts Dienst

die israelische Rivalin ECI Telecom Ltd. fŸr 1,35


/Y2K/Banken/Literatur: Mrd. $ verbreitet. Der Kurs der an der Nasdaq
Ausfallplanung der deutschen Banken gehandelten Aktien von PairGain legte darauf am
Mittwoch vormittag vorŸbergehend um Ÿber 30%
zu und schloss gleichentags immer noch um 10%
Eines der bislang am detaillierfreudigsten aus- hšher, obschon beide Unternehmen schon gegen
gearbeiteten šffentlichen Papier zum Jahr-2000 Mittag eine solche Fusion dementiert hatten und
Problem gibt es vom Bundesverband deutscher die Agentur Bloomberg selber mitgeteilt hatte,
Banken. Dort sind vor allem die Dominoeffekte dass die Fusionsmeldung nicht von ihr stamme.
sehr schšn geschildert, ohne da§ besondere http://www.nzz.ch/online/01_nzz_aktuell/Þnan
RŸcksicht auf die Informationspolitik šffentlicher z/04_Þnanz.htm
Stellen genommen wurde. Lesenswert:
http://www.bdb.de/verband/jahr2000/ausfallpl
anung.htm
/Opensource/danndochnoch
SGI goes Open Source
Ein Hinderungsgrund gegen den Einsatz von
/Y2K/Stellungnahmen/Regierung: Linux in gro§en Servern ist immer noch das
Fehlen eines Journaling File Systems, das im Falle
"Kein Anlaß zur Panik" eines Crashes ohne Filesystemcheck (fsck)
auskommt. Bei gro§en Systemem kann dieser
Die Bundesregierung hat mittlerweile einen durchaus Stunden dauern, so da§ ein
aktualisierten Bericht zum Jahr-2000-Problem vor- Wiederanlauf entsprechend trŠge wird. Auch die
gelegt. Laut einer Meldung des Heise-Tickers Suchzeiten in Verzeichnissen werden bei sehr
vom 21.04. betone Bundeswirtschaftsminister gro§en Dateisystemen (sehr viele Dateien) zu
Werner MŸller (parteilos) , da§ "zu Panik und lang. Hilfe kommt aus eher unerwarteter
gro§en BefŸrchtungen" nach allen Experten- Richtung: Silicon Graphics (SGI) stellt ihr XFS-
Erkenntnissen kein Anla§ bestehe. Dateisystem ab dem Sommer als Open Source zur
http://www.heise.de/newsticker/data/wst- VerfŸgung. Man darf auf Performancevergleiche
21.04.99-000/ gespannt sein. Mehr Info:
http://www.sgi.com/newsroom/press_releases/
/Internet/GeldohneUmwege 1999/may/xfs.html

Internet-Missbrauch für
/Chaos/Hamburg/Bildung
Kursmanipulationen: Falschmeldung
Chaos-Bildungswerk Hamburg
über eine Fusion Das Chaos-Bildungswerk hat die ersten
Wie die Neue ZŸricher Zeitung am 8. April Veranstaltungen hinter sich gebracht. Mit Elan
berichtete, ist es mehreren bislang nicht wurden VortrŠge Ÿber Programmiersprachen
identiÞzierten BetrŸgern gelungen, durch eine (Scheme, Perl), Netzwerkgrundlagen und
gefŠlschte Web-Page sowie mit Meldungen am Šhnliches unters interessierte Volk gebracht.
ÇMessageboardÈ von Yahoo eine als Bericht der Aktuell stehen PGP, Firewalls, Datenbanken,
Agentur Bloomberg vorgetŠuschte demnŠchst Linux und Verhandlungstaktik auf
Falschmeldung Ÿber einen Kauf der dem Themenplan. StŠndig aktuell ist dieser unter
amerikanischen PairGain Technologies Inc. durch http://www.hamburg.ccc.de/Workshops/index.

Sommer 1999 Die Datenschleuder #67


Kurzmeldungen & Update

html zu Þnden. Dort gibt es auch


Anfahrtbeschreibungen und Šhnlich
wegweisende Hinweise fŸr den Datenreisenden.
Best viewed with...
Termine sind in der Regel donnerstags um 19 Uhr
30 im CCC, Lokstedter Weg 72. LŠngere
Workshops geraten aber auch schon einmal ins
Wochenende. Die Veranstaltungen sind kostenlos,
der Erfa-Kreis bittet aber um eine kleine Spende,
um Flipchartblšcke, Folien usw. zu Þnanzieren -
wir denken da an etwa 5 Mark, aber das ist
absolut freiwillig. Zu einigen Veranstaltungen
gibt es Handouts oder FoliensŠtze auf Papier oder
elektronisch gegen Kostenbeteiligung.
Irgendwann sollen die Sachen, soweit /Durch/DES
elektronisch vorhanden (abfotograÞerte Flipcharts
sind nicht wirklich sinnvoll :-) auch ihren Weg ins Sollte noch *irgendjemand* glauben, DES waere
Netz Þnden. sinnvoll, mšge er sich das hier geben:
pirx@ccc.de http://search.ietf.org/internet-drafts/draft-
simpson-des-as-01.txt

/Dasletzte/Softwaregutachten Zitat: "The PPP DES Encryption Protocol" [RFC-


Auszug aus einem Artikel in der Neuen 2419], "The ESP DES-CBC Cipher Algorithm With
Juristischen Wochenzeitschift Computerreport Explicit IV" [RFC-2405], and "The ESP DES-CBC
(NJW-CoR) 4/99, Seite 217ff, in dem es eigentlich Transform" [RFC-1829] have been re-classiÞed to
um die Besonderheiten der BeweisbeschlŸsse bei Historic status, and implementation is Not
Software und Softwaregutachten geht...: Recommended.
"Das wŠre weiter nicht schlimm, wenn die
Systemsoftware nur selten ausfallen wŸrde.
Stabile Betriebssysteme wie Unix, OS/2 oder
/Datenschutz/Amerika/Ganzvorbei
bewŠhrte Gro§rechner-Systeme laufen heutzutage Bank sued over client data sale
monatelang ohne Abschaltung oder Ausfall. Das
Systemhaus hatte dem Anwender jedoch, aus was
fŸr GrŸnden auch imer, eine notorisch unstabile Snipped from comp.risks digest 20.44
Betriebssoftware, nennen wir sie W, empfohlen,
von der bekannt ist, da§ sie schon bei normalen The state of Minnesota last week sued U.S. Bank
Anwendungen selten mehr als einen Tag lang for allegedly selling Social Security numbers,
ohne Fehler lŠuft." account balances and other sensitive customer
Autor des Artikels ist Dr Peter Schnupp, data to a telemarketing company in exchange for
šffentlich bestellter und vereidigter commissions. Apparently several other banks are
SachverstŠndiger fŸr Systemsoftware und Technik also hawking customer information, which raises
der Softwareentwicklung in Falkenberg-Altgmain. serious privacy concerns. [Source:
*ComputerWorld*, article by Kim S. Nash, 14 Jun
migri@ccc.de
1999,
http://www.computerworld.com/home/print.ns
f/CWFlash/990614AE82 PGN]

Die Datenschleuder #67 Sommer 1999


Eckpunkte der deutschen Kryptopolitik

Bundesministerium des Innern / Im Oktober 1997 verabschiedete das


Bundesministerium fŸr Wirtschaft und Bundeskabinett den ÒFortschrittsbericht der
Technologie Bundesregierung Info 2000: Deutschlands Weg in
die InformationsgesellschaftÓ, der eine Passage
Bonn, den 2. Juni 1999 zur Kryptopolitik enthielt:

Eckpunkte der deutschen Kryptopolitik ÒEs wurde innerhalb der Bundesregierung


Einvernehmen erzielt, in dieser Legislaturperiode
Einleitung auf eine gesetzliche Regelung des
Inverkehrbringens und der Nutzung von
Programme und Chips zur sicheren Kryptoprodukten und -verfahren zu verzichten,
VerschlŸsselung von Nachrichten waren bis so da§ es bei der uneingeschrŠnkten Freiheit der
Anfang der Neunziger Jahre ein relativ Nutzer bei der Auswahl und dem Einsatz von
unbedeutender Nischenbereich der VerschlŸsselungssystemen bleibt. Die
Computerindustrie. Dieser Nischenbereich ist Bundesregierung wird die weitere Entwicklung
heute jedoch von erheblicher Bedeutung fŸr die auf dem Gebiet der Kryptographie vor allem im
wirtschaftliche und gesellschaftliche Entwicklung Kontext der europŠischen und internationalen
der Informationsgesellschaft insgesamt. Denn Zusammenarbeit aufmerksam verfolgen und ggf.
immer mehr entwickelt sich der weitere Ma§nahmen zur Umsetzung ihrer Ziele
Produktionsfaktor ÒInformationÓ zu einem einleiten.Ó
begehrten Rohstoff. Der effektivere Schutz dieses
Rohstoffs kann Ÿber Erfolg oder Mi§erfolg von Die Bundesregierung hat sich bislang allerdings
Unternehmen und damit Ÿber noch nicht verbindlich und eindeutig positioniert.
BeschŠftigungschancen im Informationszeitalter
entscheiden und nur durch den Einsatz starker Kryptographie und Wirtschaftsinteressen
kryptographischer Verfahren lŠ§t sich dieser
Schutz heute effektiv gewŠhrleisten. In jedem Fall Vor allem wegen der dynamischen Entwicklung
ist die LeistungsfŠhigkeit dieser Technologie des digitalen GeschŠftsverkehrs verzeichnen
heute grš§er als jemals zuvor. heute auch die MŠrkte fŸr
VerschlŸsselungsprodukte hohe Wachstumsraten.
Die Kryptokontroverse in Deutschland Wichtige Anwendungsbereiche fŸr
kryptographische Systeme sind heute (neben dem
Bei der Kryptokontroverse geht es um die Frage, traditionellen Schutz der Vertraulichkeit) z.B.
ob und in welchem Umfang die Nutzung Urheberschutz, digitale Signatur sowie digitales
kryptographischer Verfahren gesetzlich Geld. DarŸber hinausgehend ist Kryptographie
beschrŠnkt werden solle. Die Frage ist in vielen eine Querschnittstechnologie, die fŸr die
demokratischen IndustrielŠndern in den letzten Systemarchitektur und Entwicklung komplexer
Jahren kontrovers diskutiert worden. Auch in Electronic Commerce-Anwendungen
Deutschland fand eine intensive unverzichtbar ist. Mittelbar geht es hier also um
Auseinandersetzung, an der sich die weit grš§ere MŠrkte, z.B. den der
Bundesressorts mit unterschiedlichen Positionen, Telekommunikation, des Online-Banking oder der
die Wirtschaft sowie zahlreiche gesellschaftliche Telemedizin.
Gruppen beteiligten, hierŸber statt.

Sommer 1999 Die Datenschleuder #67


Zwar sind heute Sicherheitsstandards, die noch Bislang stellt der Mi§brauch von VerschlŸsselung
vor wenigen Jahren wegen der hohen Kosten vor in Deutschland fŸr die Strafverfolgung kein ernst-
allem Gro§unternehmen und staatlichen Stellen haftes Problem dar. Eine Prognose fŸr die
vorbehalten waren, auch fŸr mittelstŠndische Zukunft lŠ§t sich hieraus allerdings nicht
Betriebe und private Haushalte erschwinglich. herleiten. Es ist deshalb erforderlich, in
Dennoch werden VerschlŸsselungsprodukte in Deutschland aktive TechnikfolgenabschŠtzung im
Deutschland derzeit nicht in dem erforderlichen Hinblick auf die Belange der Strafverfolgungs-
Ma§e eingesetzt. Hier fehlt es vielfach an dem und Sicherheitsbehšrden zu betreiben, um
notwendigen IT-Sicherheitsbewu§tsein, obwohl Fehlentwicklungen so frŸhzeitig zu erkennen, da§
durch die unbefugte AusspŠhung, Manipulation ihnen - ggf. unter Zugrundelegung alternativer
oder Zerstšrung von Daten erhebliche Strategien - wirksam begegnet werden kann.
wirtschaftliche SchŠden entstehen kšnnen.
Auf der Grundlage der bisherigen nationalen
Deutsche Kryptohersteller haben gute Aussichten, Diskussion sowie der internationalen
im internationalen Wettbewerb um neue MŠrkte Entwicklung beschlie§t die Bundesregierung die
mitzuhalten, wenn die notwendigen folgenden Eckpunkte ihrer Kryptopolitik:
Rahmenbedingungen hierfŸr gewŠhrleistet sind.
Angesichts der strategischen Bedeutung dieser 1. Die Bundesregierung beabsichtigt nicht, die
Branche unternehmen viele wichtige freie VerfŸgbarkeit von
Industriestaaten erhebliche Anstrengungen, um VerschlŸsselungsprodukten in Deutschland
deren wirtschaftliche und technische einzuschrŠnken. Sie sieht in der Anwendung
LeistungsfŠhigkeit im eigenen Land zu stŠrken. sicherer VerschlŸsselung eine entscheidende
Voraussetzung fŸr den Datenschutz der BŸrger,
Kryptographie und Sicherheitsinteressen fŸr die Entwicklung des elektronischen
GeschŠftsverkehrs sowie fŸr den Schutz von
Der Einsatz kryptographischer Verfahren ist von Unternehmensgeheimnissen. Die
au§erordentlicher Bedeutung fŸr eine efÞziente Bundesregierung wird deshalb die Verbreitung
technische KriminalprŠvention. Dies gilt sowohl sicherer VerschlŸsselung in Deutschland aktiv
fŸr die GewŠhrleistung der AuthentizitŠt und unterstŸtzen. Dazu zŠhlt insbesondere die
IntegritŠt des Datenverkehrs wie auch fŸr den Fšrderung des Sicherheitsbewu§tseins bei den
Schutz der Vertraulichkeit. BŸrgern, der Wirtschaft und der Verwaltung.

