[CSL Colloq] Signaling Vulnerabilities in Law-Enforcement

allison at stanford.edu allison at stanford.edu
Thu Mar 2 11:05:59 PST 2006


Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01
Reply-To: ee380 at shasta.stanford.edu


             Stanford EE Computer Systems Colloquium

                 4:15PM, Wednesday, Mar 08, 2006
        HP Auditorium, Gates Computer Science Building B01
                   http://ee380.stanford.edu[1]

Topic:   Signaling Vulnerabilities in Law-Enforcement Wiretap Systems

Speaker: Matt Blaze
         University of Pennsylvania

About the talk:

Telephone wiretap and dialed number recording systems are used by
law enforcement and national security agencies to collect
investigative intelligence and legal evidence. This talk will
show how many of these systems are vulnerable to simple,
unilateral countermeasures that allow wiretap targets to prevent
their call audio from being recorded and/or cause false or
inaccurate dialed digits and call activity to be logged. The
countermeasures exploit the unprotected in-band signals passed
between the telephone network and the collection system and are
effective against many of the wiretapping technologies currently
used by US law enforcement, including at least some ``CALEA''
systems. Possible remedies and workarounds will be proposed, and
the broader implications of the security properties of these
systems will be discussed.

A recent paper, as well as audio examples of several wiretapping
countermeasures, can be found at
http://www.crypto.com/papers/wiretapping/ [2].

This is joint work with Micah Sherr, Eric Cronin, and Sandy
Clark.

About the speaker:

Research: Prof Blaze's research focuses on the architecture and
design of secure systems based on cryptographic techniques,
analysis of secure systems against practical attack models, and
on finding new cryptographic primitives and techniques. This work
has led directly to several new cryptographic concepts,
including: "Remotely-Keyed Encryption," which allows the use of
inexpensive, low-bandwidth secure hardware to protect
high-bandwidth communication and stored data, "Atomic Proxy
Cryptography," which allows re-encryption by untrusted third
parties, and "Master-Key Encryption," which provides a systematic
way to design (and study) ciphers with built-in "back doors."

Prof Blaze is especially interested in the use of encryption to
protect insecure systems such as the Internet. He was a designer
of swIPe, a predecessor of the now standard IPSEC protocol for
protecting Internet traffic. Another project, CFS, investigated
and demonstrated the feasibility of including encryption as file
system service.

Contact information:

Matt Blaze
University of Pennsylvania
http://www.crypto.com[4]


Embedded Links:
[ 1 ]    http://ee380.stanford.edu
[ 2 ]    http://www.crypto.com/papers/wiretapping/
[ 3 ]    www.crypto.com
[ 4 ]    http://www.crypto.com


-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]





More information about the cypherpunks-legacy mailing list