Re: DEA says drug smugglers used crypto Net but cops got around

1999-10-30 Thread Per Kangru

On Fri, 29 Oct 1999, Bjørn Remseth wrote:

 it
 Reply-To:
 In-Reply-To: [EMAIL PROTECTED]; from John Gilmore on Fri, Oct
 29, 199
 Organization: Yes Interactive AS
 
  Years of work in standards committees and years of technical work can
  all go for naught, when those responsible for operating the service are
  untrustworthy.  End-to-end encryption is your friend; it needs to get
  designed into some cellphones.
 
 The Norwegian defense forces has designed a GSM phone with end-to-end
 encryption.  It uses the proprietary NSK chip and the secret NSK algorithm,
 and will not be available for the general public, only for the generals and
 their friends :)  
 
 The design looks sound enough though, and the phone also looks nice (the
 producer is the Swedish company "Sectra": http://www.sectra.se/).

Are you realy sure that it was designed by the Norwegian defense forces?
The Swedish military has aswell bought the phone (before the Norwegians)
and to the best of my knowledge Sectra has been doing the construction
much of their own (with alot of discussions etc with the military.)

/Per

---
Per Kangru, physics student at Uppsala University, part time worker at
Idonex AB. All opinons are mine and does not necessarily have any
influence over the opinons of Idonex AB or Uppsala University.
---
private email: [EMAIL PROTECTED]   Phone, home: +46-(0)18-509363
work email: [EMAIL PROTECTED]Phone, mobile +46-(0)707-545556 
school email: [EMAIL PROTECTED]  Phone, work +46-(0)8-6198505
Private web page at http://kangru.org
-Support free speech online ---




Re: DEA says drug smugglers used crypto Net but cops got around

1999-10-30 Thread Bjørn Remseth

On Sat, Oct 30, 1999 at 10:12:21AM +0200, Per Kangru wrote:

 Are you realy sure that it was designed by the Norwegian defense forces?
 The Swedish military has aswell bought the phone (before the Norwegians)
 and to the best of my knowledge Sectra has been doing the construction
 much of their own (with alot of discussions etc with the military.)

The crypto core is based on the NSK chip, which is a Norwegian design. You
are probably right in your assessment that most of the phone itself is
Sectra's own design.

(Rmz)



Re: DEA says drug smugglers used crypto Net but cops got around

1999-10-29 Thread Bjørn Remseth

it
Reply-To:
In-Reply-To: [EMAIL PROTECTED]; from John Gilmore on Fri, Oct
29, 199
Organization: Yes Interactive AS

 Years of work in standards committees and years of technical work can
 all go for naught, when those responsible for operating the service are
 untrustworthy.  End-to-end encryption is your friend; it needs to get
 designed into some cellphones.

The Norwegian defense forces has designed a GSM phone with end-to-end
encryption.  It uses the proprietary NSK chip and the secret NSK algorithm,
and will not be available for the general public, only for the generals and
their friends :)  

The design looks sound enough though, and the phone also looks nice (the
producer is the Swedish company "Sectra": http://www.sectra.se/).

(Rmz)



Re: DEA says drug smugglers used crypto Net but cops got around it

1999-10-26 Thread Bill Stewart

At 08:21 AM 10/25/1999 -0400, Marcus J. Ranum wrote:
including use of the Internet, encrypted telephones, and cloned cellular
telephones

They don't say what "encrypted telephones" mean, either. Remember,
these are the same guys who try to tell people that spread spectrum
is "encryption" or at least "secure."

Remember that GSM phones and US digital cellphones support encryption.
All broken, of course, but it _is_ encryption.
In some countries the PTT turns off GSM encryption or forces use of A5/2.  
In the US, the different cellphone standards support different crypto,
and some cell companies or cell sites don't use it.


I'll bet $100 to a $1 that if there was a way to find out, we'd
find out that the "encrypted telephones" in use in the case in
question were not "encryption" as most of the members of this
list understand it. Is there enough information in Mr. Marshall's
description to be able to associate the FUD with a case and then
find out what kind of evidence they present?

Thanks! 
Bill
Bill Stewart, [EMAIL PROTECTED]
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639



Re: DEA says drug smugglers used crypto Net but cops got around it

1999-10-25 Thread Marcus J. Ranum

including use of the Internet, encrypted telephones, and cloned cellular
telephones

They don't say what "encrypted telephones" mean, either. Remember,
these are the same guys who try to tell people that spread spectrum
is "encryption" or at least "secure."

