KHO THƯ VIỆN 🔎

Lawful hacking using exitsing vularibinities for wiretapping on the internet

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         70 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 













Nội dung chi tiết: Lawful hacking using exitsing vularibinities for wiretapping on the internet

Lawful hacking using exitsing vularibinities for wiretapping on the internet

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet dau*DRAFT -August 18,2013For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a

single pair of wires. By the 1990s, though, the changing structure of telecommunications—there was no longer just “Ma Bell" to talk to—and new technol Lawful hacking using exitsing vularibinities for wiretapping on the internet

ogies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice.

Lawful hacking using exitsing vularibinities for wiretapping on the internet

In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA)2, which mandated a standardized lawful intercept interface

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet online games, many forms of instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this "Going Dark":3 their loss

of access to suspects’ communication. According to news reports, they want changes to the wiretap laws to require a CALEA-llke interface in internet s Lawful hacking using exitsing vularibinities for wiretapping on the internet

oftware.4CALEA, though, has Its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the alr

Lawful hacking using exitsing vularibinities for wiretapping on the internet

eady-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to he

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet omeone used the built-in lawful Intercept mechanism to listen to the cell phone calls of high Greek officials, including the■- This paper was presente

d at the Privacy Legal Scholars Conference in June 2013: the authors have very much benefited from the discussion and comments made there. We would es Lawful hacking using exitsing vularibinities for wiretapping on the internet

pecially like to thank Deirdre Mulligan. Marty Stansell-Gamm. and Judge Stephen Smith, as well as Daniel Immerman.■ Steven M. Bellovin is a professor

Lawful hacking using exitsing vularibinities for wiretapping on the internet

of computer science at Columbia University.t Matt Blaze is an associate professor of computer science at the University of Pennsylvania.5Sandy Clark i

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet 9. codified at 47 use 1001-1010.3Valerie Caproni, General Counsel of the FBI. Statement Before the House Judiciary Committee. Subcommittee on Crime. T

errorism, and Homeland Security. February 17.2011, available at https://www.fbi.gov/news/testimony/going-dark-lawful-electronic-surveillance-in-the-fa Lawful hacking using exitsing vularibinities for wiretapping on the internet

ce-of-new-technologies4Declan McCullagh. “'Dark’ motive: FBI seeks signs of carrier roadblocks to surveillance", CNET News. Nov. 5, 2012, available at

Lawful hacking using exitsing vularibinities for wiretapping on the internet

http://news.cnet.com/8301-13578_3-57545353-38/dark-inotive-fbi-seeks-signs-of-carrier-roadblocks-to-surveillance/Electronic copy available at. https:

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet create very serious problems, including the security problems it's visited on the phone system.6In this paper, we explore the viability and implicatio

ns of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulner Lawful hacking using exitsing vularibinities for wiretapping on the internet

abilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as

Lawful hacking using exitsing vularibinities for wiretapping on the internet

centralized wiretapping capabilities become less viable.Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet the so-called "Crypto Wars" of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.)•Will law enforceme

nt’s participation in vulnerabilities purchasing skew the market?•Do local and even state law enforcement agencies have the technical sophistication t Lawful hacking using exitsing vularibinities for wiretapping on the internet

o develop and use exploits? If not, how should this be handled? A larger FBI role?•Should law enforcement even be participating In a market where many

Lawful hacking using exitsing vularibinities for wiretapping on the internet

of the sellers and other buyers are themselves criminals?•What happens if these tools are captured and repurposed by miscreants?•Should we sanction O

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful hacking using exitsing vularibinities for wiretapping on the internet how, though these Issues are indeed challenging we regard them as, on balance, preferable to adding more complexity and insecurity to online systems.5

Vassilis Prevelakis and Diomidis Spinellis. ‘The Athens Affair”, IEEE Spectrum 44:7. Inly 2007, pp. 26-33, available at http://spectriiui.ieee.oi-g/te Lawful hacking using exitsing vularibinities for wiretapping on the internet

leconi/secunty/the-athens-affan706Steven M. Bellovin, Matt Blaze, Sandy Clark, and Susan Landau, "Going Bright: Wiretapping without Weakening Communic

Lawful hacking using exitsing vularibinities for wiretapping on the internet

ations Infrastructure", IEEE Security & Privacy. Jan/Feb 2013.copy available at. https://ssm.com/abstract=2312107Lawful Hacking3I.Introduction........

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Lawful Hacking1Lawful Hacking:Using Existing Vulnerabilities for Wiretapping on the Internet1Steven M. Behovin', Matt Blaze*, Sandy Clarks, Susan Land

Gọi ngay
Chat zalo
Facebook