Awful interception: misadventures of the russian surveillance machinery
This talk analyzes the Russian surveillance ecosystem known as “SORM”. The term SORM stands for “System for Operative Investigative Activities” and defines Russian lawful interception equipment for telecommunications and Internet. Our talk specifically focuses on the technical details of implementation and real-life usage of SORM. It spotlights major cases of SORM misconfigurations and user data leaks that we found and observed through network monitoring data collection.
We first identified misconfigurations of SORM in 2017, when we came across a web interface that appeared to be an administration dashboard for a SORM device. Afterwards, Russian researcher Leonid Evdokimov documented another case of SORM misconfigurations which had led to users' data leaks . However, even after this disclosure, we continued to have access to dozens of live SORM web interfaces that were collecting user data. We could attribute some of them to specific vendors.
This talk is an effort to systematize the most up-to-date knowledge about the actual functioning of SORM, its technical capabilities, implementation schemes, legislation, market dynamics, as well as the analysis of misconfiguration cases we could find. It analyzes real legal practices of using SORM based on open data from courts that we analyzed in details. It also sheds light on the usage of SORM in occupied Ukrainian territories and the role SORM infrastructures play in the construction of Russia’s “digital authoritarianism”. While Kremlin declares that lawful interception equipment is a sovereign technology "made in Russia'', some of its core parts are still provided by foreign companies (as other researchers and our team could independently prove).