Wiretapping and EncryptionEarly Forms of WiretappingWiretapping TodayCellular PhonesStandard PhonesLegal MandatesCryptography - Making and breaking of ciphersEncryption Includes:ExamplesVariations - SymmetricVariation - AsymmetricWho Uses Encryption?Industrial EspionageProfessionalsCriminalsReliabilityAlgorithms availableRSA algorithmPGP - Pretty Good PrivacyNew ControversiesBenefits of Government InterventionProblemsCommunications Assistance for Law Enforcement Act 1994Arguments for...NEED?COST?Innovation and global competitivenessProtection from Dossier SocietyE-CashE-Cash continuedHistory of EncryptionGovernment InterceptionClipper ChipWiretapping and EncryptionMore Week 5 cont.Early Forms of WiretappingParty LinesHuman OperatorsWiretapping TodayFederal and state law enforcementBusinessesPrivate DetectivesPolitical Candidates......Cellular PhonesCan be tapped with over-the-counter devicesStandard PhonesEasily tapped if signal travels by microwave or satelliteGovernment has secured phonesLegal Mandates1937 - Supreme Court rules that wiretapping is illegal1968 - Congress explicitly allowed it by law enforcement agenciesneeds court orderElectronic Communications Privacy Act include new technologiesCryptography - Making and breaking of ciphersTranslation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEYPlaintext - a message or dataCiphertext - coded textDecryption - decoding back to plaintextEncryption Includes:Coding scheme or cryptographic algorithmSpecific sequence of characters key used by the algorithmExamplesCereal box codesSubstitute cipherCryptoquip in newspaperVariations - SymmetricUse the same key to encrypt and decrypt (secret key)Requires a more secure system to send the key than the system itselfVariation - AsymmetricUse a key (public key) to encrypt a messageAnother (private key) to decrypt itRequires both keysWho Uses Encryption?BanksIndustryProfessionalsNational ID cardsCriminals.....Industrial EspionageKnowledge of a company’s cost and price structureMarket researchStrategic plansOrder and customer listsInsider informationProfessionalsCellular telephones and electronic mailunencrypted data on machinesCriminalsCryptography allows criminals to keep their identities a secretProvides security to law breakersAllows anonymityDon’t use systems that leave trailsReliabilityThe longer the key has remained unbroken, the stronger it is likely to beThe longer the key is in use, the more likely someone will be able to discover itlarger amount of info will be compromisedchange key frequentlyAlgorithms availableDES - Data Encryption Standard Developed by IBMAdopted as a Federal Information Processing StandardUses a 56 bit keyHas been brokenTo extend life - extend key to 128 bitsor triple DESRSA algorithmUsed in public key cryptography Patented in USBased on multiplication of large prime numbersPGP - Pretty Good PrivacyBased on RSAUsed for protecting E-MailNew Controversies1991 - Senate Bill - Government wants to be able to intercept any message and be able to decode it as well - not passedFBI and wiretapping - Telephony billsFBI and Clipper ChipBenefits of Government InterventionAid law enforcement in protecting us from criminals and terroristsProblemsThreats to privacyglobal competitivenesscivil libertiesCommunications Assistance for Law Enforcement Act 1994to and from Requires that telecommunications equipment be designed so govt. can:intercept all wire and electronic communic.Intercept commun. from mobile usersObtain call-identifying infophone numbers Have info transmitted to a specific locationGovernment will help foot the billArguments for...Protection from terrorists and criminalsFBI wants no new privilegesBUTNecessity has not been justifiedExpense and other problems outweigh the benefitsThere has never been a guarantee of interception of private messages beforeNEED?Wiretaps are less useful than informants, witnesses, etc.BUT90% of terrorist cases used wiretapsIndustry claims full compliance with FBIBUTContinued cooperation is not guaranteedCOST?A lot more than government is givingWill save money infines, forfeitures, prevented economic lossUsed only in a subset of investigationsCould use the money on other technologiesInnovation and global competitivenessStifle or delay new technologieseconomic costsprevent new technologies’ implementationDamage to US competitiveness in global markets due to reduced security and privacyProtection from Dossier SocietyDigital cash made possible by public key encryptionSecure financial transactions without a credit card or checking account numberE-CashNo link between payer and recipientConvenience of credit cardAnonymity of cashUse on Internet for ordinary shoppingCan transfer credentialsCan prevent duplicate cash filesBack up at home incase card is lost or stolenE-Cash continuedNot easy to form a consumer profile or dossierPrevent fraud and forgeryProtect privacy from mailing listsMore control over personal informationHistory of EncryptionSecret - NSANational Security Agencycan do anythinghas powerful computers - break ciphers and create ciphersmonitors all communications between US and other countriesGovernment InterceptionNSA censored researchcontrolled researchersExport restrictionsmunitionscan’t export secure systemsClipper ChipWhy?need for strong encryption for businessDesire for privacy of many AmericansProvide a government back doorWhat?Skipjack algorithmTelephones and computerfield ID to tell government the
View Full Document