DOC PREVIEW
UVA CS 588 - De-clawing Carnivore

This preview shows page 1-2-24-25 out of 25 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 25 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 25 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 25 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 25 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 25 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

De-clawing Carnivore CS588: Cryptology Prof. David Evans Dante Guanlao Michael Tashbook Leonard Woody Dana Wortman December 5, 20011 1 INTRODUCTION ................................................................................................................................ 2 2 PROBLEM............................................................................................................................................ 3 2.1 TECHNICAL ASPECTS OF CARNIVORE .............................................................................................. 3 2.2 LEGAL ASPECTS OF CARNIVORE ..................................................................................................... 6 2.2.1 Introduction ............................................................................................................................ 6 2.2.2 A brief history of wiretapping and United States judicial system........................................... 6 2.2.3 Procedural Issues Regarding Wiretapping............................................................................. 7 2.2.4 Recent Developments.............................................................................................................. 8 3 RELATED WORK............................................................................................................................. 11 4 SOLUTION......................................................................................................................................... 14 4.1 STRATEGIES FOR AVOIDING CARNIVORE ...................................................................................... 14 4.1.1 PGP ...................................................................................................................................... 14 4.1.2 Nyms ..................................................................................................................................... 14 4.1.3 Crowds.................................................................................................................................. 15 4.1.4 MIXes.................................................................................................................................... 15 4.1.5 Onion Routing....................................................................................................................... 16 4.2 STRATEGIES FOR STRENGTHENING CARNIVORE ............................................................................ 17 5 EVALUATION ................................................................................................................................... 20 5.1 EVALUATION OF STRATEGIES FOR AVOIDING CARNIVORE ............................................................. 20 5.2 EVALUATION OF STRATEGIES FOR STRENGTHENING CARNIVORE................................................... 21 6 CONCLUSION ................................................................................................................................... 22 7 BIBLIOGRAPHY............................................................................................................................... 232 1 Introduction "They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin, 1759. The heated debate over Carnivore and online surveillance is reaching a fervid pitch after the September 11th events. Civil liberty groups claim that Carnivore’s power is too far-reaching and encroaches on basic constitutional freedoms, while law enforcement agencies insist on needing more power to combat terrorism and crime. This report seeks to explain the debate over Carnivore and offer solutions for those wishing to elude the system as well as those who wish to make Carnivore a more viable option. The next sections detail Carnivore’s technical implementation along with the legal context that surrounding it. Our report also offers solutions in which Internet users can evade Carnivore or combat its potential abuse by FBI agents. It is our hope that this information will be valuable to both sides of the debate as they struggle to find a balance between freedom and security.3 2 Problem 2.1 Technical Aspects of Carnivore Carnivore is a system of hardware and software combined to filter through internet traffic and find a designated target as outlined by a judge’s written order. The system itself is not highly sophisticated. Understanding Carnivore will help give insight into the reasons civil libertarians are intensely concerned about the potential abuse of Carnivore’s capabilities. The entire system employs two or more computers and is comprised of components that could be bought in the public market today. One of the computers is located at the Internet Service Provider (ISP) of the target individual (referred to as the “collection computer”). The other computers involved are located at FBI centers (referred to as the “control computers”). These computers are used to process the intercepted data and manage the Carnivore software on the collection computer [Smith viii-ix]. Carnivore runs on Wintel machines with Windows NT/2000 as the operating system [Tyson]. The collection computer does not usually have a monitor or keyboard, but does have a removable Jaz disk drive [Smith viii-ix]. Figure 1 Carnivore Hardware System [Smith ix] The diagram outlines the interconnections between the Carnivore hardware: The Carnivore system is usually installed on a sub-network of the ISP that contains the targeted individual’s internet traffic. The system uses a one-way tap into the traffic stream to collect its desired data. It takes each packet passing through the subnet and4sends a copy to the collection computer for filtering, and then sends the original packet to the hub or switch that normally processes the subnet packets. The collection computer also has a telephone link to the control computer(s). pcAnywhere, which is running on the collection computers, facilitates communication over the telephone link. These components comprise the communications hardware for Carnivore [Smith viii-ix, 3-10 – 3-13]. The communication between the control and collection computer is protected by two security systems: the encryption scheme of pcAnywhere and a challenge-type system. pcAnywhere is similar to SSH in that it uses a public key system to securely exchange


View Full Document

UVA CS 588 - De-clawing Carnivore

Download De-clawing Carnivore
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view De-clawing Carnivore and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view De-clawing Carnivore 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?