Impact of Computers on Society 3. Encryption and Interception of Communication.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
USA PATRIOT ACT USA PATRIOT ACT
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Presidential War Powers After September 11, 2001.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Encryption Export Controls in the US Preliminary Research.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
9/4/20151 Computer Security Social Legal and Ethical issues.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Chapter 18 - The Fourth Amendment and National Security.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Encryption, continued Public Key encryption and Digital Signatures.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
National Security Agency (NSA) Surveillance Christopher Boyd.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Evolutionary Powers of the Presidency Not mentioned in the Constitution… 1.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Wiretapping and Encryption
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Laws Governing Police Surveillance
Computer Security Social Legal and Ethical issues
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Right to Privacy vs. National Security
Presentation transcript:

Impact of Computers on Society 3. Encryption and Interception of Communication

It Could Never Happen…  Secret FBI papers revealed that John Lennon was ruled out as a communist threat because he was always stoned, London’s Evening Standard reported yesterday.

Never…  Documents show that the FBI suspected that the ex- Beatle was the head of revolutionaries planning to hijack a 1972 Republican conference, and kept him under close watch at first. But Lennon’s abuse of heroin, cocaine and marijuana in the early 1970s eventually ruled him out of FBI investigations. An agent concluded that Lennon “appears to be radically oriented” but “does not give the impression he is a true revolutionist, since he is constantly under the influence of narcotics.”

You Must Be Kidding!  Marilyn Monroe  Lucille Ball  And Albert Einstein… ...were among the suspected communists tracked by the FBI from the 1950s to 1970s.  Washington Post, September 23, 2005, p. C3 Washington Post, September 23, 2005, p. C3

Background  Different levels of message and information security How secure is the postal service? How secure is ? How secure are financial transactions?

Three Main Issues  Whom do you trust?  How powerful is technology? Technology is a “moving target”  How open should communications be?

A Brief History of Wiretapping 1928 – Supreme Court rules that… wiretapping is not unconstitutional wiretapping can be banned by Congress 1934 – Congress passes the Federal Communications Act illegal to wiretap no exception for law enforcement

More about Wiretapping  1937 – Supreme Court stands behind the ban on wiretapping FBI did it anyway lax enforcement of anti-wiretapping laws continuing debate for many years

Wiretapping Allowed  1967 – Supreme Court rules that intercepting phone conversations without a court order violates 4 th Amendment (2007 – NSA gathers data without warrants)  1968 – Congress explicitly allows wiretapping with court order intended to help fight organized crime  USA PATRIOT Act of 2001 loosens restrictions further

Milestones in Interception  The Internet changes the playing field no longer wiretapping now, interception of communications includes broadcast communications what about fiber optics? what about monitoring of RF emissions?

Lawful Interception  1994 – CALEA (Communications Assistance for Law Enforcement Act) requires equipment to be designed to allow interception.  1999 – FBI’s Carnivore interception system required a court order limited to a particular ISP what about the of other subscribers to that ISP? can’t the ISP do this without having to physically hook up FBI computers to its own? program terminated in 2005; now using commercially available software superseded by DCS-3000 systemDCS-3000

Echelon  1998 – NSA’s Echelon. Not supposed to be targeted at US citizens NSA denies its existence Major computing power Examines RF emissions, including cell phones, etc. Supposedly sifts through international traffic Sifts through business and other traffic, not just military and law enforcement Aside: the US Embassy in Moscow and Dr. Theramin

Echelon criticisms The line is blurred on US citizens when national security is claimed or when they are abroad What about our allies – Canada, Britain, Australia, NZ? Going “deaf” because of the rise of fiber optic transmission rather than satellite  Major question is how much privacy should we be expected to give up in order to (maybe) catch the bad guys?

