Date: Tue, 17 Aug 93 16:37:17 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@PICA.ARMY.MIL Subject: Computer Privacy Digest V3#015 Computer Privacy Digest Tue, 17 Aug 93 Volume 3 : Issue: 015 Today's Topics: Moderator: Dennis G. Rears Re: Digital Cellular - was Re: First Person broadcast on privacy Re: Digital Cellular - was Re: First Person broadcast on privacy Re: Enhanced Driver's License Encryption policy Re: Encryption policy About 'Terminal Compression' The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@pica.army.mil and administrative requests to comp-privacy-request@pica.army.mil. Back issues are available via anonymous ftp on ftp.pica.army.mil [129.139.160.133]. ---------------------------------------------------------------------- Date: Fri, 13 Aug 93 17:19:43 EDT From: Brinton Cooper cc: comp-privacy@PICA.ARMY.MIL Subject: Re: Digital Cellular - was Re: First Person broadcast on privacy Organization: The US Army Research Laboratory Christopher Zguris <0004854540@mcimail.com> writes, in part: > Okay, so if you have a fully digital system without encryption using > spread-spectrum..., how long would it take your average person with a > scanner to tune around trying to follow the call? In the cordless phone application, the power spectral density would be so low (10 to 30 dB below the power of an equivalent CW carrier), that you signal would be undetectable beyond a very short distance. Further, spread spectrum comes in two flavors. In frequency hopping, the carrier changes a few hundred to a few thousand times per second; hence, it's quite impossible for someone with a scanner to follow the hop pattern manually. Further, if cryptographically safe hopping sequences are used, it's quite difficult even to automate the process of guessing the sequence. In "direct sequence" spread spectrum, you can think of the carrier as moving around continuously in the spectrum. Again, this is quite hard even to detect and much harder to "break" if the design is done at all wisely. > Or are the bulk of the eavesdroppers out there using > hacked cellular phones that would automatically follow the freq. shifts > to provide continuous coverage like the real phone? Cellular phones generally don't do spread spectrum, so hacking them is as much work (see above) as hacking any radio receiver to do the job. The previously quoted article mentions "spread spectrum cordless phones." The security of spread spectrum, plus the ability for many users to share a common chanel without interference makes spread spectrum a strongly viable option for cordless phones. Finally, as Christopher Zguris points out, digital cellular telephony offers the potential to encrypt the codes so that stealing them would do no good. _Brint ------------------------------ From: Phil Karn Subject: Re: Digital Cellular - was Re: First Person broadcast on privacy Organization: Qualcomm, Inc Date: Sun, 15 Aug 1993 06:17:21 GMT In article , 0004854540@mcimail.com (Christopher Zguris) writes: |> Okay, so if you have a fully digital system without encryption using |> spread-spectrum (by spread-spectrum I assume you mean frequencies are |> changed very often during the call), how long would it take your |> average person with a scanner to tune around trying to follow the call? |> It would seem like most of the time would be spent on tuning and little |> on listening! Or are the bulk of the eavesdroppers out there using |> hacked cellular phones that would automatically follow the freq. shifts |> to provide continuous coverage like the real phone? Actually, the particular form of spread spectrum we use is "direct sequence". You're thinking of "frequency hopping". Your standard AM/FM/SSB scanner will be useless in intercepting CDMA cellular, and in a year or so you won't be able to buy new scanners that cover the cellular band anyway. However, as you say, the trend is already toward modifying cell phones to act as scanners, so that stupid scanner law is pretty much irrelevant. There are some complications, however. To monitor a call in our system, you need to know the user's "private long code", which is an offset within a 2^41-1 bit PN spreading sequence that is computed at call setup time as a by-product of a one-way crypto hash function that is used for caller authentication. However, the spreading sequence is generated by a linear feedback shift register, and standard methods exist to crack these. There are also some properties of our system that could be used as "tricks" to simplify the process. It would take some hardware and some knowhow, though. I should mention that this applies only to the forward (cell to user) link. The reverse (user to cell) link uses a somewhat different modulation format (though it's still spread spectrum) that requires a different ASIC to demodulate. These chips won't be as readily available since they'll not be in every phone. Also, this link is tightly power controlled, so you are not likely to be able to gather enough energy unless you're very close to the person you're intercepting. By the way, unlike current analog systems where you only need listen to the forward link to hear both sides of the conversation fairly well, you would need to intercept both links in a CDMA system to hear both sides of the call. That's because we use digital echo cancellers at the MTSO to remove the reverse link audio from the forward link signal. This is necessary for good voice quality, since the round trip delay through the system (about 100ms in the production version) would otherwise