Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Phone Taps Just Got Impossible
strategypage.com ^ | 4/12/06 | James Dunnigan

Posted on 04/12/2006 12:45:55 PM PDT by teddyruxpin

INTELLIGENCE OPERATIONS: Phone Taps Just Got Impossible

April 12, 2006: Eavesdropping on phone calls just got a lot harder. Phil Zimmermann, the guy who invented PGP encryption for Internet mail, has developed a similar product, Zfone, for VOIP (telephone calls over the Internet). Zfone, like PGP, is free and easy to use. PGP drove intelligence agencies nuts, because it gave criminals and terrorists access to industrial grade cryptography. PGP doesn't stop the police or intel people from reading encrypted email, but it does slow them down. Zfone, however, uses stronger encryption. This means more delays, perhaps fatal delays, in finding out what the bad guys are saying. There's no immediate solution for this problem, unless Phil Zimmermann has provided a back door in Zfone for the intel folks. That is unlikely, but at least possible.


TOPICS: News/Current Events; War on Terror
KEYWORDS: counterterrorism; encryption; pgp; voip; wiretaps; zfone
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-99 next last
To: teddyruxpin

"I'm confused, you seem to have not read the entirety of the very sentence you quote. Here, I'll highlight it: "Zfone, however, uses stronger encryption". "

No i read that part...it's stronger than something that causes delays. I'm still missing the part that makes decryption impossible. Perhaps you have other information you aren't sharing?


"Further, this has nothing to do with a warrant, clearly you don't understand encryption if you think a warrant will help."
And you apparently understand warrants. Wiretaps will still be more than possible. ZFone makes it harder (not impossible, or at least until you show me the article you are referencing) for someone without the proper authorization to access the communications


21 posted on 04/12/2006 1:16:13 PM PDT by tfecw (It's for the children)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Tribune7

It's quite a bit easier to quash the dissidents, since those technologies would likely be forbidden in their countries, for whatever purpose, whereas here, the mere use of such a technology in an of itself doesn't constitute criminal behavior. So where it might help dissidents in oppressive regimes, it won't, and where it might help terrorists threaten democracies, it will, and really with very little positive in return for the vast majority of people whose calls are so mundane as to not be worth the extra processor cycles to apply Rijndael to their VoIP packets.


22 posted on 04/12/2006 1:17:15 PM PDT by teddyruxpin
[ Post Reply | Private Reply | To 15 | View Replies]

To: teddyruxpin

Zimmerman is a terrorist enabler.


23 posted on 04/12/2006 1:17:23 PM PDT by balch3
[ Post Reply | Private Reply | To 1 | View Replies]

To: RadioAstronomer

ANY encryption scheme that is used more than once can be broken (though not necessarily easily).


24 posted on 04/12/2006 1:17:43 PM PDT by jpl
[ Post Reply | Private Reply | To 18 | View Replies]

To: Tribune7

Good point, may need this in Europe soon.


25 posted on 04/12/2006 1:18:49 PM PDT by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 15 | View Replies]

To: teddyruxpin

Also, warrants have been obtained by the FBI to install keystroke loggers and memory scanners, etc.


26 posted on 04/12/2006 1:19:35 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 9 | View Replies]

To: RadioAstronomer

You know, I thought about that when i read it too, and I left it alone, since it's a fairly technical discussion. I have to wonder just how big of a key is a mere 'impediment' rather than an impossibility...

/me leaves the whole topic alone...


27 posted on 04/12/2006 1:19:40 PM PDT by teddyruxpin
[ Post Reply | Private Reply | To 18 | View Replies]

To: BearWash

Yeah, but those are 'side channel attacks,' and you have to have probable cause to get the warrant to put a keylogger or bug the room in the first place, and the mere use of encryption sure won't get that through FISC.


28 posted on 04/12/2006 1:22:13 PM PDT by teddyruxpin
[ Post Reply | Private Reply | To 26 | View Replies]

To: jpl

I thought a PGP key length of 4096 was pretty much unbreakable.