Andererseits kann dieser Schutz der 2. Die Bundesregierung strebt an, das Vertrauen
Vertraulichkeit auch StraftŠter begŸnstigen: So ist der Nutzer in die Sicherheit der VerschlŸsselung
zu erwarten, da§ mit zunehmender zu stŠrken. Sie wird deshalb Ma§nahmen
Benutzerfreundlichkeit der ergreifen, um einen Vertrauensrahmen fŸr sichere
VerschlŸsselungsprodukte auch ihre Verbreitung VerschlŸsselung zu schaffen, insbesondere indem
in kriminellen Kreisen zunimmt. Dies kann die sie die †berprŸfbarkeit von
Strafverfolgungsbehšrden vor Probleme stellen. VerschlŸsselungsprodukten auf ihre
RechtmŠ§ig angeordnete richterliche Sicherheitsfunktionen verbessert und die
†berwachungsma§nahmen mŸssen ihre Wirkung Nutzung geprŸfter Produkte empÞehlt.
behalten, auch wenn die Zielperson die
betreffenden Informationen mit einem 3. Die Bundesregierung hŠlt aus GrŸnden der
kryptographischen Verfahren schŸtzt. Sicherheit von Staat, Wirtschaft und Gesellschaft

Die Datenschleuder #67 Sommer 1999


Trend: full disclosure

die FŠhigkeit deutscher Hersteller zur Trend: full disclosure


Entwicklung und Herstellung von sicheren und
leistungsfŠhigen VerschlŸsselungsprodukten fŸr 05.10.1999 There is a new trend in the reporting of
unverzichtbar. Sie wird Ma§nahmen ergreifen, security vulnerabilities these days. Many of the
um die internationale WettbewerbsfŠhigkeit problems are being reported by companies that
dieses Sektors zu stŠrken. make products to detect these problems. While
more people researching the security of products
4. Durch die Verbreitung starker is a good thing, it is certainly having an effect on
VerschlŸsselungsverfahren dŸrfen die the free ßow of security information. Sometimes
gesetzlichen Befugnisse der Strafverfolgungs- und this effect is to the detriment of the customers of
Sicherheitsbehšrden zur the product that the ßaw exists in.
TelekommunikationsŸberwachung nicht
ausgehšhlt werden. Die zustŠndigen If a company makes a product that scans for secu-
Bundesministerien werden deshalb die rity problems, they are going to want to add their
Entwicklung weiterhin aufmerksam beobachten newly discovered vulnerability to their list of
und nach Ablauf von zwei Jahren hierzu things to scan for. They are probably, depending
berichten. UnabhŠngig hiervon setzt sich die on the seriousness of the problem they have unco-
Bundesregierung im Rahmen ihrer Mšglichkeiten vered, going to want to make the advisory of the
fŸr die Verbesserung der technischen problem into a full scale press release that will
Kompetenzen der Strafverfolgungs- und hype their product. Usually the press release
Sicherheitsbehšrden ein. won't really tell you how to Þnd the problem or
how to solve it. You are going to need to
5. Die Bundesregierung legt gro§en Wert auf die download their product for that.
internationale Zusammenarbeit im Bereich der
VerschlŸsselungspolitik. Sie tritt ein fŸr am Markt When security problems exist on production
entwickelte offene Standards und interoperable servers accessible from the internet, time is
Systeme und wird sich fŸr die StŠrkung der critical. Every day that goes by is another day that
multilateralen und bilateralen Zusammenarbeit the server is exposed. How many people know
einsetzen. about the problem? Who is actively exploiting it?
It is impossible to tell. Good ethical security
practice is to tell the people effected quickly, espe-
cially if there are steps they can take to mitigate
or eliminate the risk themselves.

The L0pht recently found a problem with


Microsoft's IIS 4.0 web server, the showcode
problem. It allowed web users to read Þles
anywhere on the web server that the Þle permissi-
ons were set to be world-readable. This turns out
to be the case in many web servers that are not
locked down properly. The L0pht was surprised
at how widespread the problem was. Many high
proÞle e-commerce servers were effected. Many,
many corporate web servers were effected.

Sommer 1999 Die Datenschleuder #67


...full disclosure

The research of the problem, which took less than makes one wonder why Microsoft kept this
a day, came up with a simple solution. Delete the problem and easy solution to themselves for
sample Þles which made the machine vulnerable. several weeks.
They don't need to be on production servers
anyway. We crafted an advisory and gave out the Many crackers keep security vulnerabilities secret
solution. so that they can exploit them without worrying
about vendor patches or Þxes by system
When we reported this to Microsoft they said that administrators. This is looked down upon highly
they had known about the problem for "several by the security community as totally unethical.
weeks". They had been notiÞed by WebTrends Why keep the vulnerabilities secret unless you are
about the problem, were researching it, and going to exploit them, or perhaps trade them for
would issue a Security Bulletin. It didn't seem to something?
be that so complicated an issue that would take
several weeks to research. And the Þx was simple. Now we have software vendors keeping things
Just delete the Þles. No need to download a hotÞx secret. At least secret for a substantial period of
or even tweak the registry. What was taking so time. Is this the way we want the industry to
long? behave?

The L0pht released the showcode advisory to This is why full disclosure mailing lists such as
Bugtraq, computer industry reporters, and Bugtraq and web sites such as Packet Storm
Microsoft on May 7, 1999, 9:30am EST. Later that Security are so important. They allow customers
day, approximately 1:40 pm EST, WebTrends to get vulnerability reports, and hopefully Þxes,
released a press release about the same problem. in a timely manner. There is no centralized
It spoke of how WebTrends had discovered the clearinghouse such as the software vendor or
problem. The WebTrends press release didn't tell some government agency to slow things up for
how to detect the problem and had no solution to their own ends.
the problem. Two things that were present in the
L0pht advisory. It seemed that you had to Vulnerability information is extremely valuable
download and run their product if you wanted both to attackers and customers. Companies and
this information. organizations that release this information openly
and as soon as possible are doing the security
It makes one wonder if the press release was put community a service. Those who choose to use
out at that particular time because the L0pht had the information for their own purposes Þrst put
informed the public about the problem Þrst. It customers at risk.

Die Datenschleuder #67 Sommer 1999


Design Principles for Tamper-Resistant Smartcard Processors

Oliver Kömmerling Markus G. Kuhn

Advanced Digital University of Cambridge


Security Research Computer Laboratory
Mühlstraße 7 Pembroke Street
66484 Riedelberg Cambridge CB2 3QG
Germany United Kingdom
ok@adsr.de mgk25@cl.cam.ac.uk

Abstract for countermeasures. Some of these we believe to be


new, while others have already been implemented in
We describe techniques for extracting protected products but are either not widely used or have de-
software and data from smartcard processors. This sign flaws that have allowed us to circumvent them.
includes manual microprobing, laser cutting, fo-
cused ion-beam manipulation, glitch attacks, and 2 Tampering Techniques
power analysis. Many of these methods have already
been used to compromise widely-fielded conditional- We can distinguish four major attack categories:
access systems, and current smartcards offer little
protection against them. We give examples of low- • Microprobing techniques can be used to access
cost protection concepts that make such attacks con- the chip surface directly, thus we can observe, ma-
siderably more difficult. nipulate, and interfere with the integrated circuit.

1 Introduction • Software attacks use the normal communica-


tion interface of the processor and exploit secu-
Smartcard piracy has become a common occur- rity vulnerabilities found in the protocols, cryp-
rence. Since around 1994, almost every type of tographic algorithms, or their implementation.
smartcard processor used in European, and later also
American and Asian, pay-TV conditional-access sys- • Eavesdropping techniques monitor, with high
tems has been successfully reverse engineered. Com- time resolution, the analog characteristics of all
promised secrets have been sold in the form of il- supply and interface connections and any other
licit clone cards that decrypt TV channels without electromagnetic radiation produced by the pro-
revenue for the broadcaster. The industry has had cessor during normal operation.
to update the security processor technology several • Fault generation techniques use abnormal en-
times already and the race is far from over. vironmental conditions to generate malfunctions
Smartcards promise numerous security benefits. in the processor that provide additional access.
They can participate in cryptographic protocols, and
unlike magnetic stripe cards, the stored data can be All microprobing techniques are invasive attacks.
protected against unauthorized access. However, the They require hours or weeks in a specialized labora-
strength of this protection seems to be frequently tory and in the process they destroy the packaging.
overestimated. The other three are non-invasive attacks. After we
In Section 2, we give a brief overview on the have prepared such an attack for a specific proces-
most important hardware techniques for breaking sor type and software version, we can usually repro-
into smartcards. We aim to help software engineers duce it within seconds on another card of the same
without a background in modern VLSI test tech- type. The attacked card is not physically harmed
niques in getting a realistic impression of how phys- and the equipment used in the attack can usually be
ical tampering works and what it costs. Based on disguised as a normal smartcard reader.
our observations of what makes these attacks par- Non-invasive attacks are particularly dangerous
ticularly easy, in Section 3 we discuss various ideas in some applications for two reasons. Firstly, the

USENIX Workshop on Smartcard Technology, Chicago, Illinois,


USA, May 10-11, 1999.

Sommer 1999 Die Datenschleuder #67


owner of the compromised card might not notice
that the secret keys have been stolen, therefore it
is unlikely that the validity of the compromised keys
will be revoked before they are abused. Secondly,
non-invasive attacks often scale well, as the neces-
sary equipment (e.g., a small DSP board with special
software) can usually be reproduced and updated at
low cost.
The design of most non-invasive attacks requires
detailed knowledge of both the processor and soft-
ware. On the other hand, invasive microprobing at-
tacks require very little initial knowledge and usually
work with a similar set of techniques on a wide range
of products. Attacks therefore often start with in-
vasive reverse engineering, the results of which then Figure 1: Hot fuming nitric acid (> 98% HNO3 )
help to develop cheaper and faster non-invasive at- dissolves the package without affecting the chip.
tacks. We have seen this pattern numerous times on
the conditional-access piracy market.
Non-invasive attacks are of particular concern in
applications where the security processor is primar-
ily required to provide tamper evidence, while inva-
sive attacks violate the tamper-resistance character-
istics of a card [1]. Tamper evidence is of primary
concern in applications such as banking and digi-
tal signatures, where the validity of keys can easily
be revoked and where the owner of the card has al-
ready all the access that the keys provide anyway.
Tamper resistance is of importance in applications
such as copyright enforcement, intellectual property
protection, and some electronic cash schemes, where
the security of an entire system collapses as soon as
a few cards are compromised.
Figure 2: The depackaged smartcard processor is
To understand better which countermeasures are
glued into a test package, whose pins are then con-
of practical value, we first of all have to understand
nected to the contact pads of the chip with fine alu-
the techniques that pirates have used so far to break
minium wires in a manual bonding machine.
practically all major smartcard processors on the
market. In the next section, we give a short guided
tour through a typical laboratory of a smartcard pi- acetone in an ultrasonic bath, followed optionally by
rate. a short bath in deionized water and isopropanol. We
remove the remaining bonding wires with tweezers,
2.1 Invasive Attacks glue the die into a test package, and bond its pads
manually to the pins (Fig. 2). Detailed descriptions
2.1.1 Depackaging of Smartcards
of these and other preparation techniques are given
Invasive attacks start with the removal of the chip in [2, 3].
package. We heat the card plastic until it becomes
flexible. This softens the glue and the chip mod- 2.1.2 Layout Reconstruction
ule can then be removed easily by bending the card.
We cover the chip module with 20–50 ml of fuming The next step in an invasive attack on a new pro-
nitric acid heated to around 60 ◦ C and wait for the cessor is to create a map of it. We use an optical
black epoxy resin that encapsulates the silicon die to microscope with a CCD camera to produce several
completely dissolve (Fig. 1). The procedure should meter large mosaics of high-resolution photographs
preferably be carried out under very dry conditions, of the chip surface. Basic architectural structures,
as the presence of water could corrode exposed alu- such as data and address bus lines, can be identi-
minium interconnects. The chip is then washed with fied quite quickly by studying connectivity patterns