make this "sidetone" most annoying to the user. Isn't one of the |> other benefits of the digital system the ability to eliminate cloning |> of ESN (it's ESN for a cellular right? so many abbreviations for serial |> numbers), if the ESN is protected than a hacked phone would be more |> difficult, or there'd be no benefit in eliminating fraud which is the |> cellular industrys' main goal with digital right? Yes, both the IS-54B (TDMA) and IS-95 (CDMA) systems will use the same mechanisms for authenticating users. Basically it involves a one-way hash function in a challenge-response protocol. Although the strength of the function is unknown (having not been published for meaningful cryptanalytic study) the basic scheme is reasonably sound. It is more cumbersome than it could have been had a public key cryptosystem been selected, though. These mechanisms do *not* require digital voice transmission to work. They could be applied to the current analog system, because it already uses digital control methods. However, there would be an obvious backward compatibility problem, so the carriers have decided to add the authentication features to the digital systems first (since the phones have not yet been deployed in large numbers). There will probably continue to be fraud on the analog systems as long as they're around, but eventually they'll go away when they are replaced with digital. Unfortunately, due to government pressure, there is no meaningful encryption of the actual voice data in either of the digital cellular formats. So it is probably only a matter of time before underground kits appear to decode all of the new digital cellular formats. C'est la vie. Phil ------------------------------ Date: Fri, 13 Aug 93 19:42 PDT From: John Higdon Organization: Green Hills and Cows Subject: Re: Enhanced Driver's License MP%MPA15C@mpa15ab.mv-oc.unisys.com writes: > Steve E. Kolodney, director of California's Office of Information > Technology describes how California is "transforming driver's licenses > into personal identification and authentication devices." > > "California licenses now look more like credit cards with magnetic > stripes as well as the owner's picture, Social Security number and > thumbprint. Kolodney said citizens can insert their enhanced licenses > into state kiosks to reserve recreational facilities and obtain state > information." Let us stop the folklore before it takes over as fact. While all of these items (picture, thumbprint, SSN) are on file with the DMV, only the picture actually appears on the license itself. The license number is a DMV-only number and the SSN does not appear on the card, nor does the thumbprint. The DMV makes a large point to tell license holders that the mag stripe does not contain any information that does not appear on the front of the card. Since neither the SSN nor thumbprint appear anywhere on the front, it would be assumed that they are not encoded into the stripe. All information that is kept on record is digitized, however. But the above would lead a reader to believe that showing a physical driver's license reveals information that it definitely does not. -- John Higdon | P. O. Box 7648 | +1 408 264 4115 | FAX: john@ati.com | San Jose, CA 95150 | 10288 0 700 FOR-A-MOO | +1 408 264 4407 ------------------------------ Date: Sat, 14 Aug 1993 18:59:35 -0400 (EDT) From: Paul Robinson Reply-To: "Tansin A. Darcos & Company" <0005066432@mcimail.com> Subject: Encryption policy "Leo J. Irakliotis" , writes: > Hope I'll get some responses here. Is encryption in email legal? If you are within the United States, the opinion of the NSA notwithstanding, the answer is Yes. And there are several packages available for it including PGP and RIPEM. Some other countries allow encryption and others do not permit it at all. > Is it legal for an electronic mailing list, or a usenet newsgroup > to operate using encryption? Well, unless everyone on the mailing list has decryption software of the same type as yours, it might be a little difficult for them to read the message! Built right into 'rn' and several other forms of torture which I laughingly refer to as usenet news readers, is the 'rot13' encryption feature which rotates each letter of the alphabet in a message forward by 13. This is used to post the endings to movies, or anything else where the story might be spoiled if you read it in advance. For example: A dog is rotated to: N qbt (The next letter after z is a). --- Paul Robinson - TDARCOS@MCIMAIL.COM ----- The following Automatic Fortune Cookie was selected only for this message: The life of a pious minister is visible rhetoric. -- Hooker ------------------------------ Date: Mon, 16 Aug 93 08:59:53 BST From: A.J.C.Blyth@newcastle.ac.uk Subject: Re: Encryption policy James R Ebright writes >In article irakliot@lance.colostate.edu >writes: >>Hope I'll get some responses here. Is encryption in email legal? >Yes. How could it be otherwise? As long as the headers exist and the >data is ascii characters, the net will pass it along. The net just passes characters along - so I see no reason why encryption would not work. The real question is what do the carriers think about such things.? >>Is it legal for an electronic mailing list, or a usenet newsgroup >>to operate using encryption? Well is ROT13 encryption.............................................??? >>If encryption is against the law, please site some references. >Encryption is illegal for ham radio in the US. Government agencies are >regulated as to the type of encryption they may