Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01 Reply-To: ee380@shasta.stanford.edu Stanford EE Computer Systems Colloquium 4:15PM, Wednesday, Mar 08, 2006 HP Auditorium, Gates Computer Science Building B01 http://ee380.stanford.edu[1] Topic: Signaling Vulnerabilities in Law-Enforcement Wiretap Systems Speaker: Matt Blaze University of Pennsylvania About the talk: Telephone wiretap and dialed number recording systems are used by law enforcement and national security agencies to collect investigative intelligence and legal evidence. This talk will show how many of these systems are vulnerable to simple, unilateral countermeasures that allow wiretap targets to prevent their call audio from being recorded and/or cause false or inaccurate dialed digits and call activity to be logged. The countermeasures exploit the unprotected in-band signals passed between the telephone network and the collection system and are effective against many of the wiretapping technologies currently used by US law enforcement, including at least some ``CALEA'' systems. Possible remedies and workarounds will be proposed, and the broader implications of the security properties of these systems will be discussed. A recent paper, as well as audio examples of several wiretapping countermeasures, can be found at http://www.crypto.com/papers/wiretapping/ [2]. This is joint work with Micah Sherr, Eric Cronin, and Sandy Clark. About the speaker: Research: Prof Blaze's research focuses on the architecture and design of secure systems based on cryptographic techniques, analysis of secure systems against practical attack models, and on finding new cryptographic primitives and techniques. This work has led directly to several new cryptographic concepts, including: "Remotely-Keyed Encryption," which allows the use of inexpensive, low-bandwidth secure hardware to protect high-bandwidth communication and stored data, "Atomic Proxy Cryptography," which allows re-encryption by untrusted third parties, and "Master-Key Encryption," which provides a systematic way to design (and study) ciphers with built-in "back doors." Prof Blaze is especially interested in the use of encryption to protect insecure systems such as the Internet. He was a designer of swIPe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. Another project, CFS, investigated and demonstrated the feasibility of including encryption as file system service. Contact information: Matt Blaze University of Pennsylvania http://www.crypto.com[4] Embedded Links: [ 1 ] http://ee380.stanford.edu [ 2 ] http://www.crypto.com/papers/wiretapping/ [ 3 ] www.crypto.com [ 4 ] http://www.crypto.com ------------------------------------- You are subscribed as eugen@leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]