Die Datenschleuder #67 Sommer 1999


Figure 3: Left: CMOS AND gate imaged by a con-
focal microscope. Right: same gate after removal of
metal layer (HF wet etching). Polysilicon intercon-
nects and diffusion areas are now fully visible.
Figure 4: The vias in this structure found in a
ST16F48A form a permutation matrix between the
and by tracing metal lines that cross clearly visible memory readout column lines and the 16:1 demulti-
module boundaries (ROM, RAM, EEPROM, ALU, plexer. The applied mapping remains clearly visible.
instruction decoder, etc.). All processing modules
are usually connected to the main bus via easily rec-
ognizable latches and bus drivers. The attacker ob- layout only until we have identified those bus lines
viously has to be well familiar with CMOS VLSI and functional modules that we have to manipulate
design techniques and microcontroller architectures, to access all memory values. More recently, design-
but the necessary knowledge is easily available from ers of conditional-access smartcards have started to
numerous textbooks [4, 5, 6, 7]. add proprietary cryptographic hardware functions
Photographs of the chip surface show the top that forced the attackers to reconstruct more com-
metal layer, which is not transparent and therefore plex circuitry involving several thousand transistors
obscures the view on many structures below. Un- before the system was fully compromised. How-
less the oxide layers have been planarized, lower ever, the use of standard-cell ASIC designs allows
layers can still be recognized through the height us to easily identify logic gates from their diffusion
variations that they cause in the covering layers. area layout, which makes the task significantly easier
Deeper layers can only be recognized in a second se- than the reconstruction of a transistor-level netlist.
ries of photographs after the metal layers have been Some manufacturers use non-standard instruction
stripped off, which we achieve by submerging the sets and bus-scrambling techniques in their secu-
chip for a few seconds in hydrofluoric acid (HF) in an rity processors. In this case, the entire path from
ultrasonic bath [2]. HF quickly dissolves the silicon the EEPROM memory cells to the instruction de-
oxide around the metal tracks and detaches them coder and ALU has to be examined carefully before
from the chip surface. HF is an extremely dangerous a successful disassembly of extracted machine code
substance and safety precautions have to be followed becomes possible. However, the attempts of bus
carefully when handling it. scrambling that we encountered so far in smartcard
Figure 3 demonstrates an optical layout recon- processors were mostly only simple permutations of
struction of a NAND gate followed by an inverter. lines that can be spotted easily (Fig. 4).
These images were taken with a confocal micro- Any good microscope can be used in optical VLSI
scope (Zeiss Axiotron-2 CSM), which assigns differ- layout reconstruction, but confocal microscopes have
ent colors to different focal planes (e.g., metal=blue, a number of properties that make them particularly
polysilicon=green) and thus preserves depth infor- suited for this task. While normal microscopes pro-
mation [8]. Multilayer images like those shown in duce a blurred image of any plane that is out of fo-
Fig. 3 can be read with some experience almost as cus, in confocal scanning optical microscopes, every-
easily as circuit diagrams. These photographs help thing outside the focal plane just becomes dark [8].
us in understanding those parts of the circuitry that Confocal microscopes also provide better resolution
are relevant for the planned attack. and contrast. A chromatic lens in the system can
If the processor has a commonly accessible stan- make the location of the focal plane wavelength de-
dard architecture, then we have to reconstruct the pendent, such that under white light different layers

Sommer 1999 Die Datenschleuder #67


Figure 5: The data of this NOR ROM becomes Figure 6: The implant-mask layout of a NAND
clearly visible when the covering metal and polysili- ROM can be made visible by a dopant-selective
con access lines plus the surrounding field oxide have crystallographic etch (Dash etchand [2]). This im-
been removed (HF wet etching). The image shows age shows 16 × 14 bits plus parts of the row selec-
16 × 10 bits in an ST16xyz. Every bit is represented tor of a ROM found on an MC68HC05SC2x CPU.
by either a present or missing diffusion layer connec- The threshold voltage of 0-bit p-channel transistors
tion. (stained dark here) was brought below 0 V through
ion implantation.
of the chip will appear simultaneously, but in differ-
ent colors. where an enthusiastic smartcard hacker has recon-
Automatic layout reconstruction has been demon- structed several kilobytes of ROM manually.
strated with scanning electron microscopy [9]. We While the ROM usually does not contain any
consider confocal microscopy to be an attractive al- cryptographic key material, it does often contain
ternative, because we do not need a vacuum envi- enough I/O, access control, and cryptographic rou-
ronment, the depth information is preserved, and tines to be of use in the design of a non-invasive
the option of oil immersion allows the hiding of un- attack.
evenly removed oxide layers. With UV microscopy,
even chip structures down to 0.1 µm can be resolved.
2.1.3 Manual Microprobing
With semiautomatic image-processing methods,
significant portions of a processor can be reverse The most important tool for invasive attacks is a
engineered within a few days. The resulting poly- microprobing workstation. Its major component is
gon data can then be used to automatically generate a special optical microscope (e.g., Mitutoyo FS-60)
transistor and gate-level netlists for circuit simula- with a working distance of at least 8 mm between
tions. the chip surface and the objective lens. On a stable
Optical reconstruction techniques can also be platform around a socket for the test package, we in-
used to read ROM directly. The ROM bit pattern stall several micropositioners (e.g., from Karl Suss,
is stored in the diffusion layer, which leaves hardly Micromanipulator, or Wentworth Labs), which allow
any optical indication of the data on the chip sur- us to move a probe arm with submicrometer preci-
face. We have to remove all covering layers using HF sion over a chip surface. On this arm, we install a
wet etching, after which we can easily recognize the “cat whisker” probe (e.g., Picoprobe T-4-10). This
rims of the diffusion regions that reveal the stored is a metal shaft that holds a 10 µm diameter and
bit pattern (Fig. 5). 5 mm long tungsten-hair, which has been sharpened
Some ROM technologies store bits not in the at the end into a < 0.1 µm tip. These elastic probe
shape of the active area but by modifying transistor hairs allow us to establish electrical contact with on-
threshold voltages. In this case, additional dopant- chip bus lines without damaging them. We connect
selective staining techniques have to be applied to them via an amplifier to a digital signal processor
make the bits visible (Fig. 6). Together with an card that records or overrides processor signals and
understanding of the (sometimes slightly scrambled, also provides the power, clock, reset, and I/O signals
see Fig. 4) memory-cell addressing, we obtain disas- needed to operate the processor via the pins of the
sembler listings of the entire ROM content. Again, test package.
automated processing techniques can be used to ex- On the depackaged chip, the top-layer aluminium
tract the data from photos, but we also know cases interconnect lines are still covered by a passivation

Die Datenschleuder #67 Sommer 1999


2.1.4 Memory Read-out Techniques

It is usually not practical to read the information


stored on a security processor directly out of each
single memory cell, except for ROM. The stored data
has to be accessed via the memory bus where all data
is available at a single location. Microprobing is used
to observe the entire bus and record the values in
memory as they are accessed.
It is difficult to observe all (usually over 20) data
and address bus lines at the same time. Various
techniques can be used to get around this problem.
Figure 7: This image shows 9 horizontal bus lines For instance we can repeat the same transaction
on a depackaged smartcard processor. A UV laser many times and use only two to four probes to ob-
(355 nm, 5 ns) was used to remove small patches of serve various subsets of the bus lines. As long as
the passivation layer over the eight data-bus lines to the processor performs the same sequence of mem-
provide for microprobing access. ory accesses each time, we can combine the recorded
bus subset signals into a complete bus trace. Over-
lapping bus lines in the various recordings help us
layer (usually silicon oxide or nitride), which pro- to synchronize them before they are combined.
tects the chip from the environment and ion migra- In applications such as pay-TV, attackers can eas-
tion. On top of this, we might also find a poly- ily replay some authentic protocol exchange with
imide layer that was not entirely removed by HNO3 the card during a microprobing examination. These
but which can be dissolved with ethylendiamine. applications cannot implement strong replay pro-
We have to remove the passivation layer before the tections in their protocols, because the transaction
probes can establish contact. The most convenient counters required to do this would cause an NVRAM
depassivation technique is the use of a laser cutter write access per transaction. Some conditional-
(e.g., from New Wave Research). access cards have to perform over a thousand pro-
The UV or green laser is mounted on the camera tocol exchanges per hour and EEPROM technology
port of the microscope and fires laser pulses through allows only 104 –106 write cycles during the lifetime
the microscope onto rectangular areas of the chip of a storage cell. An NVRAM transaction counter
with micrometer precision. Carefully dosed laser would damage the memory cells, and a RAM counter
flashes remove patches of the passivation layer. The can be reset by the attacker easily by removing
resulting hole in the passivation layer can be made so power. Newer memory technologies such as FERAM
small that only a single bus line is exposed (Fig. 7). allow over 109 write cycles, which should solve this
This prevents accidental contacts with neighbouring problem.
lines and the hole also stabilizes the position of the Just replaying transactions might not suffice to
probe and makes it less sensitive to vibrations and make the processor access all critical memory loca-
temperature changes. tions. For instance, some banking cards read criti-
Complete microprobing workstations cost tens of cal keys from memory only after authenticating that
thousands of dollars, with the more luxurious ver- they are indeed talking to an ATM. Pay-TV card
sions reaching over a hundred thousand US$. The designers have started to implement many different
cost of a new laser cutter is roughly in the same encryption keys and variations of encryption algo-
region. rithms in every card, and they switch between these
Low-budget attackers are likely to get a cheaper every few weeks. The memory locations of algorithm
solution on the second-hand market for semicon- and key variations are not accessed by the proces-
ductor test equipment. With patience and skill it sor before these variations have been activated by a
should not be too difficult to assemble all the re- signed message from the broadcaster, so that passive
quired tools for even under ten thousand US$ by monitoring of bus lines will not reveal these secrets
buying a second-hand microscope and using self- to an attacker early.
designed micropositioners. The laser is not essential Sometimes, hostile bus observers are lucky and
for first results, because vibrations in the probing encounter a card where the programmer believed
needle can also be used to break holes into the pas- that by calculating and verifying some memory
sivation. checksum after every reset the tamper-resistance

Sommer 1999 Die Datenschleuder #67


could somehow be increased. This gives the at- form a volatile compound that can be pumped away
tacker of course easy immediate access to all memory and is not redeposited. Using this gas-assisted etch
locations on the bus and simplifies completing the technique, holes that are up to 12 times deeper than
read-out operation considerably. Surprisingly, such wide can be created at arbitrary angles to get ac-
memory integrity checks were even suggested in the cess to deep metal layers without damaging nearby
smartcard security literature [10], in order to defeat structures. By injecting a platinum-based organo-
a proposed memory rewrite attack technique [11]. metallic gas that is broken down on the chip surface
This demonstrates the importance of training the by the ion beam, platinum can be deposited to es-
designers of security processors and applications in tablish new contacts. With other gas chemistries,
performing a wide range of attacks before they start even insulators can be deposited to establish surface
to design countermeasures. Otherwise, measures contacts to deep metal without contacting any cov-
against one attack can far too easily backfire and ering layers.
simplify other approaches in unexpected ways. Using laser interferometer stages, a FIB operator
In order to read out all memory cells without the can navigate blindly on a chip surface with 0.15 µm
help of the card software, we have to abuse a CPU precision, even if the chip has been planarized and
component as an address counter to access all mem- has no recognizable surface structures. Chips can
ory cells for us. The program counter is already also be polished from the back side down to a thick-
incremented automatically during every instruction ness of just a few tens of micrometers. Using laser-
cycle and used to read the next address, which makes interferometer navigation or infrared laser imaging,
it perfectly suited to serve us as an address sequence it is then possible to locate individual transistors and
generator [12]. We only have to prevent the proces- contact them through the silicon substrate by FIB
sor from executing jump, call, or return instructions, editing a suitable hole. This rear-access technique
which would disturb the program counter in its nor- has probably not yet been used by pirates so far,
mal read sequence. Tiny modifications of the in- but the technique is about to become much more
struction decoder or program counter circuit, which commonly available and therefore has to be taken
can easily be performed by opening the right metal into account by designers of new security chips.
interconnect with a laser, often have the desired ef- FIBs are used by attackers today primarily to
fect. simplify manual probing of deep metal and polysil-
icon lines. A hole is drilled to the signal line of in-
2.1.5 Particle Beam Techniques terest, filled with platinum to bring the signal to
the surface, where a several micrometer large prob-
Most currently available smartcard processors have ing pad or cross is created to allow easy access
feature sizes of 0.5–1 µm and only two metal lay- (Fig. 11). Modern FIB workstations (for example
ers. These can be reverse-engineered and observed the FIB 200xP from FEI) cost less than half a mil-
with the manual and optical techniques described lion US$ and are available in over hundred organiza-
in the previous sections. For future card genera- tions. Processing time can be rented from numerous
tions with more metal layers and features below the companies all over the world for a few hundred dol-
wavelength of visible light, more expensive tools ad- lars per hour.
ditionally might have to be used. Another useful particle beam tool are electron-
A focused ion beam (FIB) workstation consists of beam testers (EBT) [14]. These are SEMs with a
a vacuum chamber with a particle gun, comparable voltage-contrast function. Typical acceleration volt-
to a scanning electron microscope (SEM). Gallium ages and beam currents for the primary electrons
ions are accelerated and focused from a liquid metal are 2.5 kV and 5 nA. The number and energy of sec-
cathode with 30 kV into a beam of down to 5–10 nm ondary electrons are an indication of the local elec-
diameter, with beam currents ranging from 1 pA to tric field on the chip surface and signal lines can be
10 nA. FIBs can image samples from secondary par- observed with submicrometer resolution. The signal
ticles similar to a SEM with down to 5 nm resolution. generated during e-beam testing is essentially the
By increasing the beam current, chip material can be low-pass filtered product of the beam current mul-
removed with the same resolution at a rate of around tiplied with a function of the signal voltage, plus
0.25 µm3 nA−1 s−1 [13]. Better etch rates can be noise. EBTs can measure waveforms with a band-
achieved by injecting a gas like iodine via a needle width of several gigahertz, but only with periodic
that is brought to within a few hundred micrometers signals where stroboscopic techniques and periodic
from the beam target. Gas molecules settle down on averaging can be used. If we use real-time voltage-
the chip surface and react with removed material to contrast mode, where the beam is continuously di-

