Re: IBM Uses Keystroke-monitoring ing NJ Mob Case (was Re:

2000-12-12 Thread Anonymous Remailer

Ken Brown [EMAIL PROTECTED] wrote:

 In every office or factory I've ever been in, including government ones
 where we kept paper copies of tax returns (yes folks, I have worked for
 the Inland Revenue) there are cleaners. They seem to come in 3 kinds -
 middle-aged black women, African students working their way through
 college, and people with vaguely asiatic features who sound as if they
 are speaking Portuguese. 

The latter would probably be Phillipinos.




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-10 Thread R. A. Hettinga

At 2:06 PM -0800 on 12/10/00, petro wrote:


 RAH whinged

...and in error. My apologies.

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-08 Thread Ken Brown

Petro wrote:

  R. A. Hettinga wrote:
[...]
 As I've written, the FBI should run quality house cleaning services
 in large cities.
 
 How do you know they don't?

In every office or factory I've ever been in, including government ones
where we kept paper copies of tax returns (yes folks, I have worked for
the Inland Revenue) there are cleaners. They seem to come in 3 kinds -
middle-aged black women, African students working their way through
college, and people with vaguely asiatic features who sound as if they
are speaking Portuguese. (Sometimes you get a few white students working
their way through college but they are more likely to get jobs in bars)

If I wanted to hire spies or assassins, I'd go for the middle-aged black
women. Preferably short and dumpy and shabbily dressed.  Someone who
looks like a granny. They can go anywhere, no-one ever stops them or
asks them who they are. An invisible woman to match Chesterton's
Invisible Man.

Ken




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-07 Thread petro

At 05:31 PM 12/5/00 -0500, R. A. Hettinga wrote:

An instructive case.  Apparently they used the keystroke monitoring
to obtain the pgp passphrase, which was then used to decrypt the files.

A PDA would have been harder to hack, one imagines.

Are there padlockable metal cases for PDAs?

As I've written, the FBI should run quality house cleaning services
in large cities.

How do you know they don't?
-- 
A quote from Petro's Archives:
**
"Despite almost every experience I've ever had with federal 
authority, I keep imagining its competence."
John Perry Barlow




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-07 Thread petro

Mr. May:
Frankly, the PGP community veered off the track toward crapola about 
standards, escrow, etc., instead of concentrating on the core 
issues. PGP as text is a solved problem. The rest of the story is to 
ensure that pass phrases and keys are not black-bagged.

Forget fancy GUIs, forget standards...concentrate on the real threat model.

What is the real threat model?

Everybody has different worries. I'm not a bookie, I don't do 
work for the mob, I don't spend more than I earn. My biggest threat 
is (1) financial (stolen credit card numbers, or other form of 
credential fraud) (2) Political--that comments here and other places 
get me the list of "People To Take Care Of Later".

The first threat can be dealt with by "cheap" crypto deployed 
everywhere--to co-opt one of RAH's phrases--a "Geodesicly  encrypted 
network. In a network where every single stinking bit on the wire is 
encrypted at as many layers as possible, even with "10 cent" crypto 
will virtually eliminate (by making it more expensive) many of the 
low level financial threats. Yes, big banks and large financial 
institutions need stronger crypto, but they can multiple-encrypt, 
write their own protocols etc.).

The second threat would be made much harder by the encrypt 
everything all the time type of network, if I weren't so thick headed 
as to insist on using my Real Name. This is presumably what the "PGP 
Community" veered off towards. Unfortunately, they've done a 
half-assed job so far.


-- 
A quote from Petro's Archives:
**
"Despite almost every experience I've ever had with federal 
authority, I keep imagining its competence."
John Perry Barlow




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-06 Thread John Young

From reading the docs at EPIC, it is not clear that the FBI actually
got data from the planted device. The USA application dated June 8 
asks for a supplemental order of extension of time in order to break 
in and remove the device. This need was caused by Scarfo's unexpected
removal of the equipment.

We have not been presented with the initial USA application and the
initial order, at least not that I've seen.

Interesting possibilities are:

1. The FBI is bluffing that it got incriminating data and is using the
applications and orders as window dressing or camouflage to
hide their failure. Or to hide that they got evidence some other
way.

