I understand the Nadim points, there's a lot of subjective biased "popular 
judgement".

While from a security standpoint perspective "better safe than sorry" is a good 
statement, from a rights and fairness perspective that's a very bad.

So further conversation is needed.

Following DarkMatter removal i would love to bring to the attention of Mozilla 
the removal of a list of Companies that does as a main business other stuff, 
but also does offensive security and surveillance with public "credible 
evidences" .

I've analysed Intermediate CA list where DarkMatter is here 
https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCerts .

In this list is possible to find the following company operating against 
"people's safety" and there's "credible evidences" they are doing so:


* Saudi Telecom Company

This company is publicly known to ask to surveil and intercept people as per 
"credible evidences" on:
https://moxie.org/blog/saudi-surveillance/
https://citizenlab.ca/2014/06/backdoor-hacking-teams-tradecraft-android-implant/


* German Rohde & Schwarz

This company do produce, install and support surveillance systems for 
intelligence agencies in Regimes such as Turkmenistan:
https://www.rferl.org/a/german-tech-firm-s-turkmen-ties-trigger-surveillance-concerns/29759911.html

They sell solutions to intelligence agencies such as IMSI Catchers and massive 
internet surveillance tools:
https://www.rohde-schwarz.com/en/solutions/aerospace-defense-security/overview/aerospace-defense-overview_229832.html


* US "Computer Sciences Corporation"

The CSC is a US Intelligence and Defense Contractors that does CNE (Computer 
Network Exploitation) like the WikiLeaks ICWatch show out

Read the profile of a former employee of CSC, doing CNE like Snowden was doing:
https://icwatch.wikileaks.org/docs/rLynnette-Jackson932c7871cb1e83f3%3Fsp=0ComputerSciencesCorporationCyberSecurityAnalystSystemsEngineerRemoteSystemAdministrator2008-09-01icwatch_indeed

Additionally from their wikipedia they acknowledge working for US Intel:
https://en.wikipedia.org/wiki/Computer_Sciences_Corporation

CSC provided services to the United States Department of Defense,[23] law 
enforcement and intelligence agencies (FBI,[24] CIA, Homeland Security[23]), 
aeronautics and aerospace agencies (NASA). In 2012, U.S. federal contracts 
accounted for 36% of CSC total revenue.[25]


* Australia's Attorney-General's Department

The Australia's Attorney-General's Department is a government agencies that 
wants to permit the Australian Security Intelligence Organisation (ASIO) to 
hack IT systems belonging to non-involved, non-targeted parties.

It operate against people safety and there's credible evidence of their 
behaviour in supporting ASIO to hack people, so they are very likely to abuse 
their intermediate CA:
http://www.h-online.com/security/news/item/Australian-secret-services-to-get-licence-to-hack-1784139.html


* US "National Geospatial-Intelligence Agency" https://www.nga.mil

The NGA is a US Military Intelligence Agency, equivalent to NSA, but operating 
on space GEOINT and SIGINT in serving intelligence and defense US agencies.

NGA is the Space partner of NSA:
https://www.nsa.gov/news-features/press-room/Article/1635467/joint-document-highlights-nga-and-nsa-collaboration/

I think that no-one would object to shutdown an NSA operated Intermediate CA, i 
am wondering if Mozilla would consider this removal.


Said that, given the approach that has been following with DarkMatter about 
"credible evidence" and "people safety" principles, i would strongly argue that 
Mozilla should take action against the subject previously documented.

I will open a thread on those newsgroup for each of those company to understand 
what's the due process and how it will compare to this.

Fabio Pietrosanti (naif)

