Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Phone Taps Just Got Impossible
strategypage.com ^ | 4/12/06 | James Dunnigan

Posted on 04/12/2006 12:45:55 PM PDT by teddyruxpin

INTELLIGENCE OPERATIONS: Phone Taps Just Got Impossible

April 12, 2006: Eavesdropping on phone calls just got a lot harder. Phil Zimmermann, the guy who invented PGP encryption for Internet mail, has developed a similar product, Zfone, for VOIP (telephone calls over the Internet). Zfone, like PGP, is free and easy to use. PGP drove intelligence agencies nuts, because it gave criminals and terrorists access to industrial grade cryptography. PGP doesn't stop the police or intel people from reading encrypted email, but it does slow them down. Zfone, however, uses stronger encryption. This means more delays, perhaps fatal delays, in finding out what the bad guys are saying. There's no immediate solution for this problem, unless Phil Zimmermann has provided a back door in Zfone for the intel folks. That is unlikely, but at least possible.


TOPICS: News/Current Events; War on Terror
KEYWORDS: counterterrorism; encryption; pgp; voip; wiretaps; zfone
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-99 next last
To: balch3

My company uses VOIP and we encrypt it as far as we can. Company's secrets (which would include more than enough to enable identity theft) should remain secret.

Also what my wife and I are planning to do later in the evening should remain our secret not some hacker or govt listener seeking titilation. I love encryption and I thank Phil Zimmerman for helping us maintain our privacy.

For those that think we don't have to guard our privacy if we aren't doing anything illegal, please let me put a web cam in your bedroom and sell viewing rights on the web (hopefully it'll be interesting enough to make money)


61 posted on 04/12/2006 2:48:00 PM PDT by JosephW (Mohammad Lied, People die!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: RadioAstronomer

You said -- "Public key PGP encryption can be broken?"

That's exactly what I was thinking. As far as what I've read, it's impossible to crack. Has that changed now?

Regards,
Star Traveler


62 posted on 04/12/2006 3:38:45 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 18 | View Replies]

To: tfecw

You said -- "I'm still missing the part that makes decryption impossible."

PGP was impossible to crack. If that's so, then making it stronger is making it "more" impossible.

Regards,
Star Traveler


63 posted on 04/12/2006 3:40:08 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 21 | View Replies]

To: balch3

You said -- "Zimmerman is a terrorist enabler."

He's never been considered that. This is something that has never been suggested (or stated) before. So, it's something that is, apparently, "new" with you.

He's been around for quite a long while and there have been court cases surrounding the issue of PGP and getting it out to the public. So, he wouldn't be considered any more of a terrorist enabler than Tyson's Chicken would be if they shipped their chickens to the hills of Pakistan where bin Ladin is hiding out.

Regards,
Star Traveler


64 posted on 04/12/2006 3:43:24 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 23 | View Replies]

To: jpl

You said -- "ANY encryption scheme that is used more than once can be broken (though not necessarily easily)."

That statement is not in line with testimony that was given to Congress about PGP. It was stated (by the government) that it was uncrackable (because they were arguing against getting it out to the public). So, where do you have publicized documents showing that it has been cracked?

Regards,
Star Traveler


65 posted on 04/12/2006 3:45:38 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 24 | View Replies]

To: RadioAstronomer
NSA could 'brute force' it, but it would take a while. Unless they got real lucky that is.

L

66 posted on 04/12/2006 3:49:34 PM PDT by Lurker (Nothing I post is an advocation of civil war.)
[ Post Reply | Private Reply | To 29 | View Replies]

To: teddyruxpin

Oh, cool. I always liked PGP.


67 posted on 04/12/2006 3:50:45 PM PDT by Publius Valerius
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker

You said -- "NSA could 'brute force' it, but it would take a while. Unless they got real lucky that is."

I think it's like someone else said here on this thread -- the time it takes for the "heat death" of the universe.

You or I won't be around.

Regards,
Star Traveler


68 posted on 04/12/2006 3:52:44 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 66 | View Replies]

To: AnotherUnixGeek
Phil Zimmerman is a privacy enabler, and a friend to anyone who cares about secure digital communications. The fact that encryption technology can be abused by terrorists is no more remarkable than the fact that gun technology, transportation technology, communications technology, biotechnology, and any number of other technologies can also be abused by terrorists.

This bears repeating.

69 posted on 04/12/2006 3:52:47 PM PDT by Publius Valerius
[ Post Reply | Private Reply | To 32 | View Replies]

To: teddyruxpin
Phone related BTTT

Cheers,

knewshound

Brew Your Own
70 posted on 04/12/2006 3:54:15 PM PDT by knews_hound (When Blogs are Outlawed, only Outlaws will have Blogs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: balch3
"Zimmerman is a terrorist enabler."

LOL! Yes I'm laughing at YOU! and not with you. I suppose computer makers are terrorist enablers too? You drove the IQ level of this thread down by a good 100 points.

