Lecture No. 24 Encryption and Interception of Communications
Lecture No. 24 Encryption and Interception of Communications
24
Encryption and Interception of
Communications
Intercepting Communications
Fundamental Issues
Wiretapping
Telephone:
• Pre-1934: used widely by government, businesses, and private sector.
• 1934: the Federal Communications Act disallowed unauthorized
wiretaps; many ignored the law.
• 1968: the Omnibus Crime Control and Safe Streets Act restricted
wiretapping by requiring a court order.
Wiretapping
New Technologies:
• 1986: Electronic Communications Privacy Act (ECPA) and its
amendments restricted government interception of e-mail, cell-phones,
etc..
• 2001: USA Patriot Act loosened restrictions on government wiretapping
and communications interception.
Carnivore
FBI’s system to intercept e-mail with a court order.
• Pro: Law enforcement needs this tool to fight crime.
• Con: All e-mail goes through FBI’s Carnivore system.
Cryptography
Definition:
• Hiding data in plain sight.
Terms:
• Plaintext: Original, readable message or data.
• Cyphertext: Modified, unreadable message or data.
• Encryption: The act of converting plaintext into cyphertext.
• Decryption: The act of reverting cyphertext back to readable, plaintext.
Encryption
Used by:
• Military personnel.
• Financial institutions.
• Human-rights activists.
• Government agencies.
• Anyone wanting to keep messages or data private.
Steganography
Definition:
• Hiding data so that its existence is not known.
Examples:
• Digital watermarks.
• Hiding text in image files.
Used by:
• Military,
• Publishers,
• Anyone wishing to hide messages or data.
Trust in Government
Appropriate or Abusive?
• Wiretapping by FBI and local police.
• Wiretapping by NSA.
• Strong encryption restrictions.
• Roving wiretaps.
• Cell-phone tracking (and E-911).
• Key logger systems.
• Development of a nationwide standard for surveillance.