UVA CS 588 - De-clawing Carnivore (25 pages)

Previewing pages 1, 2, 24, 25 of 25 page document View the full content.
View Full Document

De-clawing Carnivore



Previewing pages 1, 2, 24, 25 of actual document.

View the full content.
View Full Document
View Full Document

De-clawing Carnivore

54 views


Pages:
25
School:
University Of Virginia
Course:
Cs 588 - Cryptology - Principles and Applications

Unformatted text preview:

De clawing Carnivore CS588 Cryptology Prof David Evans Dante Guanlao Michael Tashbook Leonard Woody Dana Wortman December 5 2001 1 INTRODUCTION 2 2 PROBLEM 3 2 1 TECHNICAL ASPECTS OF CARNIVORE 3 2 2 LEGAL ASPECTS OF CARNIVORE 6 2 2 1 Introduction 6 2 2 2 A brief history of wiretapping and United States judicial system 6 2 2 3 Procedural Issues Regarding Wiretapping 7 2 2 4 Recent Developments 8 3 RELATED WORK 11 4 SOLUTION 14 4 1 STRATEGIES FOR AVOIDING CARNIVORE 14 4 1 1 PGP 14 4 1 2 Nyms 14 4 1 3 Crowds 15 4 1 4 MIXes 15 4 1 5 Onion Routing 16 4 2 STRATEGIES FOR STRENGTHENING CARNIVORE 17 5 EVALUATION 20 5 1 5 2 EVALUATION OF STRATEGIES FOR AVOIDING CARNIVORE 20 EVALUATION OF STRATEGIES FOR STRENGTHENING CARNIVORE 21 6 CONCLUSION 22 7 BIBLIOGRAPHY 23 1 1 Introduction They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety Benjamin Franklin 1759 The heated debate over Carnivore and online surveillance is reaching a fervid pitch after the September 11th events Civil liberty groups claim that Carnivore s power is too farreaching and encroaches on basic constitutional freedoms while law enforcement agencies insist on needing more power to combat terrorism and crime This report seeks to explain the debate over Carnivore and offer solutions for those wishing to elude the system as well as those who wish to make Carnivore a more viable option The next sections detail Carnivore s technical implementation along with the legal context that surrounding it Our report also offers solutions in which Internet users can evade Carnivore or combat its potential abuse by FBI agents It is our hope that this information will be valuable to both sides of the debate as they struggle to find a balance between freedom and security 2 2 Problem 2 1 Technical Aspects of Carnivore Carnivore is a system of hardware and software combined to filter through internet traffic and find a designated target as outlined by a judge s written order The



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view De-clawing Carnivore and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view De-clawing Carnivore and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?