Die Datenschleuder #67 Sommer 1999


rected to a single spot and the blurred and noisy to ground one of the outputs during a write oper-
stream of secondary electrons is recorded, then the ation. This saves some space but causes a signif-
signal bandwidth is limited to a few megahertz [14]. icant short-circuit during every change of a bit.
While such a bandwidth might just be sufficient for
observing a single signal line in a 3.5 MHz smart- There are numerous other effects. During careful
card, it is too low to observe an entire bus with a security reviews of processor designs it is often nec-
sample frequency of several megahertz for each line. essary to perform detailed analog simulations and
EBTs are very convenient attack tools if the clock tests and it is not sufficient to just study a digital
frequency of the observed processor can be reduced abstraction.
below 100 kHz to allow real-time recording of all bus Smartcard processors are particularly vulnerable
lines or if the processor can be forced to generate to non-invasive attacks, because the attacker has full
periodic signals by continuously repeating the same control over the power and clock supply lines. Larger
transaction during the measurement. security modules can be equipped with backup bat-
teries, electromagnetic shielding, low-pass filters,
2.2 Non-invasive Attacks and autonomous clock signal generators to reduce
many of the risks to which smartcard processors are
A processor is essentially a set of a few hundred particularly exposed.
flipflops (registers, latches, and SRAM cells) that de-
fine its current state, plus combinatorial logic that 2.2.1 Glitch Attacks
calculates from the current state the next state dur-
In a glitch attack, we deliberately generate a mal-
ing every clock cycle. Many analog effects in such
function that causes one or more flipflops to adopt
a system can be used in non-invasive attacks. Some
the wrong state. The aim is usually to replace a sin-
examples are:
gle critical machine instruction with an almost ar-
• Every transistor and interconnection have a ca- bitrary other one. Glitches can also aim to corrupt
pacitance and resistance that, together with fac- data values as they are transferred between registers
tors such as the temperature and supply voltage, and memory. Of the many fault-induction attack
determine the signal propagation delays. Due to techniques on smartcards that have been discussed
production process fluctuations, these values can in the recent literature [11, 12, 16, 17, 18], it has
vary significantly within a single chip and between been our experience that glitch attacks are the ones
chips of the same type. most useful in practical attacks.
We are currently aware of three techniques for cre-
• A flipflop samples its input during a short time ating fairly reliable malfunctions that affect only a
interval and compares it with a threshold volt- very small number of machine cycles in smartcard
age derived from its power supply voltage. The processors: clock signal transients, power supply
time of this sampling interval is fixed relative to transients, and external electrical field transients.
the clock edge, but can vary between individual Particularly interesting instructions that an at-
flipflops. tacker might want to replace with glitches are condi-
tional jumps or the test instructions preceding them.
• The flipflops can accept the correct new state only They create a window of vulnerability in the process-
after the outputs of the combinatorial logic have ing stages of many security applications that often
stabilized on the prior state. allows us to bypass sophisticated cryptographic bar-
riers by simply preventing the execution of the code
• During every change in a CMOS gate, both the
that detects that an authentication attempt was un-
p- and n-transistors are open for a short time,
successful. Instruction glitches can also be used to
creating a brief short circuit of the power supply
extend the runtime of loops, for instance in serial
lines [15]. Without a change, the supply current
port output routines to see more of the memory af-
remains extremely small.
ter the output buffer [12], or also to reduce the run-
• Power supply current is also needed to charge or time of loops, for instance to transform an iterated
discharge the load capacitances when an output cipher function into an easy to break single-round
changes. variant [11].
Clock-signal glitches are currently the simplest
• A normal flipflop consists of two inverters and and most practical ones. They temporarily increase
two transmission gates (8 transistors). SRAM the clock frequency for one or more half cycles, such
cells use only two inverters and two transistors that some flipflops sample their input before the new

Sommer 1999 Die Datenschleuder #67


state has reached them. Although many manufac- signals. By averaging the current measurements of
turers claim to implement high-frequency detectors many repeated identical transactions, we can even
in their clock-signal processing logic, these circuits identify smaller signals that are not transmitted over
are often only simple-minded filters that do not de- the bus. Signals such as carry bit states are of special
tect single too short half-cycles. They can be cir- interest, because many cryptographic key scheduling
cumvented by carefully selecting the duty cycles of algorithms use shift operations that single out indi-
the clock signal during the glitch. vidual key bits in the carry flag. Even if the status-
In some designs, a clock-frequency sensor that is bit changes cannot be measured directly, they often
perfectly secure under normal operating voltage ig- cause changes in the instruction sequencer or mi-
nores clock glitches if they coincide with a carefully crocode execution, which then cause a clear change
designed power fluctuation. We have identified clock in the power consumption.
and power waveform combinations for some widely The various instructions cause different levels of
used processors that reliably increment the program activity in the instruction decoder and arithmetic
counter by one without altering any other processor units and can often be quite clearly distinguished,
state. An arbitrary subsequence of the instructions such that parts of algorithms can be reconstructed.
found in the card can be executed by the attacker Various units of the processor have their switching
this way, which leaves very little opportunity for transients at different times relative to the clock
the program designer to implement effective coun- edges and can be separated in high-frequency mea-
termeasures in software alone. surements.
Power fluctuations can shift the threshold volt-
ages of gate inputs and anti-tampering sensors rel- 3 Countermeasures
ative to the unchanged potential of connected ca-
3.1 Randomized Clock Signal
pacitances, especially if this occurs close to the sam-
pling time of the flipflops. Smartcard chips do not Many non-invasive techniques require the at-
provide much space for large buffer capacitors, and tacker to predict the time at which a certain instruc-
voltage threshold sensors often do not react to very tion is executed. A strictly deterministic processor
fast transients. that executes the same instruction c clock cycles af-
In a potential alternative glitch technique that we ter each reset—if provided with the same input at
have yet to explore fully, we place two metal needles every cycle—makes this easy. Predictable processor
on the card surface, only a few hundred micrometers behaviour also simplifies the use of protocol reaction
away from the processor. We then apply spikes of times as a covert channel.
a few hundred volts for less than a microsecond on The obvious countermeasure is to insert random-
these needles to generate electrical fields in the sil- time delays between any observable reaction and
icon substrate of sufficient strength to temporarily critical operations that might be subject to an at-
shift the threshold voltages of nearby transistors. tack. If the serial port were the only observable
channel, then a few random delay routine calls con-
2.2.2 Current Analysis trolled by a hardware noise source would seem suf-
ficient. However, since attackers can use cross-
Using a 10–15 Ω resistor in the power supply, we can correlation techniques to determine in real-time from
measure with an analog/digital converter the fluctu- the current fluctuations the currently executed in-
ations in the current consumed by the card. Prefer- struction sequence, almost every instruction be-
ably, the recording should be made with at least comes an observable reaction, and a few localized
12-bit resolution and the sampling frequency should delays will not suffice.
be an integer multiple of the card clock frequency. We therefore strongly recommend introducing
Drivers on the address and data bus often con- timing randomness at the clock-cycle level. A ran-
sist of up to a dozen parallel inverters per bit, each dom bit-sequence generator that is operated with
driving a large capacitive load. They cause a sig- the external clock signal should be used to generate
nificant power-supply short circuit during any tran- an internal clock signal. This will effectively reduce
sition. Changing a single bus line from 0 to 1 or the clock frequency by a factor of four, but most
vice versa can contribute in the order of 0.5–1 mA smartcards anyway reduce internally the 3.5 MHz
to the total current at the right time after the clock provided for contact cards and the 13 MHz provided
edge, such that a 12-bit ADC is sufficient to esti- for contact-less cards.
mate the number of bus bits that change at a time. Hardware random bit generators (usually the am-
SRAM write operations often generate the strongest plified thermal noise of transistors) are not always

Die Datenschleuder #67 Sommer 1999


good at producing uniform output statistics at high instructions to fork off the other thread(s) and to
bit rates, therefore their output should be smoothed synchronize and terminate them. Multithreaded ap-
with an additional simple pseudo-random bit gener- plications could interleave some of the many inde-
ator. pendent cryptographic operations needed in secu-
The probability that n clock cycles have been exe- rity protocols. For the remaining time, the auxiliary
cuted by a card with a randomized clock signal after threads could just perform random encryptions in
c clock cycles have been applied can be described as order to generate an realistic current pattern during
a binomial distribution: the delay periods of the main application.
  
c c 3.3 Robust Low-frequency Sensor
p(n, c) = 2−c
2n 2n + 1
r Bus-observation by e-beam testing becomes much
8 8 c 2 easier when the processor can be clocked with only
≈ · e− c ·(n− 4 ) as c → ∞
πc a few kilohertz, and therefore a low-frequency alarm
is commonly found on smartcard processors. How-
So for instance after we have sent 1000 clock cy-
ever, simple high-pass or low-pass RC elements are
cles to the smartcard, we can be fairly sure (prob-
not sufficient, because by carefully varying the duty
ability > 1 − 10−9 ) that between 200 and 300 of
cycle of the clock signal, we can often prevent the
them have been executed. This distribution can be
activation of such detectors. A good low-frequency
used to verify that safety margins for timing-critical
sensor must trigger if no clock edge has been seen for
algorithms—such as the timely delivery of a pay-TV
longer than some specified time limit (e.g., 0.5 µs).
control word—are met with sufficiently high proba-
In this case, the processor must not only be reset im-
bility.
mediately, but all bus lines and registers also have to
Only the clock signals of circuitry such as the se-
be grounded quickly, as otherwise the values on them
rial port and timer need to be supplied directly with
would remain visible sufficiently long for a voltage-
the external clock signal, all other processor parts
contrast scan.
can be driven from the randomized clock.
Even such carefully designed low-frequency detec-
A lack of switching transients during the inactive
tors can quite easily be disabled by laser cutting or
periods of the random clock could allow the attacker
FIB editing the RC element. To prevent such simple
to reconstruct the internal clock signal from the con-
tampering, we suggest that an intrinsic self-test be
sumed current. It is therefore essential that the pro-
built into the detector. Any attempt to tamper with
cessor shows a characteristic current activity even
the sensor should result in the malfunction of the en-
during the delay phases of the random clock. This
tire processor. We have designed such a circuit that
can be accomplished by driving the bus with ran-
tests the sensor during a required step in the nor-
dom values or by causing the microcode to perform
mal reset sequence. External resets are not directly
a write access to an unused RAM location while the
forwarded to the internal reset lines, but only cause
processor is inactive.
an additional frequency divider to reduce the clock
3.2 Randomized Multithreading signal. This then activates the low-frequency de-
tector, which then activates the internal reset lines,
To introduce even more non-determinism into which finally deactivate the divider. The processor
the execution of algorithms, it is conceivable to de- has now passed the sensor test and can start normal
sign a multithreaded processor architecture [19] that operation. The processor is designed such that it
schedules the processor by hardware between two will not run after a power up without a proper in-
or more threads of execution randomly at a per- ternal reset. A large number of FIB edits would be
instruction level. Such a processor would have mul- necessary to make the processor operational without
tiple copies of all registers (accumulator, program the frequency sensor being active.
counter, instruction register, etc.), and the combina- Other sensor defenses against invasive attacks
torial logic would be used in a randomly alternating should equally be embedded into the normal opera-
way to progress the execution state of the threads tion of the processor, or they will easily be circum-
represented by these respective register sets. vented by merely destroying their signal or power
The simple 8-bit microcontrollers of smartcards supply connections.
do not feature pipelines and caches and the entire
3.4 Destruction of Test Circuitry
state is defined only by a very small number of reg-
isters that can relatively easily be duplicated. The Microcontroller production has a yield of typically
only other necessary addition would be new machine around 95%, so each chip has to be thoroughly tested