Il giorno martedì 9 luglio 2019 18:19:36 UTC+2, Nadim Kobeissi ha scritto:
> Dear Wayne,
> 
> I fully respect Mozilla's mission and I fully believe that everyone here is
> acting in good faith.
> 
> That said, I must, in my capacity as a private individual, decry what I
> perceive as a dangerous shortsightedness and lack of intellectual rigor
> underlying your decision. I do this as someone with a keen interest in
> Internet freedom issues and not as someone who is in any way partisan in
> this debate: I don't care for DarkMatter as a company in any way whatsoever
> and have no relationship with anyone there.
> 
> I sense enough urgency in my concerns to pause my work schedule today and
> respond to this email. I will do my best to illustrate why I sense danger
> in your decision. Essentially there are three specific points I take issue
> with:
> 
> -----------------
> 1: Waving aside demands for objective criteria.
> -----------------
> You say that "if we rigidly applied our existing criteria, we would deny
> most inclusion requests." Far from being an excuse to put more weight (or
> in this case, perhaps almost all weight) on subjective decision making,
> this should be a rallying cry for Mozilla to investigate why it is that an
> objective and democratic decision-making process is failing, and what can
> be done to make it work better. Waving aside objective procedures as
> "checklists" dismisses a core procedural element of how such critical
> decisions should be made in the future and is explicitly undemocratic and
> therefore dangerous.
> 
> -----------------
> 2: Calling allegations "credible" and "extensively sourced" with almost no
> basis whatsoever.
> -----------------
> You cite four articles: two are from the Intercept, one is from Reuters and
> one is from the New York Times. You claim that the fact that they are years
> apart bolsters their credibility; why is this the case? In fact, these
> articles all parrot almost exactly the same story, with some minor
> additions, updates and modifications. They all almost read like the same
> article, despite their temporal distribution. Furthermore, the notion that
> the articles are "extensively sourced" is simply incorrect: all of the
> articles are based on anonymous sources and none of them provide a shred of
> evidence, which is why we are in this debate to begin with (or so I've been
> thinking).
> 
> It should also be noted that both The Intercept and the New York Times have
> published misleading and incorrect information many times in their history.
> The Intercept in particular has a very spotty credibility record.
> 
> It is also is not difficult to theorize how a politically trendy topic
> (cyberattacks) against the world's most easy-to-villainize company (an
> Arabic offensive cybersecurity company operating within a true monarchic
> state) would be appealing to American journalists. This sort of thing isn't
> new, and American "digital rights" groups have previously linked malicious
> cyberattacks to Middle Eastern countries without providing something that
> is even close to the same standard of evidence that they almost always
> provide when naming American or European actors.
> 
> Is is indeed unfortunate that this issue was dealt with in a single
> paragraph: I would have expected it to be the brunt of the email given its
> importance, and it is impossible to qualify that reporting as "credible"
> and "extensively sourced" so summarily.
> 
> -----------------
> 3: Culminating in an argument that simply boils down to "the people's
> safety", a trope that is often overused and that leads to undemocratic
> behavior.
> -----------------
> 
> We don't know if DarkMatter is an evil spying empire that doesn't care
> about the rights and dignity of private citizens or not. We don't know if
> they're setting up shell companies to mislead Mozilla's CA vetting
> procedures or not. In fact, it's been months where no new information has
> arisen and I would like to repeat that I do not _at all_ discount the
> possibility that all of the allegations may turn out to be completely true.
> 
> But instead of making effort towards resolving this uncertainty, or, in
> case that's not possible, create procedures to deal with it, we see it
> being wielded in order to increase the subjectivity of the decision making
> that gatekeeps some of the most fundamental issues of Internet security and
> to legitimize shoddy thinking.
> 
> Individually, your apparent decision against DarkMatter doesn't bother me.
> It is the decision making process itself however that risks setting a
> dangerous precedent that is already taking shape in other parts of the tech
> community, where major decisions are predicated on gut feeling and notions
> of safety that are almost by design impossible to elucidate, and where
> much-needed objectivity, vetting and reasoned behavior is relegated to
> one-shot paragraphs that barely come with an apology.
> 
> In conclusion: perhaps it is exactly because DarkMatter are so incredibly
> easy to demonize that we are so temporarily blind to an infinitely more
> dangerous and terrifying lapse of judgement: one that may come from much
> closer to home. I don't mind if DarkMatter loses out here, but I urge you
> to self-reflect critically on what this decision may constitute in terms of
> a future trend.
> 
> Presented with the utmost respect and good faith,
> 
> Yours sincerely,
> 
> Nadim Kobeissi
> Symbolic Software • https://symbolic.software
> Sent from office
> 
> 
> On Tue, Jul 9, 2019 at 5:31 PM Wayne Thayer <wtha...@mozilla.com> wrote:
> 
> > I would like to thank everyone for their constructive input on this
> > difficult issue. I would also like to thank DarkMatter representatives for
> > participating in the open, public discussion. I feel that the discussion
> > has now, after more than 4 months, run its course.
> >
> > The question that I originally presented [1] to this community was about
> > distrusting DarkMatter’s current intermediate CA certificates (6 total)
> > based on credible evidence of spying activities by the company. While a
> > decision to revoke trust in these intermediates would likely result in a
> > denial of DarkMatter’s root inclusion request [2], the public discussion
> > for that request has not yet begun. A decision not to revoke these
> > intermediates does not necessarily mean that the inclusion request will be
> > approved.
> >
> > Some of this discussion has revolved around compliance issues, the most
> > prominent one being the serial number entropy violations discovered by
> > Corey Bonnell. While these issues would certainly be a consideration when
