Abstract: The use of encryption by individuals is growing at a tremendous rate, and since 1991 cryptography issues have engulfed both the U.S. government as well as the computing industry. One of the most controversial of these issues is whether encryption should be made supremely secure to the highest-level current technology will allow, or whether a "master key" should be locked away somewhere, only to be used when absolutely justified. Both sides of the issue have their benefits and detriments; the problem is finding the middle ground that will provide the greatest benefit to society.
In the past decade, rapid advances have been made in the field of cryptography. These advances have brought considerable attention to encryption policies in the United States from three large groups: the government, the computing industry and researchers in the field. With old faithful encryption standards quickly becoming obsolete, new standards are currently being proposed by each group. However, the government has its own interest in mind in its standards, and the computing industry and researchers have an opposite idea as to how encryption should be implemented. Thus, the issue is trying to find a new standard that will be accepted by both groups, and ultimately will be a benefit to all individuals. Specifically stated by Kevin Bowyer, "Individuals should have just as great an assurance of privacy. Law enforcement should have at least the same effective ability to conduct surveillance. The U.S. computing industry should compete at least as effectively in global markets. And, national governments should have no less ability to regulate what happens inside their nation." [1]
Before the 1990s, th...
... middle of paper ...
...ay 8, 1998
4. Schwartz, John. One High-End PC Cracks Data-Scrambling System, The Washing Post, July18, 1998
5. Nechvatal et al. Report on the Development of the Advanced Encryption Standard James National Institute of Standards and Technology, October 2, 2000
6. Baker, Stewart. Don't Worry Be Happy, Wired Magazine, Jun 1994
7. Encryption: Impact on Law Enforcement, Federal Bureau of Investigation, June 3, 1999, pps. 7-8
8. Rivest, Ronald L. The Case against Regulating Encryption Technology, Scientific American, October 1998. pps. 116--117.
9. Kolata, Gina. The Key Vanishes: Scientist Outlines Unbreakable Code, New York Times, February 20, 2001
10. U.S. Supreme Court, Olmstead v. U.S., 277 U.S. 438, 1928.
11. Schneier, Bruce. Cryptography: The Importance of Not Being Different, IEEE Computer, Vol. 32, No. 3, March 1999. pps. 108-109
In this essay, the author
Explains that encryption is growing at a tremendous rate, and cryptography issues have engulfed both the u.s. government and the computing industry since 1991.
Explains that advances in cryptography have brought attention to encryption policies in the united states from three large groups: the government, the computing industry, and researchers. the issue is trying to find a new standard that will be accepted by both groups.
Explains that before the 1990s, the encryption issue was straightforward; government, computing industry, and researchers were satisfied with the worldwide data encryption standard.
Explains that the government is concerned about the implications of securely encrypted communications, and the computing public is losing faith in des.
Explains that the government proposed the escrowed encryption standard in 1993, which encrypted messages in two stages.
Opines that although the computing industry has been hostile towards key escrow and key recovery systems, such standards do not provide some benefits. the government needs to be able to continue to protect this country from domestic and foreign enemies.
Opines that the world will be safer if criminals cannot take advantage of a ubiquitous, standardized encryption infrastructure that is immune from any conceivable law enforcement wiretap.
Explains that illegal wiretapping by a rogue prosecutor or police officer is impossible. the use of encryption by criminals is increasing greatly.
Explains that the fbi laboratory division's computer analysis and response team has seen the number of cases utilizing encryption and/or password protection increase from two percent to approximately twenty percent over the past four years.
Explains that the new operating system will allow users to employ an encrypted file system which will provide the individual computerusers with easy to use "point and click" encryption thereby enabling criminals and terrorists to easily encrypt all of the files stored on their computer.
Explains that key escrow systems have been rejected by the computing industry because they add a substantial security risk.
Explains that key recovery systems are less secure, more costly, and difficult to use than similar systems without a recovery feature. massive deployment of key-recovery-based infrastructures will require significant sacrifices insecurity and convenience and substantially increase costs to all users of encryption.
Opines that the scale and complexity that would be required for such ascheme is beyond the experience and current competency of the field and may introduce ultimately unacceptable risks and costs.
Explains that the computing industry and researchers are moving towards new algorithms that provide "everlasting security".
Opines that dr. rubin's algorithm provides ultimate privacy to every individual. every law-abiding person should have the right to keep their private conversations private, forever.
Explains that they conferred, as against the government, the right to be let alone. every unjustifiable intrusion bythe government upon the privacy of the individual, whatever themeans employed, must be deemed a violation.