Sommer 1999 Die Datenschleuder #67


for a number of cycles would either require many
transistors or are too easily disabled.
Instead, we recommend simply not providing a
program counter that can run over the entire ad-
dress space. A 16-bit program counter can easily
be replaced with the combination of a say 7-bit off-
set counter O and a 16-bit segment register S, such
that the accessed address is S + O. Instead of over-
flowing, the offset counter resets the processor after
reaching its maximum value. Every jump, call, or re-
turn instruction writes the destination address into
S and resets O to zero. The processor will now be
completely unable to execute more than 127 bytes
of machine code without a jump, and no simple FIB
edit will change this. A simple machine-code post-
Figure 8: The interrupted white line at the bot- processor must be used by the programmer to insert
tom of the cavity in this FIB secondary-electron im- jumps to the next address wherever unconditional
age is a blown polysilicon fuse next to a test pad branches are more than 127 bytes apart.
(MC68HC05SC2x processor). With the program counter now being unavailable,
attackers will next try to increase the number of it-
erations in software loops that read data arrays from
after production. Test engineers —like microprobing memory to get access to all bytes. This can for in-
attackers—have to get full access to a complex cir- stance be achieved with a microprobe that performs
cuit with a small number of probing needles. They a glitch attack directly on a bus-line. Programmers
add special test circuitry to each chip, which is usu- who want to use 16-bit counters in loops should keep
ally a parallel/serial converter for direct access to this in mind.
many bus and control lines. This test logic is acces-
sible via small probing pads or multiplexed via the 3.6 Top-layer Sensor Meshes
normal I/O pads. On normal microcontrollers, the
test circuitry remains fully intact after the test. In Additional metallization layers that form a sen-
smartcard processors, it is common practice to blow sor mesh above the actual circuit and that do
polysilicon fuses that disable access to these test cir- not carry any critical signals remain one of the
cuits (Fig. 8). However, attackers have been able more effective annoyances to microprobing attack-
to reconnect these with microprobes or FIB editing, ers. They are found in a few smartcard CPUs such as
and then simply used the test logic to dump the en- the ST16SF48A or in some battery-buffered SRAM
tire memory content. security processors such as the DS5002FPM and
Therefore, it is essential that any test circuitry is DS1954.
not only slightly disabled but structurally destroyed A sensor mesh in which all paths are continu-
by the manufacturer. One approach is to place the ously monitored for interruptions and short-circuits
test interface for chip n onto the area of chip n + 1 while power is available prevents laser cutter or se-
on the wafer, such that cutting the wafer into dies lective etching access to the bus lines. Mesh alarms
severs all its parallel connections. A wafer saw usu- should immediately trigger a countermeasure such
ally removes a 80–200 µm wide area that often only as zeroizing the non-volatile memory. In addition,
contains a few process control transistors. Locat- such meshes make the preparation of lower layers
ing essential parts of the test logic in these cut areas more difficult, because since the etch progresses un-
would eliminate any possibility that even substantial evenly through them, their pattern remains visible
FIB edits could reactivate it. in the layers below and therefore they complicate
automatic layout reconstruction. Finally, a mesh on
3.5 Restricted Program Counter top of a polished oxide layer hides lower layers, which
makes navigation on the chip surface for probing and
Abusing the program counter as an address pat- FIB editing more tedious.
tern generator significantly simplifies reading out the The implementations of sensor meshes in fielded
entire memory via microprobing or e-beam testing. products however show a number of quite surpris-
Separate watchdog counters that reset the proces- ing design flaws that significantly reduce the protec-
sor if no jump, call, or return instruction is executed tion (Fig. 9 and 10). The most significant flaw is

Die Datenschleuder #67 Sommer 1999


Figure 9: Escape route for imprisoned crypto bits: Figure 11: A FIB was used here to drill a fine hole to
The ST16SF48A designers generously added this re- a bus line through the gap between two sensor mesh
dundant extension of the data bus several micro- lines, refill it with metal, and place a metal cross on
meters beyond the protected mesh area, providing top for easy microprobing access.
easy probing access.
probing via a platinum or tungsten pad on top of
the passivation layer (Fig. 11). Alternatively, it is
also possible to etch a larger window into the mesh
and then reconnect the loose ends with FIB metal
deposits around it.

4 Conclusion
We have presented a basis for understanding
the mechanisms that make microcontrollers partic-
ularly easy to penetrate. With the restricted pro-
gram counter, the randomized clock signal, and
Figure 10: Every second line is connected to VCC the tamper-resistant low-frequency sensor, we have
or GND at one end and open at the other. Not all shown some selected examples of low-cost coun-
are used to supply lower layers and therefore some termeasures that we consider to be quite effective
can safely be opened with a laser for probing access against a range of attacks.
to the bus lines below. There are of course numerous other more obvi-
ous countermeasures against some of the commonly
used attack techniques which we cannot cover in de-
that a mesh breach will only set a flag in a status tail in this overview. Examples are current regula-
register and that zeroization of the memory is left tors and noisy loads against current analysis attacks
completely to the application software. We noted and loosely coupled PLLs and edge barriers against
in Section 2.1.4 that a common read-out technique clock glitch attacks. A combination of these together
involves severely disabling the instruction decoder, with e-field sensors and randomized clocks or per-
therefore software checks for invasive attacks are of haps even multithreading hardware in new processor
little use. designs will hopefully make high-speed non-invasive
A well-designed mesh can make attacks by man- attacks considerably less likely to succeed. Other
ual microprobing alone rather difficult, and more so- countermeasures in fielded processors such as light
phisticated FIB editing procedures will be required and depassivation sensors have turned out to be of
to bypass it. Several techniques can be applied here. little use as they can be easily bypassed.
The resolution of FIB drilling is much smaller than We currently see no really effective short-term
the mesh line spacings, therefore it is no problem to protection against carefully planned invasive tam-
establish contact through three or more metal layers pering involving focused ion-beam tools. Zeroiza-
and make deeply buried signals accessible for micro- tion mechanisms for erasing secrets when tampering

Sommer 1999 Die Datenschleuder #67


is detected require a continuous power supply that in Perspective. In R. Hirschfeld (ed.): Finan-
the credit-card form factor does not allow. The at- cial Cryptography, FC ’97, Proceedings, LNCS
tacker can thus safely disable the zeroization mecha- 1318, pp. 109–121, Springer-Verlag, 1997.
nism before powering up the processor. Zeroization
remains a highly effective tampering protection for [11] R.J. Anderson, M.G. Kuhn: Low Cost At-
larger security modules that can afford to store se- tacks on Tamper Resistant Devices. In M. Lo-
crets in battery-backed SRAM (e.g., DS1954 or IBM mas, et al. (eds.), Security Protocols, 5th Inter-
4758), but this is not yet feasible for the smartcard national Workshop, LNCS 1361, pp. 125–136,
package. Springer-Verlag, 1997
[12] R.J. Anderson, M.G. Kuhn: Tamper Resis-
5 Acknowledgements tance — a Cautionary Note. In The Second
USENIX Workshop on Electronic Commerce
The authors would like to thank Ross Anderson, Proceedings, pp. 1–11, Oakland, California, 18–
Simon Moore, Steven Weingart, Matthias Brunner, 21 November 1996.
Gareth Evans and others for useful and highly inter-
esting discussions. [13] J.H. Daniel, D.F. Moore, J.F. Walker: Fo-
cused Ion Beams for Microfabrication. Engi-
References neering Science and Education Journal, pp. 53–
56, April 1998.
[1] FIPS PUB 140-1: Security Requirements for
Cryptographic Modules. National Institute of [14] H. P. Feuerbaum: Electron Beam Testing:
Standards and Technology, U.S. Department of Methods and Applications. Scanning, 5(1):14–
Commerce, 11 January 1994. 24, 1982.

[2] F. Beck: Integrated Circuit Failure Analysis – [15] H.J.M. Veendrick: Short-Circuit Dissipation
A Guide to Preparation Techniques. John Wiley of Static CMOS Circuitry and Its Impact on
& Sons, 1998. the Design of Buffer Circuits. IEEE Journal
of Solid-State Circuits, 19(4):468–473, August
[3] T.W. Lee, S.V. Pabbisetty (eds.): Microelec- 1984.
tronic Failure Analysis, Desk Reference. 3rd
edition, ASM International, Ohio, 1993, ISBN [16] D. Boneh, R.A. DeMillo, R.J. Lipton: On the
0-87170-479-X. Importance of Checking Cryptographic Pro-
tocols for Faults. In Advances in Cryptology
[4] N.H.E. Weste, K. Eshraghian: Principles of – EUROCRYPT ’97, LNCS 1233, pp. 37–51,
CMOS VLSI Design. Addison-Wesley, 1993. Springer-Verlag, 1997.

[5] S.-M. Kang, Y. Leblebici: CMOS Digital Inte- [17] F. Bao, et al.: Breaking Public Key Cryp-
grated Circuits: Analysis and Design. McGraw- tosystems on Tamper Resistant Devices in the
Hill, 1996. Presence of Transient Faults. In M. Lomas,
et al. (eds.), Security Protocols, 5th Interna-
[6] J. Carter: Microprocessor Architecture and Mi- tional Workshop, LNCS 1361, pp. 115–124,
croprogramming – A State-Machine Approach. Springer-Verlag, 1997.
Prentice-Hall, 1996.
[18] M. Joye, J.-J. Quisquater, F. Bao, R. H.
[7] S.M. Sze: Semiconductor Devices – Physics and Deng: RSA-type Signatures in the Presence
Technology. John Wiley & Sons, 1985. of Transient Faults. In Cryptography and Cod-
ing, LNCS 1355, pp. 155–160, Springer-Verlag,
[8] T.R. Corle, G.S. Kino: Confocal Scanning Op- 1997.
tical Microscopy and Related Imaging Systems.
Academic Press, 1996. [19] S.W. Moore: Multithreaded Processor Design.
Kluwer Academic Publishers, 1996.
[9] S. Blythe, et al.: Layout Reconstruction of
Complex Silicon Chips. IEEE Journal of Solid-
State Circuits, 28(2):138–145, February 1993.

[10] D.P. Maher: Fault Induction Attacks, Tamper


Resistance, and Hostile Reverse Engineering

Die Datenschleuder #67 Sommer 1999


Zusammenfassung Interception

Dies ist eine redaktionell erstellte 3. Datenaufbereitung: Die entweder automatisch


Zusammenfassung des aktuellen STOA-Berichts oder von Menschen gesteuerte Umwandlung der
an das EuropŠische Parlament zu den aktuellen gesammelten Daten in ein Standardformat, das
Methoden und Techniken der sowohl ihren technischen Inhalt, wie weitere
geheimdienstlichen Informationen (z. B. Telephonnummern der
TelekommunikationsŸberwachung. Der beteiligten Partner) enthŠlt.
vollstŠndige Bericht ist in englischer Sprache im
Internet abrufbar, URL am Ende des Artikels. 4. Produktion und Verbreitung: Comint beinhaltet
die Datenanalyse, -bewertung, -Ÿbersetzung und -
I. Nachrichtendienstliche TŠtigkeiten interpretation der gesammelten Daten in
(Communications intelligence=Comint) beinhalten verwertbare Informationen. Diese werden an den
u.a. das verdeckte Abhšren der Kommunikation Auftraggeber weitergegeben. Die Daten kšnnen
fremder Staaten und werden von nahezu allen dabei in unbearbeiteter (aber entschlŸsselter
Nationen angewandt seit es internationale und/oder Ÿbersetzter) Form, als Kernthesen,
Nachrichtenverbindungen gibt. Comint wird in Kommentare oder ausfŸhrliche Berichte weiterge-
gro§em Ma§stab auf industrieller Ebene geben werden. QualitŠt und Bedeutung dieser
angewandt und versorgt Berichte fŸhren zu einer
seine Auftraggeber mit SpeziÞkation der
Informationen Ÿber diplo- Abhšrma§nahmen und
matische, škonomische -themen und schlie§en
und wissenschaftliche damit den
Fortschritte. Die Informationskreislauf.
Mšglichkeiten und
Aufgaben von Comint las- Eine besondere
sen sich am besten mit Bedeutung kommt hier
Hilfe des intelligence cycle der geheimen
darstellen: Sammlung von
Handelsdaten zu: denn
1. Planung: Die - so wird argumentiert -
Auftraggeber - u.a. w٤ten die Betroffenen
Ministerien der von Mšglichkeiten und
Þnanzierenden Umfang der
Regierungen - deÞnieren ihre Anforderungen aus Abhšrma§nahmen, fŸhrte es dazu, da§ sie ihre
den Bereichen Verteidigung, auswŠrtige Methoden der Informationsverbreitung Šndern
Angelegenheiten, Handel und innere Sicherheit. und weitere Lauschangriffe so erschweren
wŸrden.
2. Datensammlung: Moderne Systeme leiten die
gesammelten Daten automatisch Ÿber globale II. Weltweit werden ca. 15-20 Billiarden Euro
Netzwerke an die Analytiker weiter; die jŠhrlich fŸr Abhšrma§nahmen ausgegeben. Der
Datenauswahl passiert in den meisten FŠllen auch grš§te Teil entfŠllt dabei auf die
automatisch und bedient sich gro§er Online- englischsprachigen Nationen der UKUSA-Allianz.
Datenbanken, die alle interessanten Ziele Abgehšrt werden Telephonverbindungen,
beinhalten. Unterseekabel, das Internet, Richtfunkverkehr
und Satellitenverbindungen.