71 posted on 04/12/2006 3:58:07 PM PDT by KoRn
[ Post Reply | Private Reply | To 23 | View Replies]

To: teddyruxpin
Yes, keep our agencies from listening to our calls!

A decade ago there was a debate about whether encryption technologies that didn't have a government-approved backdoor should be banned. Al Gore and John Ashcroft were on opposing sides of the issue. Guess whose side you're on.

72 posted on 04/12/2006 4:02:16 PM PDT by ThinkDifferent (Chloe rocks)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RadioAstronomer
Public key PGP encryption can be broken?

I've read--although I can't tell you the math--that the more encrypted data you have from a key pair, the easier the pair is to crack. Those longer-than-the-age-of-the-universe decryption times are for cases where you don't have any data but the public key. But if keys are changed frequently, it's just about as strong. (I've read.)

Of course, a quantum computer can factor a big number with only a few operations. It would not surprise me in the least to hear that the NSA has them.

73 posted on 04/12/2006 4:03:35 PM PDT by Physicist
[ Post Reply | Private Reply | To 18 | View Replies]

To: RadioAstronomer
Here's something I've wondered. Bear with me. Suppose the encryption were unbreakable. You couldn't render the stream back into sound. But the data stream of an ideal digital phone is presumably "economical": most of the traffic is transmitted in real time as the person is speaking, and not when he is silent. If the syllables are relatively self-contained, and the time slices are sufficiently short, then the "cadence" of the bit stream might reflect the cadence of the person's speech.

I wonder: to what extent might a sentence be understandable or recoverable, based on cadence alone? Most likely not everything could be understood: "yes" seems as if it should end up the same as "no" when encrypted, but perhaps not...but how far could it work? Syllable counting at least should be possible. If someone sang the ABC song, that should be detectable (and even distinguishable from "Twinkle, Twinkle, Little Star"). So cadence gives more information than nothing, but how much, if you really pushed it?

Food for thought.

74 posted on 04/12/2006 4:21:20 PM PDT by Physicist
[ Post Reply | Private Reply | To 18 | View Replies]

To: Physicist
to what extent might a sentence be understandable or recoverable, based on cadence alone?

You're touching on something that is, or so I've read, a significant part of the practice of cryptography and counter-espionage. The ~probabilities~ of word patterns and cadences of speech-- and for that matter writing-- do play a part in breaking codes.

Any additional information about the document or voice sample only improves the reliability of the probability model. Who the speaker is, the general subject matter, the locations... whatever. All you need is for some hits to start falling into place and it becomes sometimes possible to nail the entire key.

I'm not an expert on the topic, but I've done some interesting reading.

75 posted on 04/12/2006 4:28:55 PM PDT by Ramius (Buy blades for war fighters: freeper.the-hobbit-hole.net --> 1100 knives and counting!)
[ Post Reply | Private Reply | To 74 | View Replies]

To: RadioAstronomer

Only via brute force as far as I know (and this leads to the conundrum of recognizing the clear text from a large number of same sized candidates), and it involves factoring a large (~600 digit) number into two (~300 digit) primes. Knowing the values of the two primes vs. the value of their product is what distinguishes the public and private keys. So far as I know, there is no proactive (non trial-and-error) way to do this. As massive processing power becomes more economical, it becomes more feasible, but the key length can be increased.


76 posted on 04/12/2006 4:32:39 PM PDT by Still Thinking (Disregard the law of unintended consequences at your own risk.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: teddyruxpin

That post makes no sense. It's estimated that over 100,000 Chinese use proxy bouncing daily to get around the Chinese internet filters. Iranians have also been using proxies like crazy since the Mullahs bought and implemented the filtering technology.

Simply put, if Zimmerman didn't develop this, someone else would have. (my bet it would have been programmers from the Baltics or Scandinavia.)

Plus, everyone should be happy that Ebay is going to take it in the shorts from the ridiculous price they paid for Skype.


77 posted on 04/12/2006 4:41:19 PM PDT by JerseyHighlander
[ Post Reply | Private Reply | To 22 | View Replies]

To: BearWash

Skype has a backdoor for European and American intelligence agencies. It was revealed publicly before the company was sold.


78 posted on 04/12/2006 4:43:04 PM PDT by JerseyHighlander
[ Post Reply | Private Reply | To 40 | View Replies]

To: JerseyHighlander
Have a link handy? I hadn't heard that and find it somewhat out of character. What I heard is that the next version may come with a backdoor.
79 posted on 04/12/2006 5:15:56 PM PDT by steve86 (Acerbic by nature, not nurture)
[ Post Reply | Private Reply | To 78 | View Replies]

To: BearWash

You might be correct. I thought I had read that Skype had a backdoor on CNET News. I can not find an article on CNET or through Google that would support my claim.


80 posted on 04/12/2006 5:26:08 PM PDT by JerseyHighlander
[ Post Reply | Private Reply | To 79 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-99 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson