IOCATA 2016

The internet is governed according to a ‘multi-stakeholder model’178 whereby a multitude of parties – mostly private actors – interact to discuss and develop principles and norms that regulate how the internet develops and functions. Compared to the traditional intergovernmental approach where sovereign states discuss on an equal footing, in the multi-stakeholder model governments which represent the public interest, only have a limited influence in the process.

This brings an important challenge for the law enforcement community whose actions to attribute crime online are directly dependent on the standards and rules governing the internet. In addition, those rules and norms can leave vulnerabilities that can be exploited by criminals. For example, the Domain Name System (DNS) which translates domain names into IP addresses, can be abused by criminals to carry out illegal activities: by manipulating DNS records179, criminals can hijack a domain to redirect traffic to another domain which will distribute malware. The TCP/IP protocol can also be exploited to launch a DDoS attack via SYN flooding180.

There are many challenges from a law enforcement perspective pertaining to the current developments in the internet governance field. However, in 2016 the main ones are related to: the discussion on the accreditation of privacy and proxy services, the reform of the DNS WHOIS and to the generalisation of the use of Carrier-Grade Network Address Translation (CGN) technologies by internet service providers (ISPs).

Accreditation of privacy and proxy services img

Accreditation of privacy and proxy services

One of the most relevant issues for law enforcement discussed within ICANN181 relates to the accreditation of privacy and proxy services. Registrars often offer privacy and proxy (P/P) services to customers who wish to keep certain information from being made public via the WHOIS (publicly available database of the registration information of each domain name holder). However, P/P services are often misused to hide criminal activities. For instance bullet proof hosters (BPHs) will use untraceable WHOIS details to register servers aided by privacy-protection legal services182.

ICANN has committed to establishing an accreditation program for P/P service providers to establish a contractual framework. The bottom line is that ICANN should only accredit Registrars that cooperate with public authorities to avoid - as much as possible - rogue actors providing key elements of bullet proof hosting infrastructure and obscuring pertinent information.

Unfortunately, the concerns of the law enforcement community have not been included in the current recommendations adopted by the ICANN Board183. The consequences are detrimental to the prevention of crime online:

  • Firstly, according to the ICANN Board recommendations, P/P service providers should only comply with express requests from LEAs not to notify a customer where this is required by applicable law. In other words, P/P service providers will not have to keep law enforcement requests for information confidential unless served with a court order.
  • Second, P/P service providers may only be compelled to respond to law enforcement requests coming from within their own jurisdiction while many investigations are cross-border.
  • Thirdly, entities running domains/websites actively engaged in commercial transactions – i.e. the collection of money for goods or a service – will be allowed to conceal their identity using privacy and proxy services.

Some of these concerns could possibly be addressed during the implementation of the recommendations but the law enforcement community needs to engage with its government representatives at ICANN to ensure a positive outcome.

  1. ICANN – the Internet Corporation for Assigned Name and Numbers - manages domain names and IP addresses at global level. footnote 181
  2. Trend Micro, Criminal Hideouts for Lease: Bulletproof Hosting Services, http://www.trendmicro.nl/media/wp/wp-criminal-hideouts-for-lease-en.pdf, 2015 footnote 182
  3. ICANN, Approved Board Resolutions, Special Meeting of the ICANN Board, https://www.icann.org/resources/board-material/resolutions-2016-08-09-en#2.e, 2016 footnote 183
Replacing the DNS WHOIS img

Replacing the DNS WHOIS

The WHOIS is a free, publicly available directory containing the contact details of registered domain name holders (registrants). Anyone, including law enforcement, who needs to know who is behind a domain name can make a request for that information via the WHOIS protocol. The data is collected and made available by registrars and registries under the terms of their agreements with ICANN. Accurate WHOIS information is therefore essential for consumer protection and law enforcement to investigate and attribute abuse and unlawful activity online.

However, despite a number of ICANN contractual obligations to ensure accurate WHOIS information, bad actors have found many ways to register domain names anonymously. In parallel data protection authorities have been criticising the WHOIS for failing to adhere to European data protection standards.

A new ICANN Policy Development Process (PDP) has been established in 2016 to determine whether a new system could replace the WHOIS. The PDP has started working on the basis of the recommendations of a report adopted in 2014 by an Expert Working Group (EWG)184.

In order to reconcile privacy and data protection laws with the requirement to have contact details for each domain names, the EWG recommended a “gated access” to WHOIS information. In other words, the current model of anonymous public access to all gTLD185 registration data might be discontinued. Instead, registration data would be disclosed for permissible purposes only, with some data elements being accessible only to authenticate requestors. This means that law enforcement agencies will need to be validated and accredited in order to query the database of registration of domain names.

This raises a number of issues as to which organisation will serve as the accrediting body and how this will impact the speed at which LEAs will be able to obtain relevant information.

  1. ICANN, A Next-Generation Registration Directory Service (RDS), https://www.icann.org/en/system/files/files/final-report-06jun14-en.pdf, 2014 footnote 184
  2. Generic Top Level Domain footnote 185
Carrier-grade network address translation (CGN) img

Carrier-grade network address translation (CGN)

Recently, many new technologies have made the headlines because they hinder law enforcement’s ability to follow criminal leads and attribute crime. But the Going Dark problem is not limited to the Tor network, proxy servers, bullet proof hosting and encrypted communication apps. A far more diffused technology is posing massive attribution problems to the law enforcement community.