> > evaluating a root inclusion request, they are not sufficient to have
> > triggered an investigation aimed at revoking trust in the DarkMatter
> > intermediates or QuoVadis roots. Therefore, they are not relevant to the
> > question at hand.
> >
> > Much of the discussion has been about the desire for inclusion and distrust
> > decisions to be made based on objective criteria that must be satisfied.
> > However, if we rigidly applied our existing criteria, we would deny most
> > inclusion requests. As I stated earlier in this thread, every distrust
> > decision has a substantial element of subjectivity. One can argue that
> > we’re discussing a different kind of subjectivity here, but it still
> > amounts to a decision being made based on a collective assessment of all
> > the information at hand rather than a checklist.
> >
> > Some, including DarkMatter representatives [3], have declared the need to
> > examine and consider the benefits of having DarkMatter as a trusted CA.
> > However, last year we changed our policy to replace the weighing of
> > benefits and risks with “based on the risks of such inclusion to typical
> > users of our products.” [4]
> >
> > Perhaps the most controversial element in this discussion has been the
> > consideration of “credible evidence”. The first component is the inherent
> > uncertainty over what is “credible”, especially in this day and age. While
> > it has been pointed out that respected news organizations are not beyond
> > reproach [5], having four independent articles [6][7][8][9] from reputable
> > sources published years apart does provide some indication that the
> > allegations are credible. These articles are also extensively sourced.
> >
> > If we assume for a second that these allegations are true, then there is
> > still a sincere debate over what role they should play in our decision to
> > trust DarkMatter as a CA. The argument for considering these allegations is
> > akin to the saying “where there’s smoke there’s fire”, while the argument
> > against can be described as “innocent until proven guilty”.
> >
> > DarkMatter has argued [3] that their CA business has always been operated
> > independently and as a separate legal entity from their security business.
> > Furthermore, DarkMatter states that once a rebranding effort is completed,
> > “the DarkMatter CA subsidiary will be completely and wholly separate from
> > the DarkMatter Group of companies in their entirety.” However, in the same
> > message, DarkMatter states that “Al Bannai is the sole beneficial
> > shareholder of the DarkMatter Group.” and leaves us to assume that Mr. Al
> > Bannai would remain the sole owner of the CA business. More recently,
> > DarkMatter announced that they are transitioning all aspects of the
> > business to DigitalTrust and confirmed that Al Bannai controls this entity.
> > This ownership structure does not assure me that these companies have the
> > ability to operate independently, regardless of their names and legal
> > structure.
> >
> > Mozilla’s principles should be at the heart of this decision. “The Mozilla
> > Manifesto [10] states:
> >
> > Individuals’ security and privacy on the internet are fundamental and must
> > not be treated as optional.”
> >
> > And our Root Store policy states: “We will determine which CA certificates
> > are included in Mozilla's root program based on the risks of such inclusion
> > to typical users of our products.”
> >
> > In other words, our foremost responsibility is to protect individuals who
> > rely on Mozilla products.  I believe this framing strongly supports a
> > decision to revoke trust in DarkMatter’s intermediate certificates. While
> > there are solid arguments on both sides of this decision, it is reasonable
> > to conclude that continuing to place trust in DarkMatter is a significant
> > risk to our users. I will be opening a bug requesting the distrust of
> > DarkMatter’s subordinate CAs pending Kathleen’s concurrence. I will also
> > recommend denial of the pending inclusion request, and any new requests
> > from DigitalTrust.
> >
> > In the past, we’ve seen CAs attempt to make an end run around adverse trust
> > decisions - through an acquisition, a shell company, etc. We will treat any
> > such attempt as a violation of this decision and act accordingly. Mozilla
> > does welcome DigitalTrust as a “managed” subordinate CA under the oversight
> > of an existing trusted CA that retains control of domain validation and the
> > private keys.
> >
> > This discussion has highlighted an opportunity to improve our review of new
> > externally-operated subordinate CAs [11]. This issue [12] is part of the
> > current policy update discussions.
> >
> > Wayne
> >
> > [1]
> >
> > https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/YiybcXciBQAJ
> > [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1427262
> > [3]
> >
> > https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/mJ0EV2eoCgAJ
> > [4]
> >
> > https://groups.google.com/d/msg/mozilla.dev.security.policy/58F6FgeGOz8/Zzb-r76wBQAJ
> > [5]
> >
> > https://www.washingtonpost.com/blogs/erik-wemple/wp/2018/11/27/bloomberg-is-still-reporting-on-challenged-story-regarding-china-hardware-hack/
> > [6]
> >
> > https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
> > [7] https://www.reuters.com/investigates/special-report/usa-spying-raven/
> > [8]
> >
> > https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
> > [9] https://theintercept.com/2019/06/12/darkmatter-uae-hack-intercept/
> > [10] https://www.mozilla.org/en-US/about/manifesto/
> > [11]
> >
> > https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAudits
> > [12] https://github.com/mozilla/pkipolicy/issues/169
> >

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
              • Re:... mono.riot--- via dev-security-policy
              • Re:... Scott Rea via dev-security-policy
              • Re:... Cynthia Revström via dev-security-policy
              • Re:... Nadim Kobeissi via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Nadim Kobeissi via dev-security-policy
              • Re:... Nadim Kobeissi via dev-security-policy
              • Re:... Nex via dev-security-policy
              • Re:... Matthew Hardeman via dev-security-policy
              • Re:... Nadim Kobeissi via dev-security-policy
              • Re:... fabio.pietrosanti--- via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Michael Casadevall via dev-security-policy
            • Re: Dar... Matthew Hardeman via dev-security-policy
  • Re: DarkMatter Concerns Ronald F. Guilmette via dev-security-policy

Reply via email to