Horseman #3, cont'd...

2001-12-17 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
Date: Sun, 16 Dec 2001 20:35:36 -0800
To: Declan McCullagh [EMAIL PROTECTED], [EMAIL PROTECTED]
From: John Young [EMAIL PROTECTED]
Subject: Re: Terrifying PGP
Sender: [EMAIL PROTECTED]

Sure, and the URLs still work. The first URL opens the story and
the PGP doc is mentioned at the jump at the 2nd URL:

http://semanal.expresso.pt/primeira/artigos/interior.asp?edicao=1520id_arti
go=ES45175

http://semanal.expresso.pt/internacional/artigos/interior.asp?edicao=1520id
_artigo=ES45132

Here's Babelfish translation of the passage:

  To the side of some techniques of combat, apparently
  rudimentary, were possible to find a manual on one of
  the techniques of criptagem of more advanced electrsnicas
  communications of the world, Pretty Good Privacy (PGP).
  This method, practically considered inviolable, was forbidden
  by the Congress them United States for distrust that could
  be used to hide activities terrorist.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re[2]: Russian Duma Adopts Law On Digital Signatures

2001-12-17 Thread Maksim Otstavnov

Hello Pawel,

Monday, December 17, 2001, 1:45:02 PM, you wrote:

PK Interesting how laws are passed in the part of world, as Polish digital
PK signature law was also passed with lots of private businesses being
PK done in both Parliament and Senate, against advice of the expert
PK comission created by the Parliament itself (sic!)  and agains the EU
PK recommendations. So we have the law enacted, but everyone is expecting
PK that to be changed soon to become usable, and definitely to make it
PK compliant with EU law.

Are there any translation/comments in English?

Cheers,
-- 
-- Maksim





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: [DailyRotten] FBI requests worm-built password log

2001-12-17 Thread Will Rodger

  Jay D. Dyson writes::
On Mon, 17 Dec 2001, Gordon Mohr wrote:

  http://www.dailyrotten.com/articles/archive/189387.html
 
  I can see legitimate reasons for wanting the log: tracing the
  progression/origin of the worm, or notifying the victims.
 
  But the interplay with MagicLantern and PatriotAct issues is
  thought-provoking...

 Actually, this is nothing new.  The boys at the Bureau have a long
history of requesting data to which they have no genuine legal right of
access.  Their original requests -- with few exceptions -- bank on
ignorance of due process.


Why is anyone surprised law enforcement would want this data? In order to 
investigate the crime in the first place, law enforcement needs to know 
what the crackers stole.

One may not like the standards for access (warrant, certification, 
administrative subpoena, etc.) but it's difficult to argue the FBI lacks a 
legitimate purpose for this data. I also see no evidence that any laws are 
being broken here. So what's the gripe? The Patriot Act went too far? 
That's old news at this point.

Given the detail (and named sources) missing from the story, it looks like 
nothing so much an account of a standard, legitimate inquiry from law 
enforcement.

Will Rodger







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: [DailyRotten] FBI requests worm-built password log

2001-12-17 Thread Steven M. Bellovin

In message Pine.GSO.3.96.1011217132546.27456B-10@crypto, Jay D. Dyson w
rites:
On Mon, 17 Dec 2001, Will Rodger wrote:

   But the interplay with MagicLantern and PatriotAct issues is
   thought-provoking...
 
  Actually, this is nothing new.  The boys at the Bureau have a long
  history of requesting data to which they have no genuine legal right
  of access.  Their original requests -- with few exceptions -- bank on
  ignorance of due process.
 
 Why is anyone surprised law enforcement would want this data? In order
 to investigate the crime in the first place, law enforcement needs to
 know what the crackers stole. 

   I guess you can consider me puzzled as to this claim.  The FBI
isn't interested in what was stolen.  The forensic analyses of the worm's
functions will tell you in a generic sense the answer to that question. 
What the boys at the Bureau want is the lump sum of victims' stolen
information.

   To use an analogy[1], if a neighborhood burglar makes off with my
videocamera, all the LEAs and their LEOs need to know is the description
and serial number of the product so it can be identified as mine.  They
don't need to know the contents of the tape in the videocamera in order to
demonstrate that criminal action occurred in the taking of said camera. 

Well, recovered stolen property is generally considered evidence.  
Looking at that file provides evidence that the worm *did* steal 
passwords, and not just that it was capable of doing so according to 
some complex analysis.  (For many worms, there is often considerable 
uncertainly about exactly what they can and cannot do.  Besides, do you 
want to try to explain decompiling to a jury?)

Perhaps more on target, possession of those passwords does *not*, as 
far as I can tell, change the FBI's legal ability to, for example, read 
someone's email.  They'd still need a court order under your favorite 
statute.  At most, I suspect that they could use information in that 
file as evidence of improper possession of a password by one of the 
worm's victims.  Not good if you're the improper possessor -- but also 
not an extension of the FBI's abilities or authority.  

The implication of the original claim was that the FBI wanted these 
passwords so that they could surreptiously read email without bothering 
with Magic Lantern or Carnivore.  Maybe -- but doing so without 
authorization is just as illegal with passwords as via a tailored 
Trojan horse.  (Well, maybe the latter would constitute a violation of 
18 USC 1030, the Computer Fraud and Abuse Act.  I think the former 
would, too, plus it would violate 18 USC 1029:  use of a counterfeit 
access device.)

The only thing these passwords would do is make the entry easier.

--Steve Bellovin, http://www.research.att.com/~smb
Full text of Firewalls book now at http://www.wilyhacker.com





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]