Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.

Similar presentations


Presentation on theme: "CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes."— Presentation transcript:

1 CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes

2 CS 4001Mary Jean Harrold2 Outline ŸOverview of the Controversies ŸIntercepting Communications ŸCryptography and Its Uses ŸEncryption Policy: Access to Software, Keys, and Plaintext ŸFundamental Issues

3 CS 4001Mary Jean Harrold3 Overview of Controversies ŸCommunications’ privacy is affected by what?

4 CS 4001Mary Jean Harrold4 Q: Can law enforcement intercept communications without a court order? Intercepting Communications (1) ŸWiretapping ŸWhat is history of restrictions on telephones?

5 CS 4001Mary Jean Harrold5 Intercepting Communications (2) ŸWiretapping ŸHow have laws changed with new technologies and events? Q : Does the USA Patriot Act supersede ECPAs restrictions?

6 CS 4001Mary Jean Harrold6 Intercepting Communications (3) ŸDesigning Communications Systems for Interception and Tracking ŸWhat is CALEA? ŸWhat obstacles is it designed to overcome? Ÿ Why did privacy advocates object to CALEA? ŸCALEA allows for the interception of PINs. Do you support this use?

7 CS 4001Mary Jean Harrold7 Intercepting Communications (4) ŸCarnivore ŸWhat is Carnivore? ŸWhy do proponents say it’s needed? ŸWhy do opponents say it violates rights? ŸDoes Carnivore violate the 4 th Amendment? ŸWhat is the current status of Carnivore?

8 CS 4001Mary Jean Harrold8 Q : Should the NSA be permitted to intercept all e-mail entering and leaving the U.S.? Intercepting Communications (5) ŸNSA and Echelon ŸNSA (National Security Agency): ŸCollects and analyzes communications to find threats to national security. ŸEchelon: ŸWhat is it?

9 CS 4001Mary Jean Harrold9 Q: Are there other ways to hide a message in plain sight? Cryptography and Its Uses (1) ŸCryptography ŸDefinition: ŸHiding data in plain sight. ŸTerms: ŸPlaintext: Original, readable message or data. ŸCyphertext: Modified, unreadable message or data. ŸEncryption: The act of converting plaintext into cyphertext. ŸDecryption: The act of reverting cyphertext back to readable, plaintext.

10 CS 4001Mary Jean Harrold10 Cryptography and Its Uses (2) ŸPublic Key Cryptography ŸHow does it work? ŸWhat are the benefits? ŸHow does key-size affect the “strength” of encryption?

11 CS 4001Mary Jean Harrold11 Q : Why are strong encryption tools needed by human- rights activists? Cryptography and Its Uses (3) ŸEncryption ŸUsed by: ŸMilitary personnel. ŸFinancial institutions. ŸHuman-rights activists. ŸGovernment agencies. ŸAnyone wanting to keep messages or data private.

12 CS 4001Mary Jean Harrold12 Cryptography and Its Uses (4) ŸSteganography ŸDefinition: ŸHiding data so that its existence is not known. ŸExamples: ŸDigital watermarks. ŸHiding text in image files. ŸUsed by: ŸMilitary, ŸPublishers, ŸAnyone wishing to hide messages or data. Q : How might steganography be incorporated into textbooks? Why?

13 CS 4001Mary Jean Harrold13 Encryption Policy: Access to Software, Keys, and Plaintext (1) ŸSecrecy and Export Controls ŸControl of Secrecy ŸThe NSA designs unbreakable codes for the U.S. government. ŸThe NSA attempts to break codes used by other governments. ŸIn the past, the NSA also controlled the funding for and publishing of cryptographic research. ŸControl of Exportation ŸEarly U.S. policy prevented the exportation of strong encryption. ŸMeanwhile, foreign production and use of strong encryption negatively impacted U.S. competition in the world market. ŸCryptographic researchers, privacy advocates, and others successfully challenged exportation restrictions. Q : Why did the U.S. government insist on controlling export of strong crypto?

14 CS 4001Mary Jean Harrold14 Fundamental Issues (1) ŸRole of Secrecy ŸU.S. Policy Keeps Secret: ŸCryptographic research. ŸWiretap ease or difficulty. ŸEncryption algorithms. ŸSoftware (e.g. Carnivore). ŸGlobal endeavors (e.g. Echelon). ŸProblems: ŸSecret algorithms cannot be tested by experts. Ÿ‘Backdoors’ might exist. ŸNSA-influenced wiretap and encryption exportation bills Q : What factors affect the strength of an encryption algorithm?

15 CS 4001Mary Jean Harrold15 Q: Today, do coders or decoders have the upper hand? Fundamental Issues (2) ŸThe Ever-changing Status Quo ŸPast: ŸSimple codes and cyphers. ŸPresent: Ÿ512-bit RSA encryption. ŸAES (Advanced Encryption Standard). ŸFuture: ŸQuantum computing. ŸQuantum cryptography.

16 CS 4001Mary Jean Harrold16 Fundamental Issues (3) ŸTrust in Government ŸAppropriate or Abusive? ŸWiretapping by FBI and local police. ŸWiretapping by NSA. ŸStrong encryption restrictions. ŸClipper Chip and Key Escrow. ŸRoving wiretaps. ŸCell-phone tracking (and E-911). ŸKey logger systems. ŸDevelopment of a nationwide standard for surveillance. ŸImmediate decryption technology built in to the Internet.


Download ppt "CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes."

Similar presentations


Ads by Google