I'll bet $100 to a $1 that if there was a way to find out, we'd
find out that the "encrypted telephones" in use in the case in
question were not "encryption" as most of the members of this
list understand it. Is there enough information in Mr. Marshall's
description to be able to associate the FUD with a case and then
find out what kind of evidence they present?

mjr.
--
Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
work - http://www.nfr.net
home - http://www.clark.net/pub/mjr



Re: DEA says drug smugglers used crypto Net but cops got around it

1999-10-24 Thread Arnold G. Reinhold

At 10:49 AM -0400 10/22/99, Declan McCullagh wrote:
...

...

PRESS CONFERENCE
WITH U.S. ATTORNEY GENERAL JANET RENO
COLOMBIAN AMBASSADOR ALBERTO MORENO

SUBJECT: ARREST OF COLOMBIAN DRUG TRAFFICKERS
IN OPERATION MILLENNIUM
THE DEPARTMENT OF JUSTICE
WASHINGTON, D.C.
OCTOBER 13, 1999, WEDNESDAY

Acting Administrator Donnie Marshall of the Drug Enforcement Administration

...

In this case, the defendants used very sophisticated communications equipment,
including use of the Internet, encrypted telephones, and cloned cellular
telephones, in what was a vain attempt to avoid detection.  But in the end, it
was these very devices which led to the devastating evidence against them.
Through the use of judicial wiretaps and intercepts in both Colombia and in
the
United States, their communications were intercepted and recorded, thus
producing evidence which comes straight from the defendants' own mouths.

I have long doubted the very premise that encrypted communications 
are a asset to criminals and a threat to law enforcement. The 
standard way LE penetrates criminal organizations is to work from the 
bottom.  Someone at the retail level is caught and pressured to 
cooperate. He implicates a superior, and so on.

Remember that encrypted messages from the superior to the cooperating 
underling are sent using the underling's private key.  Providing that 
key to LE is in many ways less risky to the underling than other 
forms of cooperation. The key need only be provided once and then the 
is no need for further meeting with agents. Only a few people in LE 
need to know where the key comes, reducing the risk of leaks and 
making them easier to trace..

Once they have that key, LE gets both an ongoing clear stream of 
communications and evidence that is much more damming in court than 
the traditional hard to hear and obscurely worded wire tap recording. 
And if encryption get criminals to communicate more, it could be a 
boon to law enforcement.


Arnold Reinhold



Re: DEA says drug smugglers used crypto Net but cops got around it

1999-10-24 Thread Tim May

At 3:33 AM -0700 1999-10-24, Arnold G. Reinhold wrote:

I have long doubted the very premise that encrypted communications
are a asset to criminals and a threat to law enforcement. The
standard way LE penetrates criminal organizations is to work from the
bottom.  Someone at the retail level is caught and pressured to
cooperate. He implicates a superior, and so on.

Remember that encrypted messages from the superior to the cooperating
underling are sent using the underling's private key.  Providing that
key to LE is in many ways less risky to the underling than other
forms of cooperation. The key need only be provided once and then the
is no need for further meeting with agents. Only a few people in LE
need to know where the key comes, reducing the risk of leaks and
making them easier to trace..

Once they have that key, LE gets both an ongoing clear stream of
communications and evidence that is much more damming in court than
the traditional hard to hear and obscurely worded wire tap recording.
And if encryption get criminals to communicate more, it could be a
boon to law enforcement.

Damning in court?

How can provenance (origin, history) of the damning message be proved?

If Alice and Bob communicate with PK and remailers, as will be expected,
how can anything be proved? Sure, if "Pablo Escobar" publishes his public
key and signs his messages to "Joe Underling," this may be damning in a
court trial.

But this scenario is unlikely in the extreme.

Were I a felon, as I am, I'd surely take crypto and remailers over the
alternative of no crypto and no remailers.


--Tim May

Y2K: It's not the odds, it's the stakes.
-:-:-:-:-:-:-:
Timothy C. May  | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon" | black markets, collapse of governments.





Re: DEA says drug smugglers used crypto Net but cops got around it

1999-10-23 Thread Archer

I used to work for a guy who was an ex NSA man. He had his own company that
built crypto phones and sold them world wide. The Saudis bought them as well
as a few smaller countries. One time he had guy with " a South American
accent" call him to order some phones. He contacted the agency to see if
they had any problems They said no problem, send them on.

I later asked him why this was ok, since he believed he knew where they were
headed. He smiled and told me that he had given they keys to the protocol
that he had written (that the phones used) to the Agency some time before.

He has been out of the business for some time now. He sold these in the
early to mid 80s. So this is old news but it kind of opened my eyes.