The global demand for internet accessibility has led to an explosion in use of internet enabled devices. This growth has resulted in the exhaustion of the Internet Protocol version 4 (IPv4) addresses. The new version of the Internet Protocol, known as IPv6, offers a virtually unlimited number of IP addresses. However, the transition from IPv4 to IPv6 has been slower than expected because of the lack of commercial incentive to do so and the numerous necessary upgrades to the IPv4 legacy infrastructure. The transition from IPv4 to IPv6 has forced many network operators and internet service providers (ISPs) to support and maintain both address infrastructure schemes so that devices are able to run IPv4 and IPv6 in parallel (dual stack).

Against this background, and in order to address the gradual exhaustion of IPv4 addresses, ISPs and mobile internet service providers have adopted a temporary solution called Carrier-Grade Network Address Translation (CGN).

What is Carrier Grade NAT (CGN)?

CGN is an evolution of the traditional Network Address Translation (NAT) protocol, which has been used for the last 25 years in private networks (homes, small businesses). NAT dynamically translates a collection of private IP addresses connected to each of the home or business user's devices to one public IPv4 address used within one network (i.e. routable on the internet). That one public IP address is announced at the customer endpoint user's modem which interfaces with the customer endpoint user's content service provider network. CGN is much more pervasive than NAT; instead of an endpoint user having a single public IP address, CGN allows a single IP address to be shared by potentially thousands of subscribers at the same time.

CGN impact on law enforcement investigations

With CGN, law enforcement has lost its ability to associate and link a particular cyber criminal’s activity back to a particular IP address. Cyber investigators now need to determine which one of the hundreds of consumers associated with a particular public IP address is behind the actions they are investigating.

One Member State reported that in a recent investigation into child sexual exploitation material (CSEM) distributed and hosted via a cloud-based service, the investigators had to investigate each one of the 50 clients using that public IP at this time in order to identify who was ultimately uploading the CSEM, because the cloud-based service provider did not log the relevant information to discriminate which customer was using the public IP.

Scale of the problem

A survey conducted in August 2016 among European cyber-investigators, shows that problems of crime attribution related to CGN technologies are regularly encountered by 90% of the respondents during their investigations186.

In a number of cases, the investigations were discontinued. Alternatively the investigations were delayed because the investigators needed to resort to additional, lengthy and possibly more invasive investigative techniques in order to identify the end-user. 98% of the respondents support a European-wide mandatory legal requirement for electronic service providers to identify end users of IP addresses.

  1. Internal survey conducted by the European Cybercrime Centre among all EU Member States cyber divisions footnote 186
Future threats and developments img

Future threats and developments

For many years, most actors involved shared the view that the simplest solution to this problem was to wait for the full transition to IPv6, because the trillions of IP addresses available would do away with the need to use CGN. Current trends indicate that the transition to IPv6 will not be completed before at least the next two decades.

Currently, almost all European mobile ISPs use CGN technologies and a large majority of conventional ISPs (cable, fibre and ADSL) have converted their network infrastructure to use CGN.

In addition, responding to customer demand, telecoms equipment companies such as CISCO and JUNIPER have started selling software solutions to translate IPv4 addresses into IPv6 addresses187. This means that CGN is here to stay and that the law enforcement community needs to resort to other means to be able to continue performing a trace back to an individual end user of an IP address.

  1. NetFlask, NAT66 and IPv6 ULA on Juniper SRX, https://www.netflask.net/nat66-and-ipv6-ula/, 2014 footnote 187
Recommendations img

Recommendations

  • To be able to trace back an individual end user to an IP address on a network using CGN, law enforcement must request additional information188 from the service providers via legal process:
    • Source and destination IP addresses;
    • Source port number;
    • Exact time of the connection (within a second) .
    • However, the lack of harmonised data retention standard requirements in Europe189 means that content service, internet service and data hosting providers are under no legal obligation to retain this type of information, meaning that even a more elaborate request from a law enforcement agency would not yield useable information from the provider.
  • Regulatory/legislative changes are required to ensure that content service providers systematically retain the necessary additional data (source port) law enforcement requires to identify end users.
  • Alternatively, practical solutions can be developed through collaboration between the electronic service providers and law enforcement. Some electronic providers in Europe do store the relevant information (source port). A European-wide portal could maintain an updated list of those providers and a list of contact points to address in case an investigation is stalled by CGN.
  1. Internet Engineering Task Force (IETF), Recommendation for Comment (RFC) 6302, Logging Recommendations for Internet-Facing Servers, https://tools.ietf.org/html/rfc6302, 2011 footnote 188
  2. On 8 April 2014 the European Court of Justice annulled the Data Retention Directive http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf, 2014 footnote 189
  1. EastWest, Exploring Multi-Stakeholder Internet Governance, https://www.eastwest.ngo/idea/exploring-multi-stakeholder-internet-governance, 2015 footnote 178
  2. For instance using a DNS changer malware or by announcing false DNS records to peer ASNs. footnote 179
  3. SYN flooding is a TCP sequence number prediction to generate counterfeit packets in a TCP connection and access the target host using a normal TCP/IP connection. footnote 180