Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Security & Encryption Thomas Fenske & Joseph Minter.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for.
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
INTERNET and CODE OF CONDUCT
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
4th Amendment.
+ Protecting Individual Liberties Section 1 Chapter 14.
9/4/20151 Computer Security Social Legal and Ethical issues.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Cryptography, Authentication and Digital Signatures
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
Impact of Computers on Society 3. Encryption and Interception of Communication.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Understanding the Constitution
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Privacy and the Law.
Courts System Search Warrants.
Limiting the Right of Search
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Intercepting Communications
Wiretapping and Encryption
Forensics Week 7.
PowerPoint® Slides to Accompany
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
The Surveillance State
Computer Security Social Legal and Ethical issues
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
How does this Constitutional amendment protect Americans?
The Right to Privacy vs. National Security
Presentation transcript:

Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3

Cryptography Cryptography is the making and breaking of secret codes. Or, “the art and science of hiding data in plain sight.” The purpose of cryptography is to ensure that only the intended entity is able to make use of the given data or message. When you ‘Encrypt’ data, you render it useless to anyone who is not in possession of the key and the method used to encrypt it.

Non-Encrypted VS Encrypted Non-Encrypted (Plain text) –Can be intercepted and read. –Can be altered. –Unsafe! Encrypted (Cipher text) –Although it can be intercepted. It cannot always be read. –Cannot be altered. –Mostly safe.

Traditional Encryption Relies on a single key to encrypt AND decrypt the data. Good for communications among a small group of people over a short distance. Very inconvenient and unsafe when used to communicate with many people over large distances. If the key is compromised, then you are no longer secure.

Public Key Encryption A user (Alice) has a set of two keys. –A Public Key –A Private Key The Public key is given out to someone (Bob) who wants to securely communicate with the user. The Private Key is to remain only with its owner. To communicate with Alice, Bob uses Alice’s public key to encrypt the message. The message can only be decrypted with Alice’s private key.

Steganography Hiding a message (or data) so that its existence is not known. Hiding a message (or data) inside another message (or data) that is not likely to arouse suspicion. Safe if only the recipient knows where to look. Hidden message can be encrypted for added security.

Why Encrypt Data? To protect you personal data. To protect your business data. To protect the other party. To ensure that the message is not altered. Because you have a right to do so. –Use it or loose it.

Is your Data Secure?

Encryption Tools Pretty Good Privacy (PGP) : Public Key Encryption system – – –FireGPG – Firefox plug-in that allows one to encrypt/decrypt Gmail messages using PGP –Enigmail – Mozilla Thunderbird plug-in that allows you encrypt/decrypt messages using PGP TrueCrypt – Encrypt data stored on your hard drive. –

Before 1934 The Telephone –Intercepting calls was not illegal –Neighborhoods would often share lines. Only one home could call at a time. Anyone in the neighborhood could intercept simply by picking up their phone. –In order to call someone, you had to go through an operator. The operator connected you to the person you were trying to call. Since operators were the “Gatekeepers” they had the ability to intercept any call.

The Law and Communications 1934 : Congress passes the Federal Communications Act This outlaws wiretapping, provides no exception for law enforcement. However, many enforcement entities ignore this. Although it was known that law enforcement engaged in wiretapping, nothing was done about it. Evidence obtained though illegal wiretapping could not be used in court.

The Law and Communications 1968 : Congress passes the Omnibus Crime Control and Safe Streets Act It permitted law enforcement agencies to intercept telephone conversations when authorized by a court order. Its proponents argued it as necessary tool to combat organized crime.

The Law and Communications 1986 : Congress passes the Electronic Communications Privacy Act (ECPA) The ECPA and its 1994 amendments, required law enforcement agencies to obtain a court order in order to legally intercept , wireless phones (cordless and cellular), and pagers. The restrictions placed by this law were designed to protect the privacy of individuals and businesses. Prior to this act, eavesdropping was a popular form of industrial espionage.

The Law and Communications 1994 : Congress passed the Communications Assistance for Law Enforcement Act (CALEA) This law required that communications equipment be designed (existing equipment had to be modified) in a way which would allow law enforcement agencies to easily intercept communications. Since CALEA required that existing equipment be replaced or modified, it authorized $500,000,000 in subsidies for service providers so that they would modify or replace existing equipment.

The Law and Communications 2001 : Congress passes the The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT Act) The Patriot Act loosened the wiretapping restrictions set by the ECPA of It also allowed law enforcement agents to gain “Pen- Register/Trap-Trace” information of internet communications without a court order. ( headers, usage logs, credit card numbers)

Carnivore Carnivore is the FBI’s system for intercepting . Although the FBI originally named it Carnivore, it is now formally known as DCS1000 Carnivore required ISPs to install hardware and software that would sift through users s. The FBI’s argument in favor of Carnivore was that they needed an equivalent system of intercepting for what they already had with telephone calls.

Echelon Echelon is an NSA project in which they cooperate with other nations to intercept foreign communications. The NSA cooperates with intelligence agencies from Britain, Canada, Australia, and New Zealand. Originally designed to spy on the Soviet Union and its allies. Echelon gathers information by picking off satellite and radio signals. Undersea fiber optic cables are also tapped.

Secrecy and Export Controls In an attempt to prevent criminals and unfriendly regimes from obtaining strong encryption algorithms, the NSA discouraged independent researches from working on cryptography. Prior to the year 2000, it was considered illegal to export ‘strong’ encryption algorithms. –Legal to export in ‘paper format’, but not electronically. These restrictions made US encryption and security products inferior to those developed oversees. Prior to 2000, many browsers only included 40-bit SSL keys because of these export restrictions.

The Clipper Chip In 1992 AT&T wanted to sell telephones that would allow individuals to encrypt their conversations. The NSA did not like this and prevented it from happening. Instead they suggested an alternative. The NSA’s alternative was an encryption chip they had developed for use on phones. Copies of keys for the Clipper Chip, would be kept by a third party (an escrow agent). The escrow agent, would then reveal the key to a law enforcement agency if provided with a court order.

Issues of Debate How much can we trust the government not to abuse its power? How much privacy should we be expected to give up in exchange for protection from the “bad guys”? By sifting through through all s that pass through its severs, does Carnivore violate the 4 th amendment?

The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.