A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Chapter 17 Law and Terrorism.
Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Chapter 17 Controls and Security Measures
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Encryption Export Controls in the US Preliminary Research.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
9/4/20151 Computer Security Social Legal and Ethical issues.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Cryptography, Authentication and Digital Signatures
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter 3 Encryption Algorithms & Systems (Part D)
Impact of Computers on Society 3. Encryption and Interception of Communication.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSCI-235 Micro-Computers in Science Privacy & Security.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.
A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
COEN 350 Network Security Introduction.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Wiretapping and Encryption
PowerPoint® Slides to Accompany
Encryption, Cryptography, and Steganography:
Security through Encryption
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
Presentation transcript:

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the Internet (2nd Edition) by Sara Baase San Diego State University PowerPoint slides created by Sherry Clark Copyright 2003 Prentice Hall

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications2 A Gift of Fire Encryption and Interception of Communications Overview of the Controversies Intercepting Communications Cryptography and Its Uses Encryption Policy: Access to Software, Keys, and Plaintext Fundamental Issues

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications3 Overview of the Controversies Communications Privacy Affected by: Interception of communications, including:  Telephone, , and Web activity. Restrictions on secure encryption.  Exportation of strong encryption was viewed as a threat to national security. CALEA (Communications Assistance for Law Enforcement Act.  Communications technology must assist law enforcement, not hinder. Global surveillance systems.  The constitutionality of domestic systems and the necessity of international systems are under question.

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications4 Intercepting Communications Wiretapping Telephone:  Pre-1934: used widely by government, businesses, and private sector.  1934: the Federal Communications Act disallowed unauthorized wiretaps; many ignored the law.  1968: the Omnibus Crime Control and Safe Streets Act restricted wiretapping by requiring a court order. Q : Can law enforcement intercept communications without a court order?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications5 Intercepting Communications Wiretapping New Technologies:  1986: Electronic Communications Privacy Act (ECPA) and its amendments restricted government interception of , cell-phones, etc..  2001: USA Patriot Act loosened restrictions on government wiretapping and communications interception. Q : Does the USA Patriot Act supersede ECPAs restrictions?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications6 Intercepting Communications Designing Communications Systems for Interception and Tracking Obstacles to interception:  Incomplete pen-registers as a result of long distance service.  Packet-mode communications ( , file transfers, Internet phones). Solutions:  CALEA: Requires telecommunications equipment be designed to ensure interception by law enforcement (with court order). Q : Why did privacy advocates object to CALEA?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications7 Intercepting Communications Designing Communications Systems for Interception and Tracking (cont’d) CALEA  Costs include modified hardware, software, and overuse by authorities.  Wiretappable systems vulnerable to criminal hacking, industrial spies, etc..  Competition weakened due to restricted changes and diversities.  Civil liberties threatened by nationwide standard for surveillance. Q : CALEA allows for the interception of PINs. Do you support this use?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications8 Intercepting Communications Carnivore FBI’s system to intercept with a court order.  Pro: Law enforcement needs this tool to fight crime.  Con: All goes through FBI’s Carnivore system. Q : Does Carnivore violate the 4 th Amendment?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications9 Intercepting Communications NSA and Echelon NSA (National Security Agency):  Collects and analyzes communications to find threats to national security. Echelon:  Member nations intercept communications for each other. Q : Should the NSA be permitted to intercept all entering and leaving the U.S.?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications10 Cryptography and Its Uses Cryptography Definition:  Hiding data in plain sight. Terms:  Plaintext: Original, readable message or data.  Cyphertext: Modified, unreadable message or data.  Encryption: The act of converting plaintext into cyphertext.  Decryption: The act of reverting cyphertext back to readable, plaintext. Q : Are there other ways to hide a message in plain sight?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications11 Cryptography and Its Uses Public Key Cryptography How it works:  User creates a mathematically-related key pair (public and private keys).  Public keys are shared publicly; private keys are kept secret.  Public keys are used to encrypt message or data.  Private keys are used to decrypt message or data. Benefits:  No secret keys need be shared or transmitted.  Very secure. Q : How does key-size affect the ‘strength’ of encryption?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications12 Cryptography and Its Uses Encryption Used by:  Military personnel.  Financial institutions.  Human-rights activists.  Government agencies.  Anyone wanting to keep messages or data private. Q : Why are strong encryption tools needed by human-rights activists?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications13 Cryptography and Its Uses Steganography Definition:  Hiding data so that its existence is not known. Examples:  Digital watermarks.  Hiding text in image files. Used by:  Military,  Publishers,  Anyone wishing to hide messages or data. Q : How might steganography be incorporated into textbooks? Why?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications14 Encryption Policy: Access to Software, Keys, and Plaintext Secrecy and Export Controls Control of Secrecy  The NSA designs unbreakable codes for the U.S. government.  The NSA attempts to break codes used by other governments.  In the past, the NSA also controlled the funding for and publishing of cryptographic research. Control of Exportation  Early U.S. policy prevented the exportation of strong encryption.  Meanwhile, foreign production and use of strong encryption negatively impacted U.S. competition in the world market.  Cryptographic researchers, privacy advocates, and others successfully challenged exportation restrictions. Q : Why did the U.S. government insist on controlling export of strong crypto?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications15 Encryption Policy: Access to Software, Keys, and Plaintext Domestic Encryption Key Escrow  Third-party entrusted with non-public encryption keys. Real-time Access to Plaintext  Immediate decryption of encrypted data.  Long-time goal of the FBI. Key Recovery  The ability to recover encrypted files if necessary.  Used by some businesses. Q : Should key recovery systems be voluntary or compulsory?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications16 Fundamental Issues Role of Secrecy U.S. Policy Keeps Secret:  Cryptographic research.  Wiretap ease or difficulty.  Encryption algorithms.  Software (e.g. Carnivore).  Global endeavors (e.g. Echelon). Problems:  Secret algorithms cannot be tested by experts.  ‘Backdoors’ might exist.  NSA-influenced wiretap and encryption exportation bills. Q : What factors affect the strength of an encryption algorithm?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications17 Fundamental Issues The Ever-changing Status Quo Past:  Simple codes and cyphers. For centuries people couldn’t break simple codes which we see as trivial today. Eventually people found a way to break these codes. Present:  512-bit RSA encryption. These encryptions are now being threatened and so longer keys are being used. Future:  Quantum computing. This technique could threaten the secure codes of today.  Quantum cryptography. This technique might lead to unbreakable codes.  AES (Advanced Encryption Standard). Q : Today, do coders or decoders have the upper hand?

A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications18 Fundamental Issues Trust in Government Appropriate or Abusive?  Wiretapping by FBI and local police.  Wiretapping by NSA.  Strong encryption restrictions.  Clipper Chip and Key Escrow.  Roving wiretaps: tapping telephones used near a target individual without having to get authorization for the specific phones.  Cell-phone tracking (and E-911): without a court order.  Key logger systems: secretly installing key logger systems on targets and obtaining info. without a court order.  Development of a nationwide standard for surveillance: Should there be one, or should we use the best tech. available at this time?  Immediate decryption technology built in to the Internet.