From: George A. Gleason <gg@well.sf.ca.us>
To: efrem@informix.com
Message Hash: b60257b2836fed11795285698a224d02676e1b3b3bd1211654c388bbabc863dd
Message ID: <199211061115.AA02435@well.sf.ca.us>
Reply To: N/A
UTC Datetime: 1992-11-06 11:16:03 UTC
Raw Date: Fri, 6 Nov 92 04:16:03 PPE
From: George A. Gleason <gg@well.sf.ca.us>
Date: Fri, 6 Nov 92 04:16:03 PPE
To: efrem@informix.com
Subject: Re: a cryptographic deal with the devil
Message-ID: <199211061115.AA02435@well.sf.ca.us>
MIME-Version: 1.0
Content-Type: text/plain
Re. the digital wiretapping "compromise." As a telecom professional I
absolutely resent and will resist any attempts to mandate backdoors into my
PBXs. No compromise on that. Period. We've all heard the arguements many
times: vast surveillance power, diminution of privacy, potential major
security problems...
I'd like to suggest something of a compromise which doesn't have these
risks. Common carriers (local and long distance telcos) are currently
required to provide access to line terminals when presented with a court
order for a wiretap. This access could reasonably be extended to requiring
the telco to connect a demultiplexer in the case of digital transmission, or
some kind of appropriate signal splitter in the case of fiber optics. The
agency requesting the tap would of course pay the bill for materials and
labor. Now this gets law enforcement their demultiplexed signal path so
they can tap only the intended target line, but it preserves the existing
structure which prevents law enforcement "hacking," since no backdoors would
be involved.
For PBXs (this is my department), a slightly distasteful but acceptable
compromise would be to have interconnect companies (the folks who install
your PBX or key system) register with the local operating telcos, providing
the interconnect company's name and contact information on the telco record
for each subscriber. So for instance, General Widgets has XYZ Telecom
install a new PBX; XYZ Telecom is required to inform the local operating
company that they have just acquired General Widgets as a client. Now if a
law enforcement agency gets a court order for a tap, they go to the local
telco and ask who the interconnect company is for that subscriber. (We're
talking here about a scenario in which one or a small number of extensions
in a phone system are believed to be used for criminal purposes, so law
enforcement has to tap those extensions only and not everyone who is on that
phone system.) Now law enforcement visits the interconnect company and
presents them with the court order, which requires the interconnect company
to provide access to the line terminals of the suspect extension(s), and/or
provide a demultiplexer etc. if needed (at law enforcement's expense of
course)... and of course, under penalty of contempt of court, refrain from
disclosing the situation to the client.
Now this gets law enforcement their legitimately needed access to suspect
extensions on PBXs, prevents interconnect companies from blowing the whistle
to their clients, and still preserves privacy protections since there is no
backdoor into the system.
Now here is why I think the FBI wants backdoors: Recall that under the "war
on drugs" etc., a ruling was handed down (I can't recall which branch of
govt originated this) which says that a wiretap may be conducted for up to
72 hours for "investigational purposes" without a court order; and the
material recorded may then be used to go and get a court order for a
continuing wiretap. This places authority in the hands of law enforcement
agencies to conduct taps any time they suspect someone of something, and
then go see the judge after the fact. Now without backdoors, law
enforcement has to depend on the goodwill of telcos to get access, and is
kind of stuck when it comes to PBXs and key systems. I'm willing to bet
there is a pretty substantial amount of "investigational" tapping going on,
and that the FBI is interested in vastly expanding it. The compromises I'm
proposing don't address this investigational tapping, and that's just fine,
since that ought to be challenged in court or defeated one way or another.
-gg@well
Return to November 1992
Return to “George A. Gleason <gg@well.sf.ca.us>”
1992-11-06 (Fri, 6 Nov 92 04:16:03 PPE) - Re: a cryptographic deal with the devil - George A. Gleason <gg@well.sf.ca.us>