Sommer 1999 Die Datenschleuder #67


Capabilities 2000

III. Das global vernetzte und weitgehend Kopien aller User-Keys bekommen. Eigentliches
automatisch arbeitende Abhšrsystem ECHELON, Ziel dieser Aktionen war es wohl, die NSA mit
von der NSA (National Security Agency) entwickelt diesen SchlŸsseln zu versorgen und so private
und betreut, sammelt seit den 1970er Jahren und kommerzielle Kommunikation weiterhin
Daten nicht nur militŠrischer, sondern auch - und erfolgreich abhšren zu kšnnen. Zwischen 1993
das zunehmend - ziviler Natur. Zwar ist kaum und 1998 versuchten die USA auf diplomatischem
etwas Ÿber Spionagesatelliten bekannt, die nach Wege die EU-Staaten und die OECD von ihrem
1990 gestartet wurden, doch wurde das System key escrow-System zu Ÿberzeugen; wŠhrend dieser
ausgeweitet. Die wichtigsten Bodenstationen BemŸhungen wurde fortwŠhrend behauptet, das
beÞnden sich in Buckley Field, Denver, Colorado; System diene nur der besseren staatlichen
Pine Gap, Australien; Menwith Hill, England und VerbrechensbekŠmpfung, um die KriminalitŠt
in Bad Aibling, Bayern. Der Unterhalt der und das organisierte Verbrechen unter Kontrolle
Satelliten und der Einrichtungen zur zu halten. Da die Verhandlungen praktisch
Weiterverarbeitung ihrer Daten belŠuft sich auf ausschlie§lich von Mitarbeitern der NSA - manch-
etwa 1 Milliarde US-Dollar pro StŸck. Keine ande- mal unter vollkommenem Ausschlu§ von
re Nation der Welt verfŸgt Ÿber eine so weit Angehšrigen der Polizei oder Justiz - gefŸhrt
entwickelte Satellitentechnologie, wie sie von den wurden, ist es wohl naheliegend anzunehmen,
Satelliten CANYON, RHYOLITE und ihren da§ das o.g. Argument nur zur Verschleierung
Nachfolgern reprŠsentiert wird. Die USA der wahren Ziele der Politik der USA diente. Seit
verfŸgen Ÿber mindestens 120 dieser Satelliten. 1993 treffen sich Angehšrige vieler EU- und der
Zur †berwachung des Datenverkehrs wurden UKUSA-Staaten - au§erhalb der Kontrolle des
sogenannten âWatch-ListsÔ angelegt, die europŠischen Parlamentes - jŠhrlich zu
Personennamen oder Namen von Organisationen Diskussionsforen, um ihre Abhšrma§nahmen zu
enthalten. Wurden diese bis 1970 von Hand koordinieren. Sie kommen unter der
ausgewertet, machte es die FŸlle der abgehšrten Schirmherrschaft einer bisher unbekannten
Daten bald notwendig, automatisch geÞltert zu Organisation (ILETS=International Law
werden. Seit der Mitte der 1980er Jahre setzt man Enforcement Telecommunications Seminar)
in den Bodenstationen Computer ein, die gro§e zusammen; die GrŸndung von ILETS wurde vom
Datenmengen aus verschiedenen Bereichen FBI angeregt. Die im Juni 1994 gefa§ten
(Namen, Themen von Interesse, Adressen, BeschlŸsse von ILETS orientierten sich im wesent-
Telefonummern etc.) automatisch selektieren und lichen an den Anforderungen eines vorher vom
weiterleiten. Diese Art der Datensuche und FBI erstellten Dokumentes. Die Kryptographie
-auswertung kann mit den Suchmaschinen des wurde lediglich im Zusammenhang mit der
Internet verglichen werden. Seit der EinfŸhrung Netzwerksicherheit erwŠhnt. Erst 1998 wurde die
des ECHELON-Systems aber werden praktisch Kryptographie in grš§erem Ma§stab
alle ausgeÞlterten Informationen direkt an die berŸcksichtigt. Vermutlich wurden auch in
NSA oder andere Kunden weitergegeben, ohne diesem Jahr die BeschlŸsse auf das Internet und
da§ die lokalen Stationen oder LŠnder wŸ§ten, Satellitenkommunikationssysteme wie Iridium
was abgehšrt, bzw. an wen es weitergeleitet erweitert; sie beinhalten auch zusŠtzliche
wurde. Sicherheitsanforderungen fŸr Netzwerkbetreiber
und Provider; verlangen persšnliche
IV. Seit Beginn der 1990er Jahre bemŸhte sich die Informationen Ÿber Fernsprechteilnehmer und
Regierung der USA, ein sog. key escrow-System Planungen, die sich mit der Kryptographie
einzufŸhren: Nicht-staatliche Behšrden sollten beschŠftigen.

Die Datenschleuder #67 Sommer 1999


TK-Überwachung im Jahre 2000

V. Comint-Organisationen mŸssen feststellen, da§ kaum abhšrbar. Der nštige Aufwand an


die technischen Schwierigkeiten bei der technischem GerŠt und Energie zur Aufzeichnung
Datensammlung zunehmen und da§ es in und Weiterverarbeitung macht geheime
Zukunft teurer und aufwendiger wird, Operationen unpraktisch und gefŠhrlich. Selbst
internationale Kommunikation abzuhšren. FŸr wenn ein Zugang mšglich ist, so werden die
die Zukunft ist es wichtig, diese Probleme AbhšraktivitŠten doch durch die rapide
auszuwerten und eine politische Basis zu Ausbreitung neuer Systeme gehemmt, z.T. aus
schaffen, die auf Schutzma§nahmen der KostengrŸnden, teilweise auch, weil neue
Wirtschaft und effektive Kryptographie zielt. Systeme (z.B. Iridium) Ÿber momentan
verfŸgbare Techniken nicht greifbar sind. Der
VI. Ausblick - Seit Mitte der 90er Jahre haben technische Vorsprung in der Computertechnik der
Lauscher zunehmend Schwierigkeiten, Comint-Organisatioen hat sich in den
weltweiten Zugriff auf die Kommunikationsdaten vergangenen 15 Jahren aufgebraucht. Sie nutzen
zu erlangen. Diese Probleme werden sich noch Standardsysteme, die denen der fŸhrenden
vergrš§ern, da vor allem die leistungsfŠhigen Industriebetriebe oder wissenschaftlichen
Glasfasernetzwerke ausschlie§lich Ÿber einen Einrichtungen technisch gleichwertig oder sogar
physischen Zugriff abzuhšren sind. Verlaufen die- unterlegen sind. Sie sind lediglich TEMPEST-
se Netzwerke nicht innerhalb eines abgeschirmt, strahlen also keine Funksignale aus,
kollaborierenden Staates oder passieren diesen, ist die abgehšrt werden kšnnten. Comint-
ein Abhšren praktisch nur Ÿber die Anbringung Organisationen mu§ten feststellen, da§ ihr Krieg
eines optischen Repeaters mšglich; sehr viele gegen zivile und kommerzielle Kryptographie
unterirdisch verlegte Glasfasernetze sind also verloren ist. Mehr und mehr wissenschaftliche

Sommer 1999 Die Datenschleuder #67


/DS67/Counterintelligence

und wirtschaftliche Organisationen verstehen sich Abschlie§end soll noch der Ex-CIA OfÞzier John
auf Kryptographie und Kryptologie. Das Internet Millis zu Wort kommen, der die aktuelle
und der globale Markt haben den freien Flu§ von Entwicklung aus der Sicht der NSA schildert :
Informationen, Systemen und Software ãSigint (=Signals Intelligence) beÞndet sich in einer
ermšglicht. Der NSA ist es nicht gelungen key Krise ... Die letzten 50 Jahre hindurch ... in der
escrow oder verwandte Systeme mit dem Vergangenheit, war die Technologie der Freund
scheinheiligen Argument der der NSA, aber in den letzten vier oder fŸnf Jahren
VerbrechensbekŠmpfung durchzusetzen. mutierte sie vom Freund zum Feind von Sigint.
In Zukunft wird man wohl in zunehmendem Die Telekommunikationsmedien sind nicht mehr
Ma§e auf menschliche Agenten setzen, um Codes lŠnger Sigint-freundlich. Sie waren es. Benutzte
zu sammeln; auch mit verstŠrkten BemŸhungen man HF-Signale, konnte jeder in Reichweite
um fremde Computersysteme ist zu rechnen, z.B. dieser HF-Signale sie genau so gut empfangen
mit Hilfe des Internet (insbesondere um an wie der geplante EmpfŠnger. Wir begannen
geschŸtzte Files heranzukommen oder an Mikrowellen zu benutzen und man fand einen
Informationen, bevor sie verschlŸsselt wurden). Weg, auch diese zu verwenden. Gut, wir bewegen
Dennoch fŸhrten die Versuche, die Kryptographie uns aber auf Medien zu, an die ziemlich schwer
einzuschrŠnken dazu, da§ sich die Verbreitung heranzukommen ist. Kryptographie existiert und
von effektiver kryptographischer Systeme scheint sich sehr schnell auszubreiten. Das sind
verzšgert hat. Der Preisverfall auf dem wirklich schlechte Nachrichten fŸr Sigint ... Es
Computermarkt hat den Comint-Treibenden wird eine Menge Geld fŸr neue Technologien
zudem die Mšglichkeit gegeben, schnelle und nštig sein, um einen Zugang zu bekommen und
hochentwickelte Datenverarbeitungs und in der Lage zu sein, die Informationen zu
-sortierungstools zu entwickeln. bekommen, die wir unbedingt Ÿber Sigint bekom-
Entgegen anders lautender Presseberichte gibt es men wollen.Ò henriette
Ÿbrigens - trotz 30 Jahre wŠhrender Forschung -
noch keine leistungsfŠhigen word-spotting- Der vollstŠndige englische Text ist Þndbar unter:
Systeme, die automatisch TelefongesprŠche auf
nachrichtendienstlich interessante Informationen http://www.greennet.org.uk/duncan/stoa.htm oder
hin durchsuchen kšnnen. Allerdings wurden http://www.iptvreports.mcmail.com/stoa_cover.htm
Sprechererkennungssysteme entwickelt und
werden verwendet, die in der Lage sind, die
Zielpersonen in FerngesprŠchen zu erkennen.

Die Datenschleuder #67 Sommer 1999


Minister enttarnte den A good leader is a person who takes a little
more than his share of the blame and a

eigenen Geheimdienst little less than his share of the credit.

- John C. Maxwell

Geklaut aus der Frankfurter Rundschau vom 31. Mai liess ihnen Veiga Simo alles zukommen, was von
1999 (http://www.fr- Belang sein konnte. Nicht nur Namen, Herkunft,
aktuell.de/archiv/fr30t/19990531086.htm Ausbildung und GehŠlter sŠmtlicher Spione
wurden offengelegt, sondern auch ihre Aufgaben
Der Minister enttarnte den eigenen Geheimdienst in aller Welt. Sei es die Rolle von Agenten beim
Aufstand gegen den PrŠsidenten von Guinea
Bissau oder im Widerstand der Timorenser gegen
Bericht an portugiesischen Ausschuss Indonesien, sei es der Informationsaustausch des
listet Aufgaben und sogar Gehaelter Geheimdienstes mit den Kollegen aus
Deutschland und anderen befreundeten Staaten:
der Spione auf Die Abgeordneten wie auch die Redakteure von
O Independente erfuhren einfach alles. Nur den
Von Axel Veiel (Madrid) Lesern des Blattes wurde Wichtiges vorenthalten.
Die Namen der Agenten wurden geschwŠrzt.
Portugal hat keinen Geheimdienst mehr, der
diesen Namen verdient. Die 69 Agenten des Die Suche nach VersŠumnissen und
Landes sind enttarnt. Ihr oberster Dienstherr, Verantwortlichen ist mit dem fŸnf Monate vor
Verteidigungsminister Jos Veiga Simo, hatte alles
den Parlamentswahlen erklŠrten RŸcktritt Veiga
Wissenswerte Ÿber sie in einem 120 Seiten starken
Simos freilich keineswegs abgeschlossen.
Bericht zusammenfassen lassen, um eine
WŠhrend die Opposition ihr Augenmerk vor
parlamentarische Untersuchungskommission von
allem auf NachlŠssigkeiten im
der GŸte des Dienstes zu Ÿberzeugen. Doch der
Verteidigungsministerium richtet, konzentriert
wurde samt Namen und Aufgaben der Spione
sich die Regierung auf den Vertrauensbruch in
der Wochenzeitung O Independente zugespielt,
dem von einem Sozialdemokraten geleiteten
die AuszŸge veršffentlichte. Minister Veiga Simo
Untersuchungsausschuss. "Total
trat sofort zurŸck. Sein Amt Ÿbernahm am
SonntagVize-Regierungschef und Au§enminister unverantwortlich" nannte es der Sozialdemokrat
Jaime Gama. Einhellig beklagten sozialdemokrati- Luis Marques Guedes, da§ ein so heikler Bericht
sche Opposition und regierende Sozialisten am mit dem Vermerk "vertraulich" ans
Wochenende den nicht wiedergutzumachenden Abgeordnetenhaus gehen konnte, anstatt mit dem
Schaden. MinisterprŠsident Antnio Guterres Aufdruck "geheim" hinter Verschlu§ zu bleiben.
sprach von einer "schwerwiegenden Der Minister fŸr parlamentarische
BeeintrŠchtigung staatlicher Interessen". Angelegenheiten, Antnio Costa, beklagte derweil,
da die AffŠre das Vertrauen der Regierung in die
Dabei hatte Veiga Simo es doch "in gutem Volksvertreter ausgehšhlt habe.
Glauben gehandelt", wie er versicherte.
SchŸtzend war er vor seinen ins Zwielicht Tršstliche Worte fand am Wochenende nur die
geratenen Dienst getreten, dem man nachsagte, er Presse. Der Schaden kšnne zumindest im
habe undichte Stellen und beschatte hohe Ausland so gro§ nicht sein. Die Geheimdienste
MilitŠrs. der EU- und Nato-Staaten hŠtten die
Zusammenarbeit mit den skandalgebeutelten por-
Wohl um den Untersuchungsausschu§ davon zu tugiesischen Kollegen auf das Nštigste
Ÿberzeugen, dass er nichts zu verbergen habe, beschrŠnkt.