Opines that a new encryption system would be risky, since criminals could communicate without the fear of ever incriminating themselves. schneier argues that security companies are blinded by shiny new cryptography.
Opines that the aes proposal suggests a compromise that will provide the greatest utility to all.
Cites bowyer, kevin, h. abelson, and schwartz, john. the risks of key recovery, key escrow and trusted third party encryption.
Cites baker, stewart, rivest, ronald l., kolata, gina and olmstead v. u.s.
Internet Privacy: Government Should Not Regulate Encryption or Cryptography
Privacy rights have been an important issue through out time, and it has been increasing in importance as we have moved into the electronic/information age. Keeping that privacy had become a growing concern for many businesses and consumers. With all the information being sent across the web, people are very concerned about their personal information falling into the wrong hands. One way to help protect your privacy on the net is by using an encryption program.
In this essay, the author
Opines that the government should not regulate encryption or cryptography. privacy has become a growing concern for many businesses and consumers.
Explains that the clinton administration adopted the "clipper chip" plan in 1993, which would give the government free access to all private and non-private communications.
Explains that encryption keys are necessary to survey possible criminal or terrorist activities. however, 83 percent of all government surveillance in the past decade were authorized in connection with vice crimes.
Explains that key recovery systems weaken the computer system, making it more susceptible to hacker attacks, which can lead to theft, blackmail, extortion and sabotage.
Opines that the government is wrong in trying to force encryption users to hand over their decryption keys.
Security Versus Privacy
As a result of 9/11, our country has been faced with a new issue: electronic privacy. The terrorists that attacked us used our own technology against us to protect their activities from our view. Because of this, we are now forced to make a decision between two desirable things: privacy and national security. On the one hand, our right to privacy will ensure that our personal rights are not violated, whereas, on the other hand, national security would allow us some comfort against the evil in the world.
In this essay, the author
Opines that the government must find a balance between privacy and national security in light of 9/11.
Explains that there are several solutions pertaining to internet security, such as limiting the sale of encryption technologies and giving the government a back-door.
Opines that the government must be allowed to have keys to access the encryption algorithms so that all internet traffic can be safely monitored.
Explains that senator gregg called for a worldwide ban on encryption logarithms without backdoors for government surveillance after the terrorist attacks.
Explains that the second position is that of those who strongly support the individual's right to personal privacy. they believe that no person, or group of people, should be allowed to interfere with and intrude upon a person?s privacy on the internet.
Explains that there are more online groups and foundations being formed to carry the torch for personal electronic privacy, including the americans for computer privacy, the electronic frontier foundation, and senator patrick leahy.
Analyzes how the 'agent of a foreign power' restriction was abused during the 1960s.
Explains baker, stewart a., and paul r. hurst's the limits of trust: cryptography, governments and electronic commerce.
Argues that the new bill limits surveillance and encryption key access to those investigations conducted to protect against international terrorism and spying activities only.
Cites leahy, patrick, and mccullagh, declan. the senate mulls stiff crypto laws.
"Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller
In this essay, the author
Opines that security is mostly a superstition. it does not exist in nature.
Explains that security has been a common topic of controversy since the terrorist attacks of september 11, 2001.
Argues that security is not something that can be compromised; however, it doesn't have to come at the expense of our privacy.
Analyzes how schneier addresses the issue of security in an article for an internet security company.
Explains that giving airline pilots firearms, reinforcing cockpit doors, better authentication for airport maintenance workers, armed air marshals traveling on flights, and teaching flight attendants are all suggested security measures that have no effect on individual privacy or liberties.
Opines that security can be achieved without hindering privacy, but it is not necessary to constantly berate innocent citizens.
Opines that airport security personnel should be given adequate training and authority in order to make intelligent decisions in determining necessity of patting down every other person making a flight.
Opines that airport security is no safer today than it was prior to september 11th. it is important to find more efficient and less hindering ways to ensure security.
Analyzes how airport security rips away privacy, citing bacard and nesson.
Analyzes how rita cain, a law professor at the bloch school of business and public administration, debates that the constitutional right of privacy does not provide consumers any protection against use or abuse of personal data by private sector parties
Explains that the restrictions placed on the trade of private information are nearly non-existent in the united states.
Analyzes how cain argues that after the terrorist attacks on the united states, issues about privacy now focus on national security needs to protect against further violence.
Explains that learning of a terrorist group’s plans in advance, monitoring its efforts and frustrating those efforts, or denying all those who do not pass some test of loyalty access to likely targets or to the resources needed to attack those targets.
States that the declaration of independence and the bill of rights were designed to protect against government intrusion in the lives of the united states of america.