2. The FBI captured some stuff but is faking the rest.

3. Scarfo discovered the device, or suspected it, and removed the 
equipment in order to sanitize it, or even planted his own device 
aimed at the feds. Say he rigged a program to endlessly type "fuck you,"
Or played Bin Laden's taunts. He's a fair comp whiz so all sorts of
good stuff may have happened.

4. If Scarfo got the device, by now defenses against it have been
deployed, maybe even generated a tidy black market for those who
want to snoop and/or snarl the feds by redirecting their own devices.





Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-05 Thread R. A. Hettinga

At 2:37 PM -0500 on 12/5/00, Steven M. Bellovin wrote:


 Very interesting, but what does IBM have to do with the case?  Did you
 mean to type "FBI"?

Absolutely.

God knows why I did it...

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-05 Thread Tim May


(dcsb and cryptography and other closed lists removed, for obvious reasons)


At 4:52 PM -0500 12/5/00, R. A. Hettinga wrote:

Date: Tue, 05 Dec 2000 08:47:20 -0800
From: Somebody
To: "R. A. Hettinga" [EMAIL PROTECTED]
Subject: Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:
BNA'sInternet
  Law News (ILN) - 12/5/00)

An instructive case.  Apparently they used the keystroke monitoring
to obtain the pgp passphrase, which was then used to decrypt the files.

The legal fight over whether the monitor was legal and whether the
information so obtained are in fact records of criminal activity is a
side-show.  It remains practical evidence of how insecure computer
equipment / OS's and pass-phrase based identity authentication combine to
reduce the effective security of a system.


I fully support this comment that the whole issue of "legality"  is a 
"side show."


We've known that keyboard sniffers were a major issue for many years. 
I remember describing the sniffers ("keystroke recorders") which were 
widely available for Macs in the early 90s. Others cited such 
recorders for Windows and Unices.

We discussed at early CP meetings the issue, with various proposed 
solutions. (For example, pass phrases stored in rings, pendants, 
Newtons, Pilots. For example, zero knowledge approaches. For example, 
reliance on laptops always in physical possession.)

Frankly, the PGP community veered off the track toward crapola about 
standards, escrow, etc., instead of concentrating on the core issues. 
PGP as text is a solved problem. The rest of the story is to ensure 
that pass phrases and keys are not black-bagged.

Forget fancy GUIs, forget standards...concentrate on the real threat model.

--Tim May
-- 
(This .sig file has not been significantly changed since 1992. As the
election debacle unfolds, it is time to prepare a new one. Stay tuned.)




Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA's Internet Law News (ILN) - 12/5/00)

2000-12-05 Thread Declan McCullagh

On Tue, Dec 05, 2000 at 09:04:03AM -0500, R. A. Hettinga wrote:
  KEYSTROKE MONITORING AND THE SOPRANOS
  A federal gambling case against the son of a New Jersey mob
  boss may provide the courts with the opportunity to weigh in

A copy of the indictment is here:
http://www.cluebot.com/article.pl?sid=00/12/06/0138246

Nicodemo S. Scarfo, the defendant in this case, is the son of the
former head of the Philadelphia-Atlantic City mob (who has been in
jail himself since 1991); Nicodemo is currently out on bail and
awaiting trial. His attorney was going to file a pretrial motion on
the crypto issue, but was replaced today  (conflict of interest rules)
with a new attorney, with whom I have not yet spoken.

So if you don't like this kind of FBI black bag job, you'll want to
root for Mr. Scarfo. :)

-Declan

PS: Some background on FBI black bag jobs and crypto:
  http://www.wired.com/news/print/0,1294,33779,00.html





Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-05 Thread Greg Broiles

On Tue, Dec 05, 2000 at 05:16:03PM -0800, Tim May wrote:
 The legal fight over whether the monitor was legal and whether the
 information so obtained are in fact records of criminal activity is a
 side-show.  It remains practical evidence of how insecure computer
 equipment / OS's and pass-phrase based identity authentication combine to
 reduce the effective security of a system.
 
 
 I fully support this comment that the whole issue of "legality"  is a 
 "side show."

Exactly - not every attacker represents law enforcement, and not every
law enforcement attack is performed with the intention of creating
admissible evidence. The US' exclusionary rule is the exception, not
the rule, worldwide - most courts take more or less whatever evidence
they can get. And thugs and goons and spies of many flavors don't
give a shit about even pretending to cover their tracks when they're
not following the rules.

--
Greg Broiles [EMAIL PROTECTED]
PO Box 897
Oakland CA 94604