Sommer 1999 Die Datenschleuder #67


http://jya.com/nsa-patents.htm

N ational Security Agency-owned patents


accessed at the US Patent OfÞce online 28
May 1999. Obtained by search for "National
http://jya.com/nsa5812609.htm United States
Patent 5,812,609 McLochlin September 22, 1998
Communication intercept device using digital drop
Security Agency," though oddly none of the receivers in multiple tiers
patents disclose the full name. This does not
include all the NSA-sponsored patents, such Abstract
those not owned/attributable to the agency or
those classiÞed and prohibited to public access. A communications intercept device that includes
Full PTO text of patents mirrored here. See IBM's an analog-to-digital converter for digitizing an
patent server for text and related images. analog wideband input signal, a Þrst memory for
storing the digitized wideband signal, a Þrst
http://jya.com/nsa5832478.htm United States digital drop receiver in a Þrst tier for selecting sig-
Patent 5,832,478 George November 3, 1998 nals stored in the Þrst memory, a controller for
Method of searching an on-line dictionary using controlling which signals are selected, a second
syllables and syllable count memory for storing the signals selected by the
Þrst digital drop receiver, and a second digital
Abstract drop receiver in a second tier for selecting signals
stored in the second memory under control of the
The present invention is a method of searching an controller.
on-line dictionary in any language representation
using syllables and syllable count and an on-line ***
dictionary, where the on-line dictionary includes a
primary headword Þeld, a segmented primary http://jya.com/nsa5631961.htm United States
headword Þeld, additional unsegmented Patent 5,631,961 Mills , et al. May 20, 1997
language representation (headword) Þelds as Device for and method of cryptography that allows
required, additional segmented representation third party access
(headword) Þelds as required, a syllable count
Þeld, additional syllable count Þelds as required, Abstract
and a deÞnition Þeld. The user selects a language
representation for a query and makes the query in A device for and method of transmitting an
the selected language representation. The present encrypted message and an access Þeld from a sen-
invention then parses the query to determine if der to a receiver, where a third party may
segmented syllables were used in the query and intercept and process the transmission. The
how many, if any. If no segmented syllables were sender and receiver agree on a session key. The
used in the query, a character string search for the sender raises an element of a Galois Field to the
headword that matches the query is conducted. If session key; forms a temporary device unique
the query contains segmented syllables, a syllable key; encrypts the session key with the temporary
search for headwords that contain the same device unique key; forms a temporary family key;
syllables in the same locations is conducted. The encrypts an identiÞer of the sender and the
present invention returns one or more headwords encrypted session key using the temporary family
in the language of the query and their key; encrypts a plaintext message using the
corresponding deÞnitions in the language of the session key; forms the access Þeld by
user. Various wildcard symbols may be used for concatenating the element of a Galois Field raised
unknown syllables and for characters within a to the session key to the encrypted version of the
syllable, which may include tones.

Die Datenschleuder #67 Sommer 1999


/DS67/Counterintelligence

sender's identiÞer and the sender's encrypted http://jya.com/nsa4731840.htm United States


session key; concatenates the ciphertext to the Patent 4,731,840 Mniszewski , et al. March 15,
access Þeld; and transmits the access Þeld and the 1988 Method for encryption and transmission of
ciphertext to the receiver. The receiver may digital keying data
recover the plaintext from the sender's transmissi-
on. The third party may partially process the Abstract
transmission to Þnd the identity of the sender.
The third party may then request an escrowed A method for the encryption, transmission, and
key that would allow the third party to recover subsequent decryption of digital keying data. The
the plaintext of the sender's message. method utilizes the Data Encryption Standard
and is implemented by means of a pair of appara-
*** tus, each of which is selectable to operate as either
a master unit or remote unit. Each unit contains a
http://jya.com/nsa4897878.htm United States set of key encryption keys which are indexed by a
Patent 4,897,878 Boll , et al. January 30, 1990 common indexing system. The master unit
Noise compensation in speech recognition apparatus operates upon command from the remote unit to
generate a data encryption key and encrypt the
Abstract data encryption key using a preselected key
encryption key. The encrypted data encryption
A method and apparatus for noise suppression key and an index designator are then
for speech recognition systems which employs the downloaded to the remote unit, where the data
principle of a least means square estimation encryption key is decrypted for subsequent use in
which is implemented with conditional expected the encryption and transmission data.
values. Essentially, according to this method, one Downloading of the encrypted data encryption
computes a series of optimal estimators which key enables frequent change of keys without
estimators and their variances are then employed requiring manual entry or storage of keys at the
to implement a noise immune metric. This noise remote unit.
immune metric enables the system to substitute a
noisy distance with an expected value which ***
value is calculated according to combined speech
and noise data which occurs in the bandpass Þlter http://jya.com/nsa4567572.htm United States
domain. Thus the system can be used with any Patent 4,567,572 Morris , et al. January 28, 1986
set of speech parameters and is relatively Fast parallel sorting processor
independent of a speciÞc speech recognition
apparatus structure. Abstract

*** An information processor is described which is


especially suitable for efÞciently sorting large
quantities of binary data. Data in a plurality of
storage devices is fed to a plurality of compare-
exchange modules and is then selectively passed
back to the storage devices by means of multi-
input switches. A programmable microprocessor
controls passage of data through the various com-
ponents in an iterative process.

Sommer 1999 Die Datenschleuder #67


http://jya.com/nsa-patents.htm

http://jya.com/nsa4429180.htm United States serial nature of bubble technology. The simple


Patent 4,429,180 Unkenholz January 31, 1984 gate interconnection geometry has a minimum of
Apparatus for simultaneous generation of key at two feedback paths and results in devices which are
locations not burdened with excessive numbers of bubble
generators, annihilators or crossovers.
Abstract
***
An apparatus for simultaneously generating iden-
tical cipher key at two remote terminals in a
manner which prohibits interception of the key by
Y2K Problem Papst: Dem Ende der
unauthorized persons. A circuit comprising three Welt gelassen entgegensehen
separate wire lines is connected between the two
terminals over geographically separated routes.
The circuit is randomly completed and broken by
a switch at each terminal, the switch position
being determined at each terminal by an indepen-
dent key generator. Cipher key is communicated
by comparing the key generator output and the
circuit condition.

***

http://jya.com/nsa5812609.htm United States


Patent 4,161,032 Williams July 10, 1979
Serial arithmetic functions with magnetic bubble logic
elements
Rom Papst Johannes Paul II. hat den Menschen
Abstract empfohlen, das Ende der Welt mit Gelassenheit
und Hoffnung zu erwarten.
Compact arrangements of two-input magnetic
bubble logic gates providing bubble devices for ãHeutzutage passiert wegen der Fortschritte in
performing serial integer arithmetic on binary Wissenschaft und Technologie und den
integers are disclosed. Using only a small number erweiterten Kommunikationsmšglichkeiten alles
of different types of logic gates, designs are given mit unglaublicher SchnelligkeitÒ, sagte das
for devices for performing serial addition, Oberhaupt der katholischen Kirche am Mittwoch
subtraction, multiplication and division vor hunderten GlŠubigen in seiner wšchentlichen
arithmetic operations on binary integers, Audienz auf dem Petersplatz in Rom. ãEs ist
represented as sequences of magnetic bubbles. All daher ganz natŸrlich, Ÿber das Schicksal und das
logical interactions use bubble repulsion to Ziel der Menschheit nachzudenkenÒ, erklŠrte der
prevent bubbles from transferring to adjacent pro- Papst weiter.
pagation paths via preferred transitions. By using
only two-input gates and a pipeline Der 79jŠhrige forderte die GlŠubigen auf, dem
computational structure, hardware design is ãÞnalen EreignisÒ mit ãruhiger HoffnungÒ
simpliÞed and advantage is taken of the inherent entgegenzusehen.

Die Datenschleuder #67 Sommer 1999


Information Operations

Information Operations Violates Protocol I Operations (IO) which Joint Publication 3-13
describes as most effective in periods prior to

E scalating trends starting in the Coalition Gulf


War and bearing fruit in the NATO
Yugoslavia War bring to center stage the combina-
open hostility and as targeting civilian computer,
telecommunications, Þnancial, and electric
distribution system with high-tech methods such
tion of infrastructural warfare tactics and modern as Electronic Magnetic Pulse (EMP) guns,
weapons. When it is viewed in light of recently computer intrusions, viruses, and other IO means.
published US military doctrine on Information
Operations (IO), it is clear that the lethal combina- "The Joint Warfare Analysis Center down at Navy
tion of technology and infrastructural targeting is Dahlgren (Va.) is a national resource,Ó explained
accepted practice for the United States military Major General Bruce A. "OrvilleÓ Wright, Deputy
not only during times of open hostility but, more Director for Information Operations, Joint Chiefs
critically, in times of peace as a political of Staff, at a Defense Colloquium on Information
compellence strategy. Operations. "They can tell you not just how a
power plant or a rail system is built, but exactly
Lt. General Michael C. Short, commander of the what is involved in keeping that system up and
air war in Kosovo, shed light on the attitude making that system efÞcient.Ó
within the US military in the The New York
Times, 18 June, 1999: "One of the terms IÕve learned from these guys is
SCADAÑSupervisory Control and Data
"Had airmen been in charge it would have been Acquisition,Ó he continued warming to the
done differently, but thatÕs water under the subject. "If you have that acronym in the IO
bridge,Ó he said. "I felt that on the Þrst night, the business, you are well ahead of the Þght. SCADA
power should have gone off, and major bridges basically is the computer control for a power
around Belgrade should have gone into the system or railroad or sewer system or water
Danube, and the water should be cut off so that system. We rely more and more on those kinds of
the next morning the leading citizens of Belgrade systems as potential targets, and sometimes very
would have got up and asked, "Why are we lucrative targets, as we go after adversaries.Ó
doing this?Ó and asked Milosevic the same questi-
on.Ó These statements must be viewed within a histori-
cal perspective to understand their out-of-step
NATO stopped short of this direct terror views with international law. Civilian protection
campaign but it did bomb electric systems and during times of hostilities has been a focus of
other vital civilian infrastructure including a both customary law and international treaty
television station which caused the death of starting in 1863 with the Lieber Rules and then
journalists which violated Protocol IÕs protection continuing with the 1868 St. Petersburg
of journalists. General ShortÕs statement sends a Declaration, 1922 Hague Rules of Air War, 1938
clear signal that, at the highest levels of the Resolution of the League of Nations Protection of
United States military command, such behavior Civilian Population Against Bombing From the
is believed to be acceptable and his is not an isola- Air in Case of War, the 1956 XIXth International
ted view. Conference of the Red Cross Draft Rules for the
Limitation of the Dangers Incurred by the
Earlier in the year, another American General Civilian Population in Time of War, and the
discussed the American strategy for Information Geneva Conventions of 1949.

Sommer 1999 Die Datenschleuder #67


Violates Protocol I

At the start of a new millennium, three ideas other rule of international law applicable to the High
shine through from 140 years of modern treaty Contracting Party.Ó
work. First, the means and methods to wage war
are not unlimited. Second, technology has increa- The application of Article 36 is extremely
sed manÕs ability to cause massive civilian important to this discussion because Protocol I
damage; therefore, treaties protecting the civilian does not currently mention IO as a method of
population have become the focus of the Laws of attack and second, the deÞnition of attack may
War. Third, jus cogen (rules that may not be need altering. Article 49 (3) reads:
negotiated by a state) has been extended to the
Laws of War, and jus ad bellum (the right to
"The provisions of this Section apply to any land, air
resort to war) and jus in bello (the method of war)
or sea warfare which may affect the civilian
have taken a secondary role to international and
population, individual civilians or civilian objects on
customary law.
land.Ó
The next logical step is a comprehensive review
of Information Operations weapons and tactics Although the IO tactics against physical
and which places them in a context of Protocol I infrastructure may look similar to land or air war-
which is additional to the 4th Geneva Convention fare, it is not speciÞcally stated so in the treaty.
of 1949. This task should be shared by the United This also ties in with the treatyÕs deÞnition of
Nations and the International Committee of the attack:
Red Cross.
"Attack means acts of violence against the adversary
The United Nations jurisdiction is established by whether in offense or in defense.Ó
its history of human rights protection and
speciÞcally by United Nations Resolution 3384Ñ The cogent issue boils down to one of semantics.
10 November 1975Ñwhich proclaims: Is a computer intrusion an attack? Is sending a
logic bomb to disable a nuclear power plant an
"All states shall refrain from any acts involving the attack? The United States has used the popular
use of scientiÞc and technological achievement for the media to denounce computer system intrusions as
purposes of violating the sovereignty and territorial attacks; therefore, can it be assumed that the attack
integrity of other states, interfering in their internal concept extended to IO is now universal? An
affairs, waging aggressive wars, suppressing national
examination of Protocol I for IO capabilities can
liberationÉÓ
clarify this point.
In terms of treaty support to examine the new
The key starting point is creating a modern
weapons of Information Operations, Protocol I
deÞnition of civilian versus military
provides the most direct reference in Article 36Ñ
New Weapons: infrastructure. This has become an important
issue in a world were much of the military
"In the study, development, acquisition or adoption of telecommunications trafÞc passes over civilian
a new weapon, means or method of warfare, a High networks, and it is difÞcult to separate electric
Contracting Party is under obligation to determine power production from civilian and military
whether its employment would in some or all targets. For this reason, it is best to look at this
circumstances be prohibited by this Protocol or by any issue as three separate categories.