Explains that the usa patriot act was implemented in 2001 following the attacks of september 11th. it calls for increased security for criminal investigations and other areas that will help reduce the chances of terrorist attacks.
Analyzes how government secrecy has become the norm in the post-september 11th world, citing nikki swartz's essay for the information management journal.
Opines that security and privacy are a difficult balance. it depends on what you feel is important.
Explains that all men are created equal and endowed with certain unalienable rights, such as life, liberty, and the pursuit of happiness. governments are instituted among men to secure these rights.
Cites bacard, andre, and academic search elite. privacy in the computer age.
Opines that the united states is a world apart. cain, rita marie. academic search elite.
Cites charp, sylvia, academic search elite, university library, indianapolis, in. "security and privacy."
Cites fjetland, michael, j.d., "global commerce and the privacy clash." the information management journal.
Analyzes heymann, philip, and philip's article, civil liberties and human rights in the aftermath of september 11.
Explains kroll, robert e., "can the fourth amendment go high tech?" aba journal. academic search elite.
Cites nesson, charles. "threats to privacy." social research.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
In this essay, the author
Opines that snowden's leaks on the u.s. government surveillance program, prism, demand an explanation.
Opines that people's apprehensiveness does not come from the government’s ability to monitor their phone calls, but from their individual conversations.
Explains that the wiretap act protected citizens from the government listening to their phone calls, and the electronic communications privacy act extended the same protection to include emails.
Argues that the government needs more help in identifying terrorists. the nsa program has helped strengthen the department of homeland security's case against terrorist threats.
Argues that the nsa is violating the first and fourth amendment of the u.s. constitution, free speech and freedom from unwarranted searches.
Opines that limiting our knowledge about foreign affairs would leave us vulnerable, but wiretapping foreign officials infringes on their rights as a country.
Opines that the correlation between terrorist attacks and surveillance is relatively unknown, since all the countries that are the main targets of terrorism have high surveillance programs.
Explains that president obama has started reforming the laws concerning the nsa, including allowing the public to participate in courts to determine if it has reasonable cause to spy.
Argues that the first priority of the program is to protect us from harm, not catch petty crimes.
Opines that the government is trying hard to find the balance between privacy and efficiency.
Explains that database hacks are an issue not only for the government but for many well-known companies as well. state legislators have proposed allowing third party organizations to hold on to the information.
Opines that we can't allow all the information that could be used to stop terrorists to idle in a database. we will have to adapt as the constitution will too, to include the new digital world.
Explains that the electronic frontier foundation has unanswered questions about the nsa's bullrun program.
Analyzes how the nsa's "attacks thwarted" claim spreads despite lack of evidence. privacy facts and statistics.
Analyzes pearson, michael, and ashely fantz's "what obama changed at the nsa: 5 takeaways." cnn. cable news network, 23 jan.
Explains how the center for democracy & technology's security and surveillance program is based on the nsa’s surveillance programs.
Security and liberty cannot be separated; furthermore it is a fallacy to think you can give up one for the other.
In this essay, the author
Opines that security and liberty cannot be separated; it is a fallacy to think you can give up one for the other.
Explains that the government can prevent shootings, terrorist attacks, organized crime, gang activity, financial fraud, identity theft, and any number of crimes.
Argues that privacy is a miniscule price to pay for the "greater good". the average american citizen should have no fear of anything happening to them with this relinquishing of privacy.
Opines that citizens can make a big difference in the lives of their fellow americans by surrendering something as seemingly small and insignificant as privacy.
Explains that the data obtained could be used to promote the general welfare, public health, and financial stability by monitoring spending habits and preventing self-destructive habits.
Opines that law and law enforcement would become more effective and correctional measures could be implemented swiftly, effectively preventing the wrong people from being convicted and placed in prisons.
Opines that national surveillance would create a society where everyone could live up to their greatest potential, deviant behavior and self- and societal destructive lifestyles could receive intervention and be eliminated.
Explains that many of the problems suffered by individuals in any realm of society can be remedied, such as child abuse, interpersonal relationships, and mental illness.
Opines that the sacrifice of privacy for security would reap incredible benefits in a world where all assumptions are fact. however, history has proven that governments have not shown themselves benign; they are full of fallible humans.
