-Caveat Lector- 07.24.01 The Walls Have Ears http://www.sierratimes.com/archive/files/jul/24/arex072401.htm A Sierra Times Exclusive by Emily X When Phil Zimmerman published PGP, "Pretty Good Privacy", ten years ago, Internet users were numbered in the hundreds of thousands, the World Wide Web was a glimmer in Tim Berners-Lee's eye, and the term "spam" had not yet been invented. But surveillance of the internet�as well as most other forms of electronic communication�was already well established in 1991. Echelon �the result of a joint agreement between the US, Great Britain, New Zealand, Australia, and Canada�had already been in operation for at least ten years. It was a sweet deal: US government agencies were not permitted to do wholesale surveillance on their own citizens' communications, and governments of other "free" countries often had similar prohibitions. The answer: spy on each others' citizens, not one's own, then trade the information. As the Internet has been growing, so has the scale of the surveillance. It's common knowledge among some employees of AT&T�the initial provider of all communications lines in the US, and many overseas lines� as well as the Baby Bells, that there is wholesale interception and scanning of internet traffic going through the major nodes in the US. One of the nodes, known as MAE-WEST, is located in California's San Francisco Bay Area. It's a prime location for listening, as one telephone company employee explained: "One third of all of the Internet traffic in the world goes through California." It makes sense, when one stops to think about it. A large number of the dot-coms and computer industry companies are located in California. One of the other major nodes is conveniently located close to both AOL and NSA headquarters in Virginia: MAE-EAST. Like MAE-WEST, a huge amount of traffic goes through this node. So how much is intercepted? Nobody knows for sure, but various sources within the communications and cryptography communities believe that it's between 20 and 60% of all traffic. That's a lot of traffic. What's to fear? That's way too much for an army of humans to check. The solution is to use computers to scan the traffic, looking for anything that might warrant further (human) attention. Advances in natural language recognition, coupled with massive amounts of processing power concentrated in "farms" means that it's ever more possible to pull out just the kinds of communication that's of interest for review by a human. It makes for great surveillance efficiency, but it's lousy for personal privacy. As if that weren't bad enough, the FBI, apparently miffed that the NSA and the Echelon partners weren't sharing enough data with them, have come up with their own "sniffing" system. Originally named Carnivore (and renamed to the innocuous DCS 1000), Carnivore not only looks at all packets going to and from a particular user, but looks at tens or hundreds of thousands of other users' packets as well. The FBI tried to get reputable computer scientists to verify that Carnivore did not promiscuously spy on all data going in and out of a server used by one particular person. They had to dig pretty deep to find a relatively obscure group to do so. The group reported that the version of Carnivore that they examined did work as the FBI claimed, and that it threw away packets of all users who were not under surveillance. But, they noted, "While the system was designed to, and can, perform fine-tuned searches, it is also capable of broad sweeps. Incorrectly configured, Carnivore can record any traffic it monitors�. While operational procedures or practices appear sound, Carnivore does not provide protections, especially audit functions, commensurate with the level of the risks." As if Echelon and Carnivore weren't bad enough, a number of European governments�many of which loudly protested Echelon spying on their traffic�are now laying the groundwork to implement their own Internet surveillance systems. Security Through Mathematics The Carnivore reviewers pointed out that one of the limitations of Carnivore was that it "can be countered with simple, public-domain encryption." But what they see as a limitation, privacy and free-speech advocates see as a control on government capability to snoop on every facet of electronic communication. First, some basics. A good encryption program has the following characteristics: It is controlled by the person using the program. It resides on that person's computer, not a server, and does not depend on any other person or entity to concur in its operation. Thus, services like Zixmail are undesirable because encryption takes place on the Zixmail server, making it a fat target. On the other hand, a service like Hushmail downloads a Java applet to the browser to allow all encryption to take place on the user's computer. It uses algorithms that are well-known and heavily tested in the cryptography community. Some of the best-tested (and strongest) algorithms are 3DES, RSA, Diffie-Hellman, RC5 (128 bit), CAST, IDEA, Blowfish, and soon, Rijndael. The author of an encryption program is willing to publish the source code to the program so that it can be examined for leaks, errors, and back doors. It's always a bad idea to trust one's privacy to a program whose authors say "Trust us." There's actually quite a number of different programs that fulfill these requirements. PGP is simply the most used and by far the best-tested of the lot. Unless the prospective encryption user has the capability to evaluate other products�a rare talent, indeed�then it's best to stick with PGP. PGP is available for free at the International PGP web site. In various versions, it's available for the Amiga, Atari, BeOS, EPOC (Psion etc.), MacOS, MS-DOS, Newton, OS/2, PalmOS, Unix and its variants, Windows 2000, Windows 3.x, Windows 95/98/NT, and Windows ME. Also at the International PGP web site, there are numerous manuals, how-to guides, and even mailing lists to learn how to install and fully use the program. The next question that never fails to come up is: "How secure is PGP anyway?" Sometimes this is followed by "I heard that 'they' can break it." To answer that will require a little arithmetic. At the center of its encryption algorithms, PGP uses a technique known as "128-bit symmetric encryption." This means that to break the encryption on a PGP message by trying out all possible combinations, an average of about 170,141,183,460,469, 231, 731,687,303,710,000,000,000 tries will be needed. Let's assume that one's opponent has all the computing power that money can buy and all the time in the world to crack the message. By today's standards, it'll take over five quintillion years to crack that message. (Emphasis mine. Editor) Barring some miracle in factoring, most cryptography experts don't believe that the algorithm contained in PGP can realistically be broken. The fact that a single individual can control the privacy of his communications against a much larger opponent is referred to as "Security through Mathematics." Wise Use PGP can put a lot of power back into the hands of an individual, but it cannot save the stupid from themselves. If, for instance, a person writes down their "secret" passphrase on a yellow stickie and attaches it to a computer monitor, PGP isn't going to provide much protection. There's a number of common-sense measures that anyone can and should take listed in the resources below. It's a good idea to learn to use PGP before it's really needed. This means getting other people to use PGP for even the most casual of communication. Encrypt jokes and recipes with it. Get in the habit of using it, so that when it's necessary to protect such weighty communications as business information or political speech, it has become second nature. As always, it's best to remember Benjamin Franklin's maxim: "Three people can keep a secret, if two of them are dead." While PGP can protect one's communications in transit from surveillance, it cannot guarantee that the recipient is trustworthy and will keep the message a secret. If unsure about somebody's reliability, keep quiet! Resources PGP is available from the International PGP web site. Before setting up PGP, reading the PGP Passphrase FAQ is a very good idea. The definitive book on Echelon is Secret Power by Nicky Hager. This book is very hard to find in the US, but is available from its New Zealand publisher, Craig Potten. An excellent array of information on both Echelon and Carnivore is at Cryptome. This is probably the best resource in the world for factual information on surveillance activities. <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance�not soap-boxing�please! These are sordid matters and 'conspiracy theory'�with its many half-truths, mis- directions and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