use -- to make sure it is >good enough but not too good :) I believe cross border traffic in France >must be non-encrypted. Here in the UK electronic mail and news is carried via British Telecom. There is a law which says that for any encrypted data which is transmitted via a public carrier, the carrier must have the ability to decrypt it. Thus they all make you give them the master key. Andrew. __________________________________________________________________________ Andrew Blyth Department of Computer Science, | 20 Windsor Terrace, | Tel No. +44 91 222 8972 University of Newcastle Upon Tyne, | Fax No. +44 91 222 8788 Newcastle Upon Tyne, | England. | EMail. A.J.C.Blyth@newcastle.ac.uk NE1 7RU. | __________________________________________________________________________ ------------------------------ Date: Sun, 15 Aug 1993 03:29:55 -0400 (EDT) From: Paul Robinson Reply-To: "Tansin A. Darcos & Company" <0005066432@mcimail.com> Subject: About 'Terminal Compression' A company (Inter Pact) has run a number of advertisements on the Internet regarding their book 'Terminal Compression' which has been subsequently released in text form which can be downloaded via FTP, with the idea that if you read it you will send them a shareware donation. I probably would never have read the book if it hadn't been made available that way. The copyright slugs on the text indicate publication years of 1991-1993, seemingly indicating a recently issued book. (One of the items in the book is the mention of the new E-Mail address for the White House, which was only created this year.) The book has a number of holes in it which I could see through and I decided to comment. A shorter version of this message has gone to the Telecom Digest. The book deals with the combined issues of some of the dangers of technology and the threats to the privacy of individuals, I have therefore posted this review to both the Risks List and the Privacy List. I will mention one hole which is so obviously inaccurate as to be ridiculous: A government agency gets a court order telling the newspaper in the story, "The New York City Times" (note: not 'The New York Times' but the article makes clear that the paper on Sunday is '34 pounds') to not print any articles dealing with the ability to read CNG emissions (this is the leakage off a computer or monitor which can be read like a radio transmitter from a distance by electronic equipment.) A reporter writes an article from research, and an agency gets a prohibition not just against that article - which is a dubvious issue to get a prior restraint order against in the absence of use of government material, anyway - but that this court order is not to stop a particular article, but to completely prohibit any articles regarding that particular *subject*! I've never heard of a judge that would even consider issuing that type of order, (an appeals court would tear him to shreds) and this assumes the paper wouldn't (1) print the article anyway and risk a contempt citation (2) print a _blank_ article and a copy of the court order. Apparently this order was never publicized; any time a government agency tries to suppress publication of something in a newspaper it usually makes _national_ headlines; the press takes threats to the 1st Amendment *very* seriously. CNN's use of the Noriega Tapes comes to mind, and, of course, the Pentagon Papers and the A-Bomb schematics cases. Without intending to spoil the story, I wanted to point out that it mentions only AT&T as the national long distance carrier; a deafening silence exists about MCI and Sprint. Yet later in the book it mentions 'FTS-2000' the private network for government telephone calls that MCI has unsuccessfully been fighting ever since 1/2 went to AT&T and 1/2 went to Sprint, from the time of its creation. At a point in the book, it mentions that the National Security Agency (NSA) uses its massive computer arrays to monitor - in real time - every telephone call connection made in the U.S., e.g. every dial call from and to any point and the call being forwarded, and to where. This seems to forget that despite there being some 200+ service points (called LATAs in the trade) in the U.S. where every call has to go into or out of, not to mention the private cellular carriers, plus local call forwarding setups and call forwarding through PBXs. Plus private cellular companies, trunked mobile radiotelephone companies, ham radio patches... Even in the book it mentions that one of the calls made by some of the criminal elements in the book went to 'a Canadian Cellular Exchange'. I find it hard to believe that a Canadian telephone company is going to let a U.S. government agency inquire into its phone system without a court order issued by a Canadian judge. Is Pacific Bell goint to allow someone from the Canadian Department of Revenue or Scotland Yard have the list of who owns what non-listed number without a U.S. Court Order? I think not. (I'll skip over the possibility of bribery for now.) I find it a bit far fetched to believe that it is possible to put a 'pen register' on every telephone call made in the United States. If I call into General Electric's PBX in New York, or Northrop's in Los Angeles, is a call transferred out of it (one of perhaps 100 that go out at any minute) mine or someone else's? Also, in the story it notes that voice, fax or data transmissions are detected and that encrypted ones are 'red flagged'. This is a crock. Bits are bits; there is no way to tell based on the bit stream going through a data