Die Datenschleuder #67 Sommer 1999


First, there is infrastructure that is, without dispu- This third area should include all satellite, paging,
te, dedicated to military usage. This includes and wireless systems as well as radio, television,
roads, electric production at isolated army bases, and internet broadcast systems. In addition, the
and other well deÞned military objects. These Protocol should protect all neutral
items have never been in question. It is the communications nodes such as internet routers on
second area that may be a gray area. This is the third-party soil, submarine cables, microwave
area of civilian roads, telecommunications, links, and satellite transponders and ground
computer networks, electricity distribution, and stations. In a mirror of the earlier rule in
planning military operations, it should be
water systems that may also feed military
assumed that targeting all such systems would
installations.
lead to uncontrollable, systemic failures in the
third-party systems; therefore, they should be
Article 50ÑDeÞnition of Civilians and Civilian
exempt from targeting.
Population offers a method to solve this problem.
It states: Article 54ÑProtection of Objects Indispensable to
the Survival of the Civilian PopulationÑmay also
(1) In case of doubt whether a person is a civilian that be applicable to this area. There has been
person shall be considered to be a civilian. It continues signiÞcant discussion in the United States about
in (3) The presence within the civilian population of IO encompassing attacks on Þnancial markets,
individuals who do not come within the deÞnition of automatic teller machines, toll road metering
civilians does not deprive the population of its civilian systems, mass transit systems to create a panic in
character. the civilian population in the hopes of realizing
the dreams of political compellence urged by
A revision could build on both items (1) and (3). General Short.
All infrastructure should be considered civilian if
it has mixed usage and this is supported by item This type of strategic planning should be banned
(3) which, although written to apply to people, under Article 54 which states:
may give a hint as to future direction. An
appropriate paraphrase may be the following: (2) It is prohibited to attack, destroy, remove or render
useless objects indispensable to the survival of the
The presence of military trafÞc or usage of civilian civilian population, such as foodstuffs, agricultural
areas for the production of foodstuffs, crops, livestock,
infrastructure should not deprive that speciÞc
drinking water installations and supplies and
piece of infrastructure from civilian protection
irrigation works, for the speciÞc purpose of denying
and should be assumed to be civilian.
them for the sustenance value to the civilian
population or to the adverse party, whatever the motive
Finally, it is the third area of civilian infrastructure whether in order to starve out civilians, to cause them
of Þnancial systems, medical systems, food to move away, or for any other motive.
distribution, and media production and
distribution systems that should be completely off A convention dealing with IO weapons and usage
limits to IO tactics. This prohibition should should address the speciÞc issue of indispensable
include physical attacks, system intrusions to infrastructure to the civilian population in a
include virus and worm production, and psycho- highly technological dependent society. It should
logical warfare. clearly draw a connection between

Sommer 1999 Die Datenschleuder #67


/ds67/Infowar

telecommunications and electric systems to advisor, US Department of State explained the


modern healthcare systems and determine and position of the United States government on 22
deÞne issues of incidental damage versus January 1987.
targeted damage to the civilian environment.
"The study,Ó Sofaer explained referring to a Joint
Continuing with this train of targeting thought, a Chiefs of Staff assessment of Protocol I,
number of military strategists have described IO "concluded that Protocol I is militarily
attacks on medical record systems that need to be unacceptable for many reasons. Among these are
discussed and classiÞed in an updated Protocol I the Protocol unreasonably restricts attacks against
examination. Article 14ÑLimitations on certain objects that traditionally have been
requisition of civilian medical units may be considered legitimate targets.Ó
applicable because it provides guarantees that the
needs of the civilian population should be The dangerous forces that the United States
satisÞed. wanted to preserve the right to attack and destroy
included dams, dykes, and nuclear electrical
Other strategists have suggested attacks on generating stations. Fortunately, 135 other
military medical records by changing blood-types nations disagreed with the US position. Any
and other vital medical information to cause addi- discussion of IO and Protocol I should include the
tional casualties and create confusion. This type information systems of these facilities that were
of planning is a clear violation of the 4th Geneva so aptly described by General "OrvilleÓ Wright.
Convention and Protocol I. Article 12:
Attacks on dams could take the form of a system
1. Medical units shall be respected and protected intrusion of the water ßow and release system of
at all times and shall not be the object of attack. a dam so that in a rainy season it released water
at an improper rate; therefore, the dam would
Any discussion of IO methods should update the not have released enough water to hold the
protection afforded to wounded personnel. It accumulation of the rainy season and would
should be clearly deÞned as to the level of overßow causing the loss of human life and
protection afforded to medical records or economic destruction to an adversary.
databases containing quantities and types of
medical supplies. Other attacks could be as simple as seizing
control of the ßood gates at a dam which would
The Þnal two areas under review deal with two have the same affect as described above. The
very important items in relationship to Protocol I discussion of nuclear facilities should seem
and IO: obvious. There can be any number of scenarios;
an IO attack could destroy or damage a nuclear
Targeting of Dangerous Forces power plant or affect the temperature of water
released into a fresh water stream. Once again,
Precautionary Measures any discussion of IO and Protocol I should be
expanded to this area.
Article 56ÑProtection of works and installations
containing dangerous forcesÑwas a major stumb- Finally, meeting the provisions of Article 57
ling block for the United States in ratifying should play a vital role in any IO treaty under the
Protocol I. Judge Abraham D. Sofaer, legal colour of Protocol I. Section 57 (ii) states:

Die Datenschleuder #67 Sommer 1999


...protocol I violation

Those who plan or decide upon an attack shall: (ii) It is the requirement to cancel or suspend certain
Take all feasible precautions in the choice of means and types of IO attacks that will cause problems with
methods of attack with a view to avoiding, and in any Protocol I compliance. For example, internet or
event to minimizing, incidental loss of civilian life, network worms or viruses have demonstrated an
injury to civilians and damage to civilian objects. ability to spiral out of control in related and
unrelated systems. In an interconnected world,
An expectation of limitation and control should this may cause damage to vital civilian systems
be the Þnal barrier to IO weapons because it that were not directly targeted. Once it was
builds on Article 51 (4): determined that a vital (non-targeted) civilian
system was affected it is very difÞcult, if not
Indiscriminate attacks are prohibited. impossible, to withdraw or stop the worm or
Indiscriminate attacks are: (b) Those which virus. In essence this creates a form of weapons
employ a method or means of combat which use treaty that was not intended by this protocol.
cannot be directed at a speciÞc military objective.
(c) Those which employ a method or means of Conclusion
combat the effects of which cannot be limited as
required by this Protocol. It is the opinion of the Centre for Infrastructural
Warfare Studies (CIWARS) that the governments
of the world have already entered into an IO arms
IO attack planning should have knowledge of the
race, and it is only a matter of time before this
complete infrastructure not just isolated systems.
type of capability will proliferate to guerrilla or
Without this systemic view, damage could
terrorist groups. By extending this work to
cascade from one system to another and violate
Protocol II as well, which extends the provisions
the requirement of limited attacks at only
of Protocol I to non-international conßicts and
speciÞed military systems. This statement holds
could include guerrilla groups, which have a
true because of the interconnected nature of the
signiÞcant history of infrastructural warfare, the
modern infrastructure and Protocol I discussions
human rights work started in the last millennium
should either acknowledge that this provision will be maintained and advanced.
may not apply to IO weapons or clearly state the
level of responsibility for the attack planner in the William Church Centre for Infrastructural Warfare
event of incidental loss of civilian life, injury to Studies (CIWARS) Email: iwar@iwar.org
civilians and damage to civilian targets.

Article 57 2 (b) may prove the most difÞcult in a


compliance mode.

"An attack shall be canceled or suspended if it becomes


?!
apparent that the objective is not a military one or is
subject to special protection or that the attack may be Pat. 5224756 : Integrated child seat for vehicle
expected to cause incidental loss of civilian life, injury
to civilians, damage to civilian objects or a ASSIGNEES: The United States of America as
combination thereof, which would be excessive in represented by the Director of the National
relation to the concrete and direct military advantage Security Agency, Fort George G. Meade, MD
anticipated.Ó

Sommer 1999 Die Datenschleuder #67


Termine

Chaos Communication Camp


6.–8. August 1999

Paulshof, Altlandsberg bei Berlin

http://www.ccc.de/camp/
au§erdem

3.-4. Juli 1999 Mitgliederversammlung des Chaos Computer Club e.V.


Wer Mitglied ist, aber noch keine Einladung erhalten hat, mšge sich mšglichst umgehend an ofÞce@ccc.de bzw. die
Hamburger GeschŠftsstelle (siehe Adressen) wenden.

27.-29. Dezember 1999 Chaos Communication Congress 1999, Berlin

Chaos Bildungswerk Hamburg: Siehe http://www.hamburg.ccc.de/Workshops/index.html

Sa. 10.07.1999 + So 10.07.1999 19.30 h Linux Installation Party - bitte anmelden

Do 15.07.1999 19.30h Linux Grundlagen (kleine Anleitung wichtiger Unix-Tools)

Die Datenschleuder #67 Sommer 1999


Mitgliedsanträge und Datenschleuderabonnement Literatur
Bestellungen, MitgliedsantrŠge und

Adre§Šnderungen auch per Mail an


Adre§Šnderungen bitte senden an:

CCC e.V., Lokstedter Weg 72

o Satzung + Mitgliedsantrag _____ DM 29,80 Deutsches PGP-Handbuch, 3. Auflage + CD-ROM


(DM 5,00 in Briefmarken) _____ DM 5,00 Doku zum Tod des „KGB“-Hackers Karl Koch
_____ DM 25,00 Congressdokumentation CCC ‘93
D-20251 Hamburg

o Datenschleuder-Abo _____ DM 25,00 Congressdokumentation CCC ‘95


ofÞce@ccc.de

Normalpreis DM 60,00 für 8 Ausgaben _____ DM 25,00 Congressdokumentation CCC ‘97


_____ DM 50,00 Lockpicking: Über das Öffnen von Schlössern
o Datenschleuder-Abo
Ermäßigter Preis DM 30,00 für 8 Ausgaben Alte Datenschleudern
o Datenschleuder-Abo _____ DM 50,00 Alle Datenschleudern der Jahre 1984-1989
Gewerblicher Preis DM 100,00 für 8 Ausgaben _____ DM 15,00 Alle Datenschleudern des Jahres 1990
(Wir schicken eine Rechnung) _____ DM 15,00 Alle Datenschleudern des Jahres 1991
_____ DM 15,00 Alle Datenschleudern des Jahres 1992
Die Kohle liegt _____ DM 15,00 Alle Datenschleudern des Jahres 1993
_____ DM 15,00 Alle Datenschleudern des Jahres 1994
o als Verrechnungsscheck _____ DM 15,00 Alle Datenschleudern des Jahres 1995
o in Briefmarken _____ DM 15,00 Alle Datenschleudern des Jahres 1996
_____ DM 15,00 Alle Datenschleudern des Jahres 1997
bei bzw.
Sonstiges
o wurde überwiesen am ___.___.______ auf
Chaos Computer Club e.V., Konto 59 90 90-201 _____ DM 50,00 Blaue Töne / POCSAG-Decoder /

Sommer 1999
Postbank Hamburg, BLZ 200 100 20 PC-DES Verschlüsselung
_____ DM 5,00 1 Bogen „Chaos im Äther“
Der Mitgliedsfetzen

_____ DM 5,00 5 Aufkleber „Kabelsalat ist gesund“


Ort/Datum ________________________________________
+ DM 5,00 Portopauschale!

Der Bestellfetzen
Unterschrift ________________________________________ _____ Gesamtbetrag
Die Kohle liegt

Die Datenschleuder #67


Name _______________________________________ o als Verrechnungsscheck (bevorzugt)
o in Briefnarken
Straße _______________________________________ bei bzw.
o wurde überwiesen am ___.___.______ auf
PLZ, Ort _______________________________________ Chaos Computer Club e.V., Konto 59 90 90-201
Postbank Hamburg, BLZ 200 100 20
Tel/Fax _______________________________________
Name ______________________________________________
E-Mail _______________________________________
Straße ______________________________________________
PLZ, Ort _______________________________________________

Você também pode gostar