FISA  Foreign Intelligence Surveillance Act (1978)  Without a warrant… President can request surveillance without a warrant through the AG for up to one year Limited to foreign intelligence only Electronic surveillance  With a warrant… Requires warrant from a secret court Both physical and electronic searches Only five requests for warrants have been denied since 1979

Protect America Act (PAA)  A 2007 revision of FISA  Adds terrorists to the list of possible targets for monitoring  Allows for massive collection of international telecom data without court order or oversight  Disagreement over retroactive protection for telecom companies  Expired on February 17, 2008 when House did not renew  But…

FISA of 1978 Amendments Act of 2008  Signed into law on August 5, 2008  Extended for 5 years, September 2012 Extended for 5 years  Protects telecoms from “past or future” lawsuits for cooperation with warrantless federal surveillance  Removes requirements for detailed description of what is being sought  Requires (secret) FISA court permission to eavesdrop on Americans who are overseas

Recommended Reading  James Bamford Puzzle Palace: a report on America’s most secret agency (1982) Body of Secrets: anatomy of the ultra-secret National Security Administration: from the Cold War through the dawn of a new century (2001)  Leo Marks Between Silk and Cyanide: a codemaker’s war (1998)

Two Main Computer Defenses  Packet transmission messages are less vulnerable en route interception is most effective at the end points  Encryption Requires a key, which must be passed secretly Only one unbreakable code: the one-time key

Public Key Encryption  A known, published algorithm RSA (Rivest, Shamir, Adelman) uses two large prime numbers for keys Each party has two keys, a private key and a public key One pair of keys to encrypt, the other pair to decrypt Brute force attacks are essentially useless unless you have massive computing power Quantum computing may change this situation Longer keys make the encryption stronger Problem of delivering the keys

More Encryption The problem of computational overhead Most of us use encryption for financial transactions on the Internet 40-bit versus 128 or 256 bit encryption, and more  Remember that anything broadcast or transmitted can be intercepted  The bad guys can use encryption, too

A Few Uses of Encryption  Communications, both phone and data  Credit card numbers  Other financial data, for example brokerage transactions  Electronic Funds Transfer (EFT)  Passwords, usernames, account numbers on the Internet  Digital Signatures – did the message really come from that person?

Steganography  Concealing the fact that a message even exists  Hidden in a picture – a digital watermark  Hidden within a document – for example, a computer printed postage stamp  An image could conceal harmful code which will execute on the recipient’s computer  A message or virus could be concealed in almost anything that is digital

Attempts to Control Encryption Technology  1990’s – Government attempts to restrict export of encryption technology  1991 – Philip Zimmerman and PGP (Pretty Good Privacy)  “Restricted” browsers and other software  1993 – Daniel Bernstein’s 1 st Amendment lawsuit  1996 – Courts decide in Bernstein’s favor

Why?  The genie was already out of the bottle  To protect the NSA …the main goal of the export rules was to restrict encryption to what the NSA could routinely crack in “real time,” that is as messages are scanned. …to prevent adoption of standard cryptography systems. Standards would encourage more use of encryption and make it harder for the NSA to distinguish the messages it wants to read.

Why?? …export rules required that companies that wanted to export encryption systems had to disclose the details of their products to the government, ensuring that the NSA had full knowledge of the technologies in use. Diffie & Landau, summarized by Baase, p. 119

End of Restrictions  2000 – The government at last gives up the attempt to impose import restrictions on encryption.  Officially, the genie is out of the bottle…

Encryption Control in the US  1993 – the Clipper Chip Used an unpublished, secret NSA algorithm Designed for telephones, also used on computers Various key escrow proposals. The government wanted a third party escrow agent. Government and law enforcement would need a court order to get the key BUT – the escrow agent would be a government agency A failure before it got off the ground There is no provision for a “back door” in the USA PATRIOT Act.

And In Conclusion…  Remember that the goal of encryption is to make the difficulty of reading a message not worth the effort.  Technology is progressing very rapidly  To what extent do you trust government and law enforcement to uphold the 1 st and 4 th Amendments?

One Certain Defense  Although it may be impossible to protect against unwarranted surveillance, at least your mind can be spared.  Wear a tin foil hat! Wear a tin foil hat!