1 / 16

communications

Designing. communications. systems for. interception. New communications technologies developed in 1980s and 1990s made access to the content of telephone calls more difficult for law enforcement agencies than it was before. Packet mode communication.

paki-estes
Download Presentation

communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Designing communications systems for interception

  2. New communications technologies developed in 1980s and 1990s made access to the content of telephone calls more difficult for law enforcement agencies than it was before. • Packet mode communication

  3. The problems with CALEA and other programs to intercept communicatios, according to critics, include threats to privacy and civil liberties, the potential for abuse by government, and side effects that threaten the security of communication systems CALEA – government program to intercept communicatios

  4. The Federal Comunications Comission (FCC) has the job of witing the actual rules and requirements to implement CALEA. With some exceptions and revisions, court accepted many of the rules the government requested. Rules..

  5. Supporters of CALEA argue that wiretaps are essential for catching and/or convicting dangerous criminals.

  6. Secret intelligece gathering P. 123-124

  7. The national security agency • The NSA collects & analyzes foreign intelligence info related to national security, it also protects communications & info related with the goverment of the U.S. and the communication with other countries. Some method s of the NSA are forbidden by a law of the USA, but they still use it . • The NSA uses the most powerful computer avaible ( newsweek estimated that it had nearly half of the computing power in the world) • The NSAhas generated controversy by secretly violating restrictions surveillance of people in the US.

  8. Violations of the NSA • 20’s • Pressured the telegram companies to let the goverment routinely view foreign cables. (this violated the federal Radio Comunication Act of 1912, which made it illegal for a cable cmpany employee to divulge a message without a court order to anyone) • 60’s to 70’s • By monitoring communications of specific American citizens • 70’s • Senator Church found NSA collecting international telegrams since the 50’s. as a result: the Foreign Intelligence Surveillance ACT (FISA) established oversight rules for the NSA

  9. Secret access and communication records. The secret programs were made for intercept terrorist actions and protect the United States. In 2005, the newspapers publish several secrets programs to collect, study and investigate terrorist communication and financing. The NSA made a database of telephones and e-mails of millions of americans, without the approval from the FISA court to obtain these records. These records where from the telephone company, AT&T. Designing communication systems for interception.

  10. Secret access and communication records. The action of AT&T was ilegal, so several groups filed suits against it for violating privacy policies and the communications privacy lawby assisting the NSA in intercepting millions of people. the goverment said that the objective of intercepting calls was only to analyse calls patterns, not to collect information. The program was canceled because it was a big intrusion on privacy. The impact that this program had was huge, and a lot of people dont know anymore if they can trust companies like these one, the people dont feel safe anymore. Designing communication systems for interception.

  11. Encryption Policy • For decades, most of the cryptographers in the U.S. worked for the NSA. The NSA almost certainly could break virtually any codes that were in use before the mid-1970s. The NSA exerted much effort to keeping everything about encryption secret. The private-sector breakthrough development of public-key cryptography produced encryption that was relatively easy to use and very difficult to crack. • Throughout the 1990’s when people began using encryption or e-mail and other purposes, the U.S. government battled the Internet community and privacy advocates to restrict the availability of secure encryption. It maintained a costly and ultimately futile policy of prohibiting export of powerful encryption software; as one consequence of this, encryption products produced by the U.S. companies for export were less competitive than those of foreign companies that used better encryption techniques. • In 1996, a panel of experts from business, government, and academia prepared a study of encryption policy for the National Research Council (NCR), in which they supported the use of encryption and loosening for export control, it argued that strong encryption provides increased protection against hackers, thieves, and terrorists who threaten our economic, electric power, and transportation infrastructures. The government ignored this report. • The U.S. policy was strangely outdated. The stronger encryption schemes were available on Internet sites all over the world. The U.S. products were widely available.

  12. In 2000 the U.S. government removed almost all export restrictions on encryption; some people speculated that the NSA might have been able to decrypt messages fast enough to scan encrypted traffic and read most of the communications it wants to read. • Concurrently with the ban on export of strong encryption in the 1990`s, the government attempted to ensure its access to encryption keys for encryption used within the United States. Pedophiles and child molesters encrypt child pornography and information about victims on their computers. Other criminals encrypt e-mail and files to hide their contents form law enforcement agents. • The FBI argued that authority to intercept telephones calls or e-mail or seize computers meant nothing if agents could not read the contests of the messages and files they seized. • In 1997 the following statement appeared in b bill under consideration in Congress: After January 31, 2000, all encryption products manufactured or imported for s sale or use in the United States must include features that permit immediate decryption of the encrypted data upon the receipt of a valid court order. • The bill did not pass. Immediately after the terrorist attacks in 2001, support revived for a law requiring that all encryption have a “back door” for law enforcement. • The PATRIOT Act did not include a “back door” to all encryption for law enforcement.

  13. Chapter 2 Privacy Section 2.5 Communications *WARTIME METHODS-BANNING FLOWER ARRANGEMENTS *PRETTY GOOD PRIVACY

  14. WARTIME METHODS-BANNING FLOWER ARRANGEMENTS • This text box explains how during war time, goverments used to be aware of their enemies. Goverments had precautions with everything, like songs, kids drawings,crossword puzzles, moves in a game chess played by email, orders of flowers that specified particular types of flower. Everything was suspicios, because they thought they could have secret codes from their enemies.

  15. PRETTY GOOD PRIVACY • PGP is a computer program that provides cryptographic privacy and authentication.PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications • It was developed by Philip Zimmermann in the 1990s. • PGP was widely distributed on the Internet and became the most popular programm for e-mail encryption around the world.

More Related