The idea of privacy protection for private citizens is rooted in history back to the Magna Carta. With the passage of time and the evolution of communication the laws of the United States have attempted to ensure a balance between security of the nation and protecting privacy. The current state of privacy and the law is now in a state of flux as citizens have begun to rely more and more on technological means of communication and have integrated privacy invading technology into their daily lives. It is not uncommon today for the average citizen to have all their conversations and movements tracked and stored into massive electronic databases simply because they carry a cell phone. The use of the internet as a means of communication and commerce adds further to the data collection activities as online banking, bill paying, shopping, and social networks become the norm. In a post 9/11 world this data is now captured, mined, and analyzed to create profiles of citizens to be used in both the private and public sectors to look for illegal activities like terrorism the drug trade, and even larceny. How the laws of the United States apply to keeping this data private while protecting citizens from harm is the goal of this report.
In this essay, the author
Explains that privacy protection for private citizens is rooted in history back to the magna carta. the current state of privacy and the law is in flux as citizens have integrated privacy invading technology into their daily lives.
Explains that the united states constitution's fourth and fifth amendments are the foundation of privacy protection case law.
Explains that the electronic communications privacy act of was created to combat the problems associated with electronic information. it closed the loop to privacy intrusions by including government, individuals, and private firms.
Explains that the problem with the laws both protecting privacy and insuring the safety of society was exacerbated by the terrorist attacks of 9/11.
Opines that while groups like the electronic frontier foundation and the american civil liberties union (aclu) still argue that the patriot act overstepped the bounds of the protections given in the bill of rights, others argue it is what our society needs for protection.
Analyzes how privacy concerns were addressed when the constitution was written and how new technologies enabled rapid and widespread dissemination of information.
Explains that facebook, myspace, and twitter provide an outlet for anyone to share their lives with their friends. the government is currently working on programs to mine the data for relevant security information.
Opines that privacy is under threat with technology and global security threats. laws are updated to protect privacy as emerging technology is invented, but the law is blurred with these changes.
Opines that the cost of the loss of privacy versus the added benefit must be weighed in all situations.
Explains that technology built into automobiles can communicate with other vehicles, the road itself, and a central database to provide real-time data on speed and position.
Cites ashcroft, john, and bailey, dennis. the open society paradox: why the 21st century calls for more openness—not less.
Explains etzioni, amitai and fairfield, paul. public/private. lanham: rowman, 2005. garfinkel, simson and gleicher, nathaniel.
Explains glenn, richard a. the right to privacy: rights and liberties under the law. shachtman, noah.
Advanced Encryption Standard (AES), is the most prevalent symmetric encryption standard, utilized in hardware and software worldwide to safeguard sensitive information belonging to governments, corporations, and individuals. The roots of AES go back roughly 40 years. Aside from special coding used within the military, it was widely agreed that a trusted and certified standard for data encryption did not exist in the early 1970s. Thus the U.S. government and buyers needed reliable computer security to protect private documents and other sensitive information from digital intruders. A request was put forth by the National Institute of Technology and Standards (NIST) for a federal encryption standard that included among many criteria: a high level of security, easy to understand, available to all users, adaptable, and efficient. IBM stepped forward with a proposed algorithm which would become the basis for the Data Encryption Standard (DES). DES became a federal standard in 1977 and would soon be used worldwide. DES utilizes a 64 bit block size and key size of 56 bits (2^56 possibilities). During the 1970s, this key size was considered by most to be safe against brute-force attacks. A brute-force attack is the most basic method to crack a key and simply consists of trying every possible key. The main limitation to a brute-force attack is computing power. By the turn of the century, huge advancements in computer technology allowed for DES to be broken within a matter of days. Triple DES (3DES) was introduced in 1998, and essentially triples the key size to 168 bits by encrypting the data 3 times using the same DES algorithm. NIST (2007) projected 3DES to be safe for federal use until the year 2030 (p. 69). In addition to the diminishi...
In this essay, the author
Explains that advanced encryption standard (aes) is the most prevalent symmetric encryption standard, utilized in hardware and software worldwide to safeguard sensitive information.
Explains that aes began with an international competition held by nist to develop a new federal encryption standard that was secure, efficient, versatile, and simple to implement.
Explains that aes is a symmetric block cipher, which combines plaintext and secret encryption keys into the "engine" to decrypt the message.
Explains that aes operates using a very high level process. the long input and cipher key are each broken up into 128-bit (16 byte) blocks and organized into two separate 4x4 matrices in the encryptor.
3. Herman T. Tavani, "Privacy Online," Computers and Society, Vol. 29, No. 4, 1999, pp. 11-19.
In this essay, the author
Explains that privacy is an individual's claim to control the terms under which personal information is acquired, disclosed, and used. privacy protection involves the establishment of rules governing the collection and handling of personal data.
Explains that the internet offers many benefits but it also creates many threats that undermines our personal privacy. privacy concerns are centered on improper acquisition, improper use of personal information.