call whether the Zmodem Binary transfer I make is a ZIP archive, an EXE file, a binary data file, a Word Perfect file, or a binary file which has been processed with PGP or RIPEM. Bits are Bits; there is no means to differentiate between a compressed, encrypted transmission (such as a file processed with PGP) and a binary data file. It could be possible due to echo cancellers to tell if someone is using a data transmission device; whether a fax or modem detection is possible is another thing. And it also assumes someone doesn't switch to a non-standard method of data transmission such as combined voice and data on a compressed transmission channel. Or local calls to non-telephone networks such as Compuserve. Or private long distance companies that don't use Feature Group service, but simply buy commercial inward lines in some cities and lease dedicated trunk space. The virus issues are a little ridiculous too. Now a couple of years ago a man named William Harrison, I think, wrote a book called 'virus'. With the same basic idea: a series of rogue computer programs can be used to allow someone to commit crimes. Harrison's book was much better: I've had more than 12 years of computer experience as well as extensive use of MSDOS and there wasn't *a single* technical mistake in Harrison's book. The virus issues are rather silly. For one thing, unless someone is careless on large machines, you can't create viruses for VMS or IBM mainframes; they have fully operational supervisor state protection against runaway programs. It might be possible to damage some data in some files if you contaminated them, but in general the kind of virus problems that are reported on PCs because every program that runs on a PC runs with unlimited privelege. One of the viruses is mentioned that it fries the printer port and "causes smoke, then while the user checks that, damages the disk drive". Now, I know it's possible on very old Hercules cards to program them wrong and damage them, and some IDE drive cards have errors in them and miscommanding them could damage the card or the disk (due to errors in the design.) This one, however, is a little hard to believe. I have said it many times: the only reason that viruses can even exist is because the operating system does not use the memory and task protection hardware built into every Intel x86 processor higher than the 80186. A criminally negligent practice, I would say. A person I know claims there are bugs in the 80286 task protection hardware, which I find hard to believe. In any case, 80386 hardware contains working task protection capability. If viruses became so serious that it was necessary to worry about them, it would be not too dificult to release the equivalent of the IBM VM/370 operating system for PCs: at the 80386 level, everything runs in user-mode protection and does not have of I have said it many times: the only reason that viruses can even exist is because the operating system does not use the memory segmentation and task protection hardware built into every Intel x86 processor higher than the 80186. A person I know claims there are bugs in the 80286 task protection hardware, which I find hard to believe. In any case, 80386 hardware contains working task protection capability. If viruses became so serious that it was necessary to worry about them, it would be not too dificult to release the equivalent of the IBM VM/370 operating system for PCs: at the 80386 level, everything runs in user-mode protection and does not have kernel priveleges. It can refuse all disk I/O except from the ROM BIOS, any attempt to access any I/O ports is refused. Without that access - which requires privelege - a program cannot do damage and can't get access to the system. A user could well trust a program and allow it access to the screen ports. And the protection program could either allow certain access directly or trap access and emulate it. So there would be no means to get access to the disk drive hardware and no means to attach to other files. The hardware doesn't permit access without permission. If you don't want the story spoiled, do not read this paragraph. At the end of the story, a character responsible for some of the problem meets with the Director of the NSA and we find out that the attacks were intentional with the knowledge of the NSA Director, to cause the country to increase security on its computers. Then, after the director speaks to the person, he has him arrested. Now, it's one thing to 'burn' one of your own people, but nobody is stupid enough to put someone involved with a covert agency in a public trial where he can - as a legitimate defense - expose an agency's dirty laundry. The argument of 'National Security' won't wash in a criminal case; if the defense has evidence that will exonerate it, it is entitled to present it, and if the government requires it to be suppressed, the court will dismiss the criminal complaint. If the man was tried in a secret trial or a military court where it could be hushed up, that's one thing: but a public trial in open court in these type of circumstances is hard to believe. My sister is of the opinion that people don't notice technical errors in books, movies and TV shows. I do and I'm certain other people do, too. --- Paul Robinson - TDARCOS@MCIMAIL.COM ----- The following Automatic Fortune Cookie was selected only for this message: "*You* killed him? I thought he just died."- The Mechanic ------------------------------ End of Computer Privacy Digest V3 #015 ******************************