#[1]Matt Blaze's Exhaustive Search

                                                             Matt Blaze's
                                                        EXHAUSTIVE SEARCH

  Science, Security, Curiosity

  [mab.jpg]
  Search blog archives
  ____________________ OK
  Feeds
  [2]RSS 1.0 / [3]2.0 / [4]Atom
  Archives
  [5]2012 - 2020
  [6]2011
  [7]2010
  [8]June - December 2009
  [9]March - April 2009
  [10]July - December 2008
  [11]January - May 2008
  [12]July - December 2007
  [13]January - June 2007
  More Recent Articles

  [14]Scientists say no credible evidence of computer fraud in the 2020
  election outcome, but policymakers must work with experts to improve
  confidence
  Older Articles

  [15]Exhaustive Search has Moved

  [16]How to Hack an Election Without Really Trying

  [17]When Should the Government Disclose "Stockpiled" Vulnerabilities?
  Us
  [18]Mattblaze home
  [19]Blog home
  [20]Research papers
  [21]Twitter feed
  [22]Flickr photos
  [23]Other photos
  [24]Bingo
  [25]Bio
  Them
  [26]UPenn CIS
  [27]Halfbakery
  [28]Quut.com
  18 September 2020
  A Cryptologic Mystery
  Did a broken random number generator in Cuba help expose a Russian
  espionage network?

  I picked up the new book Compromised last week and was intrigued to
  discover that it may have shed some light on a small (and rather
  esoteric) cryptologic and espionage mystery that I've been puzzling
  over for about 15 years. Compromised is primarily a memoir of former
  FBI counterintelligence agent Peter Strzok's investigation into Russian
  operations in the lead up to the 2016 presidential election, but this
  post is not a review of the book or concerned with that aspect of it.

  Early in the book, as an almost throwaway bit of background color,
  Strzok discusses his work in Boston investigating the famous Russian
  "illegals" espionage network from 2000 until their arrest (and
  subsequent exchange with Russia) in 2010. "Illegals" are foreign agents
  operating abroad under false identities and without official or
  diplomatic cover. In this case, ten Russian illegals were living and
  working in the US under false Canadian and American identities. (The
  case inspired the recent TV series The Americans.)

  Strzok was the case agent responsible for two of the suspects, Andrey
  Bezrukov and Elena Vavilova (posing as a Canadian couple under the
  aliases Donald Heathfield and Tracey Lee Ann Foley). The author
  recounts watching from the street on Thursday evenings as Vavilova
  received encrypted shortwave "numbers" transmissions in their
  Cambridge, MA apartment.

  Given that Bezrukov and Vaviloa were indeed, as the FBI suspected,
  Russian spies, it's not surprising that they were sent messages from
  headquarters using this method; numbers stations are part of
  time-honored espionage tradecraft for communicating with covert agents.
  But their capture may have illustrated how subtle errors can cause
  these systems to fail badly in practice, even when the cryptography
  itself is sound.
    __________________________________________________________________

  First, a bit of background. For at least the last sixty years,
  encrypted shortwave radio transmissions have been a standard method for
  sending messages to covert spies abroad. Shortwave radio has several
  attractive properties here. It covers long distances; it's possible for
  a single transmitter to get hemispheric or even global coverage.
  Shortwave radio receivers, while less common than they once were, are
  readily available commercially in almost every country and are not
  usually suspicious to possess. And while it's relatively easy to tell
  where a shortwave signal is coming from, their wide coverage area makes
  it very difficult to infer exactly who or where the intended recipients
  might be. Both the US (and its allies) and the Soviet Union (and its
  satellites) made extensive use of shortwave radio for communicating
  with spies during the cold war, and enigmatic "numbers" transmissions
  aimed at spies continue to this day.

  The encryption method of choice used by numbers stations is called a
  "one time pad" (OTP) cipher. OTPs have unique advantages over other
  encryption methods. Used properly, they are unconditionally secure; no
  amount of computing power or ingenuity can "break" them without
  knowledge of the secret key. Also, they are almost deceptively low
  tech. It is possible to encrypt and decrypt OTP messages by hand with
  nothing more than paper and pencil and simple arithmetic. The
  disadvantage is that OTPs are cumbersome; you need a secret key as long
  as all the messages you will ever send, with no part of the key ever
  re-used for multiple messages. Typically, the key would be printed as a
  series of digits bound into a pad of paper, with each page removed
  after use; hence the name "one time pad". OTPs can be difficult in
  practice to use properly and are quite vulnerable if used improperly;
  more on that later.