29 posted on 04/12/2006 1:24:32 PM PDT by RadioAstronomer (Senior member of Darwin Central)
[ Post Reply | Private Reply | To 24 | View Replies]

To: teddyruxpin

I don't knoow either!


30 posted on 04/12/2006 1:25:21 PM PDT by RadioAstronomer (Senior member of Darwin Central)
[ Post Reply | Private Reply | To 27 | View Replies]

To: teddyruxpin
In my own VoIP setup there is a huge hole for a security agency to tap calls, even if the packets were encoded. I have a bridge to a regular 900 mhz cordless phone (with a weak encryption, I believe), so all the NSA has to do is park outside my door and listen to the radio transmissions (it would be pretty boring job). If I were using a headset instead, they would have to get a little more sophisticated and listen to the weak RF the mic radiates.
31 posted on 04/12/2006 1:25:29 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 1 | View Replies]

To: balch3
Zimmerman is a terrorist enabler.

Phil Zimmerman is a privacy enabler, and a friend to anyone who cares about secure digital communications. The fact that encryption technology can be abused by terrorists is no more remarkable than the fact that gun technology, transportation technology, communications technology, biotechnology, and any number of other technologies can also be abused by terrorists.
32 posted on 04/12/2006 1:25:54 PM PDT by AnotherUnixGeek
[ Post Reply | Private Reply | To 23 | View Replies]

To: tfecw
"No i read that part...it's stronger than something that causes delays. I'm still missing the part that makes decryption impossible. Perhaps you have other information you aren't sharing?"
Nothing secret on my end, it's fairly well known that asymmetric or 'public key' encryption, with fairly large keys, a strong algorithm (esp. that provides a large key space) is pretty much unbreakable within a (or several thousand even) human lifetime with current processing power. Unless a significant breakthrough in factoring extremely large prime numbers (and I have no reason to believe an intelligence agency has done so and kept it to themselves), these back of the envelope calculations will remain true.
33 posted on 04/12/2006 1:25:58 PM PDT by teddyruxpin
[ Post Reply | Private Reply | To 21 | View Replies]

To: balch3
Zimmerman is a terrorist enabler.

By that standard, so is Boeing. ;)

34 posted on 04/12/2006 1:28:47 PM PDT by Mr. Jeeves ("When the government is invasive, the people are wanting." -- Tao Te Ching)
[ Post Reply | Private Reply | To 23 | View Replies]

To: BearWash

I'd need a warrant to park a van outside your house and listen to the spread spectrum cordless traffic, and I can't get that just because you're encrypting your calls.


35 posted on 04/12/2006 1:28:51 PM PDT by teddyruxpin
[ Post Reply | Private Reply | To 31 | View Replies]

To: teddyruxpin

I would guess the scenarios I outlined in #31 might not even require a warrant. Correct me if wrong.


36 posted on 04/12/2006 1:29:15 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 28 | View Replies]

To: RadioAstronomer
I guess it depends on your key length.

But as for as this helping terrorists; hey Hollywood is going to encrypt everything right up to the point where your eyeball sees those phosphors or transisters lighting up.

So, just think of this as an American citizens very own DRM. :-)

37 posted on 04/12/2006 1:30:02 PM PDT by AFreeBird (your mileage may vary)
[ Post Reply | Private Reply | To 18 | View Replies]

To: teddyruxpin
OK, I don't know.

But I bet it's done surreptitiously all the time, even if not introduced as evidence.
38 posted on 04/12/2006 1:30:06 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 35 | View Replies]

To: tfecw

VOIP calls can go directly from computer to computer with no contact with to the phone grid. The call is encrypted on each end and the data going over the net is encrypted at all times.

There is no way to conventially tap a VOIP call that never touches the phone system. Warrant or no, it would have to be intercepted and decrypted.


39 posted on 04/12/2006 1:30:15 PM PDT by MediaMole
[ Post Reply | Private Reply | To 2 | View Replies]

To: MediaMole
I occasionally use Skype and its own traffic is encrypted, but I don't know which algorithm.

But like I said earlier, watch for vulnerabilities on either end prior to encryption.

40 posted on 04/12/2006 1:34:12 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-99 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson