Interesting People mailing list archives
Stanford --Signaling Vulnerabilities in Law-Enforcement Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01
From: David Farber <dave () farber net>
Date: Thu, 2 Mar 2006 11:21:14 -0500
Begin forwarded message: From: allison () stanford edu Date: March 2, 2006 11:05:59 AM EST To: dave () farber netSubject: [CSL Colloq] Signaling Vulnerabilities in Law-Enforcement Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01
Reply-To: ee380 () shasta stanford edu Stanford EE Computer Systems Colloquium 4:15PM, Wednesday, Mar 08, 2006 HP Auditorium, Gates Computer Science Building B01 http://ee380.stanford.edu[1] Topic: Signaling Vulnerabilities in Law-Enforcement Wiretap Systems Speaker: Matt Blaze University of Pennsylvania About the talk: Telephone wiretap and dialed number recording systems are used by law enforcement and national security agencies to collect investigative intelligence and legal evidence. This talk will show how many of these systems are vulnerable to simple, unilateral countermeasures that allow wiretap targets to prevent their call audio from being recorded and/or cause false or inaccurate dialed digits and call activity to be logged. The countermeasures exploit the unprotected in-band signals passed between the telephone network and the collection system and are effective against many of the wiretapping technologies currently used by US law enforcement, including at least some ``CALEA'' systems. Possible remedies and workarounds will be proposed, and the broader implications of the security properties of these systems will be discussed. A recent paper, as well as audio examples of several wiretapping countermeasures, can be found at http://www.crypto.com/papers/wiretapping/ [2]. This is joint work with Micah Sherr, Eric Cronin, and Sandy Clark. About the speaker: Research: Prof Blaze's research focuses on the architecture and design of secure systems based on cryptographic techniques, analysis of secure systems against practical attack models, and on finding new cryptographic primitives and techniques. This work has led directly to several new cryptographic concepts, including: "Remotely-Keyed Encryption," which allows the use of inexpensive, low-bandwidth secure hardware to protect high-bandwidth communication and stored data, "Atomic Proxy Cryptography," which allows re-encryption by untrusted third parties, and "Master-Key Encryption," which provides a systematic way to design (and study) ciphers with built-in "back doors." Prof Blaze is especially interested in the use of encryption to protect insecure systems such as the Internet. He was a designer of swIPe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. Another project, CFS, investigated and demonstrated the feasibility of including encryption as file system service. Contact information: Matt Blaze University of Pennsylvania http://www.crypto.com[4] Embedded Links: [ 1 ] http://ee380.stanford.edu [ 2 ] http://www.crypto.com/papers/wiretapping/ [ 3 ] www.crypto.com [ 4 ] http://www.crypto.com ------------------------------------- You are subscribed as lists-ip () insecure org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/
Current thread:
- Stanford --Signaling Vulnerabilities in Law-Enforcement Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01 David Farber (Mar 02)