  The OTP messages sent to spies by shortwave radio typically consist of
  decimal digits broadcast in either a mechanically recorded voice or in
  morse code (more recently, digital transmissions are also used) on
  designated frequencies at designated times, usually in four or five
  digit groups (hence the term "numbers station"). After copying and
  verifying a header in the message, the agent would remove the
  corresponding page from their secret OTP codebook and add each key
  digit to each corresponding message digit using modulo-10 arithmetic
  (without carry). The resulting "plaintext" digits are then converted to
  text with a simple substitution encoding (e.g, A=01, B=02, etc.,
  although other encodings are generally used). That's all there is to
  it. The security of the system depends entirely on the uniqueness,
  unpredictability, and secrecy of the OTP codebook pad given to each
  agent.

  To prevent "traffic analysis" that might reveal to an observer the
  number of active agents or the volume of messages sent to them, numbers
  stations typically operate on rigidly fixed schedules, sending messages
  at pre-determined times whether there is actually a message to be sent
  or not. When there is no traffic for a given timeslot, random dummy
  "fill" traffic is sent instead. The fill traffic should be
  indistinguishable to an outsider from real messages, thereby leaking
  nothing about how often or when the true messages are being sent. But
  more on this later.

  None of this is by itself news. The existence of numbers stations has
  been publicly known (and tracked by hobbyists) since at least the
  1960's, and OTPs are an elementary cryptographic technique known to
  every cryptographer. However, Strzok mentions two interesting details
  I'd not seen published previously and that may solve a mystery about
  one of the most well known numbers stations heard in North America.

  First, Compromised reveals that the FBI found that during at least some
  of the time the illegals were under investigation, the Russian numbers
  intended for them were sent not by a transmitter in Russia (which might
  have difficulty being reliably received in the US), but relayed by the
  Cuban shortwave numbers station. This is perhaps a bit surprising,
  since the period in question (2000-2010) was well after the Soviet
  Union, the historic protector of Cuba's government, had ceased to
  exist.

  The Cuban numbers station is somewhat legendary. It is a powerful
  station, operated by Cuba's intelligence directorate but co-located
  with Radio Habana's transmitters near Bauta, Cuba, and is easily
  received with even very modest equipment throughout the US. While its
  numbers transmissions have taken a variety of forms over the years,
  during the early 2000's it operated around the clock, transmitting in
  both voice and morse code. The station was (and remains) so powerful
  and widely heard that radio hobbyists quickly derived its hourly
  schedule. During this period, each scheduled hourly transmission
  consisted of a preamble followed by three messages, each made up
  entirely of a series of five digit groups (with by a brief period of
  silence separating the three messages). The three hourly messages would
  take a total of about 45 minutes, in either voice or morse code
  depending on the scheduled time and frequency. Every hour, the same
  thing, predictably right on schedule (with fill traffic presumably
  substituted for the slots during which there was no actual message).

  If you want to hear what this sounded like, here's a recording I made
  on October 4, 2008 of one of the hourly voice transmissions, as
  received (static and all) in my Philadelphia apartment:
  [29]www.mattblaze.org/private/17435khz-200810041700.mp3. The
  transmission follows the standard Cuban numbers format of the time,
  starting with an "Atención" preamble listing three five-digit
  identifiers for the three messages that follow, and ending with "Final,
  Final". In this recording, the first of the three messages (64202)
  starts at 3:00, the second (65852) at 16:00, and the third (86321) at
  29:00, with the "Final" signoff at the end. The transmissions are, to
  my cryptographic ear at least, both profoundly dull and yet also eerily
  riveting.

  And this is where the mystery I've been wondering about comes in. In
  2007, I noticed an odd anomaly: some messages completely lacked the
  digit 9 ("nueve"). Most messages had, as they always did and as you'd
  expect with OTP ciphertext, a uniform distribution of the digits 0-9.
  But other messages, at random times, suddenly had no 9s at all. I
  wasn't the only (or the first) person to notice this; apparently the 9s
  started disappearing from messages some time around 2005.

  This is, to say the least, very odd. The way OTPs work should produce a
  uniform distribution of all ten digits in the ciphertext. The odds of
  an entire message lacking 9s (or any other digit) are infinitesimal.
  And yet such messages were plainly being transmitted, and fairly often
  at that. In fact, in the recording of the 2008 transmission linked to
  above, you will notice that while the second and third messages use all
  ten digits, the first is completely devoid of 9s.

  I remember concluding that the most likely, if still rather improbable,
  explanation was that the 9-less messages were dummy fill traffic and
  that the random number generator used to create the messages had a bug
  or developed a defect that prevented 9s from being included. This would
  be, to say the least, a very serious error, since it would allow a
  listener to easily distinguish fill traffic from real traffic,
  completely negating the benefit of having fill traffic in the first
  place. It would open the door to exactly the kind of traffic analysis
  that the system was carefully engineered to thwart. The 9-less messages
  went on for almost ten years. (If I were reporting this as an Internet
  vulnerability, I would dub it the "Nein Nines" attack; please forgive
  the linguistic muddle). But I was resigned to the likelihood that I
  would never know for sure.

  And this brings us to the second observation from Strzok's book.

  Compromised doesn't say anything about missing nueves, but ita does
  mention that the FBI exploited a serious error on the part of the
  sender: the FBI was able to tell when messages were and weren't being
  sent during the weekly timeslot when the suspect couple was observed in
  the room where they copied traffic. Even worse (for the illegals),
  empty message slots correlated perfectly with times that the suspect
  couple was traveling and not able to copy messages. This observation
  helped confirm the FBI's suspicions and ultimately led to their arrest
  and expulsion (along with the rest of the Russian illegals network).

  I suspect that Strzok simplified the story for the book and that it was
  the 9-less Cuban messages that they surmised to be "no message" traffic
  when the Cuban station was used. The FBI (or NSA) no doubt noticed the
  lack of 9s just as I (and others) did, and likely came to the same
  conclusions I did. The difference is that they were in a position to
  confirm the hypothesis through real-time surveillance of actual
  espionage suspects.

  Ironically, this was not the first time that Russian/Soviet
  intelligence has been burned by sloppy OTP practices. The first was,
  more famously, the disastrous re-use of OTPs discovered and exploited
  in the [30]Venona intercepts.

  One time pads can be a cryptographic landmine. They have a very
  attractive property - provable security! - but at the cost of
  unforgiving operational assumptions that can be hard to meet in
  practice. OTPs have long been a favorite of hucksters selling
  supposedly "unbreakable" encryption software. So remember this story
  next time someone tries to sell you their super-secure
  one-time-pad-based crypto scheme. If actual Russian spies can't use it
  securely, chances are neither can you.

  Anyway, as they say on the radio...
  FINAL
  FINAL
  [31]www.mattblaze.org/blog • [32]Matt Blaze • [33][email protected]

References

  Visible links
  1. https://www.mattblaze.org/blog/rss20.xml
  2. https://www.mattblaze.org/blog/rss10.xml
  3. https://www.mattblaze.org/blog/rss20.xml
  4. https://www.mattblaze.org/blog/atom.xml
  5. https://www.mattblaze.org/blog/?n=7&offset=55
  6. https://www.mattblaze.org/blog/?n=7&offset=48
  7. https://www.mattblaze.org/blog/?n=5&offset=43
  8. https://www.mattblaze.org/blog/?n=9&offset=34
  9. https://www.mattblaze.org/blog/?n=2&offset=32
 10. https://www.mattblaze.org/blog/?n=6&offset=26
 11. https://www.mattblaze.org/blog/?n=9&offset=17
 12. https://www.mattblaze.org/blog/?n=8&offset=9
 13. https://www.mattblaze.org/blog/?n=9&offset=0
 14. https://www.mattblaze.org/blog/election-letter
 15. https://www.mattblaze.org/blog/newaddress
 16. https://www.mattblaze.org/blog/vote_hacking_by_email
 17. https://www.mattblaze.org/blog/between_immediately_and_never
 18. https://www.mattblaze.org/
 19. https://www.mattblaze.org/blog/
 20. https://www.mattblaze.org/papers/
 21. https://twitter.com/mattblaze/
 22. https://flickr.com/photos/mattblaze/
 23. https://www.mattblaze.org/photos/
 24. https://www.mattblaze.org/bingo/pr
 25. https://www.mattblaze.org/research.html
 26. https://www.cis.upenn.edu/
 27. https://www.halfbakery.com/
 28. https://www.quut.com/
 29. https://www.mattblaze.org/private/17435khz-200810041700.mp3
 30. https://www.nsa.gov/news-features/declassified-documents/venona/
 31. https://www.mattblaze.org/blog
 32. https://www.mattblaze.org/
 33. mailto:[email protected]

  Hidden links:
 35. https://www.mattblaze.org/blog