Explains that people collect personal information to acquire power at the expense of others' privacy. there are four major models which offer an important corrective measure.
Explains that industry develops rules for the protection of privacy that are enforced by the industry and overseen by privacy agency. the european union adopts this model to ensure compliance with its data protection regime.
Argues that the lack of legal protections for individual's privacy on the internet in the united states is an example of its limitations.
Explains that companies and industry bodies establish codes of practice and engage in self-policing. the major problems are adequacy and enforcement since industry codes provide only weak protections and lack enforcement.
Explains that privacy-enhancing technologies are cumbersome to use, unfriendly, require a degree of knowledge exceeding that of the common internet users, and may be designed to facilitate law enforcement access.
Opines that a successful internet privacy policy must include strong legislation, privacy oversight commissions, and industry self-regulation.
Explains that the rapid growth of the internet has facilitated invasions of information privacy by making it possible for existing privacy threats to occur.
Explains that personal information is generated as necessary or incidental by-products in online transactions, such as news searches, free e-mail, stock portfolios, etc.
Opines that the practice of user profiling is standard for most popular web sites. the combination of the digital fingerprints accurate enough to correctly identify individuals could be misused and shared with online companies without individuals ever knowing how their information is used and whom it is sold.
Explains that the internet facilitates the manipulation and collection of information, and it is difficult to determine what constitutes ethical or unethical data collection.
Explains that privacy legislation differs around the world, creating a barrier to the globalization of electronic commerce where allowing businesses to have global privacy practices.
Explains that the european union enacted the data protection directive to harmonize member states' laws in providing consistent levels of protections for citizens and ensuring the free flow of personal data within the eu.
Explains that the united states does not have a federal data privacy protection law, and the congress has no interest in proposing one.
Explains that the federal trade commission (ftc) has encouraged web sites to post privacy notices but does not have the resources to track down the full range of privacy abusers.
Explains that the safe harbor principles provide guidance for u.s. companies on how they may provide adequate protection to personal data transferred to the united states from europe.
Explains utilitarianism, which affirms that what makes behavior right or wrong depends on the outcome of the behavior and not the intention a person has when he or she acts.
Explains that deontology focuses on the internal character that may guide our choices, no matter the consequences. european union citizens enjoy a priority on individual privacy over business interests.
Opines that the utilitarian and human rights deontologist might agree that it is best not to break those laws designed to protect basic rights.
Argues that current privacy laws in the united states are inadequate to meet the challenge of new data acquisition technologies on the internet.
Explains that the internet can be used by criminals to plan and carry out illegal activities. this decrease in privacy has favorable results when monitoring leads to locating and prosecuting criminal activity.
Argues that if privacy is understood as a value involving the good of individuals but as one that also contributes to the broader social good, then concerns for individual privacy might get the kind of consideration they deserve in debates.
Argues that e-commerce should be designated as a zone of privacy with sanctions to protect personal information, which is what the european union directive on privacy is aimed at.
Argues that opt-in is the only method that ensures users are not tricked into allowing their personal information to be sold and exchanged without their intentional consent.
Argues that basic legislation to protect individual privacy on the internet is inevitable and that it could both benefit consumers and stimulate the growth of e-commerce.
Opines that internet has created enormous opportunities but with these benefits come natural consequences. privacy is the price we need to pay if we fail to regulate its usage.
Analyzes herman t. tavani's "privacy online," computers and society, vol. 29, no. 4, 1999, pp.
Explains that daniel lin and michael c. loui, "taking the byte out of cookies: privacy, consent, and the web," computers and society, june 1998.
Describes herman t. tavani, james h. moor's "privacy protection, control of information, and privacy-enhancing technologies", computers and society.
Explains jerry kang's cyberspace privacy: a primer and proposal, human rights magazine, volume 26, number 1, winter 1999.
Benjamin Franklin once said: “ They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.“ Today, we may agree or disagree with Franklin’s quote, but we do have one thing in common: just as Franklin, we are still seeing freedom vs. security as a zero-sum game – one where one can gain only at the expense of another and where the two cannot possibly coexist. However, this is not necessarily the case. There does not have to be necessarily a trade-off between privacy and security; the proper balance is the one where neither security nor privacy suffers from both of them being present in our daily lives.
In this essay, the author
Argues that freedom vs. security is a zero-sum game where one can gain only at the expense of another and where the two cannot possibly coexist.
Opines that the majority of governments fail to provide citizens with privacy and security, either by having too little or too much power, or by creating a system which provides checks and balances.
Explains that the paper will deal with two aspects of the privacy-vs-security issue. the first is concerned with general civil liberties, where privacy means freedom to make personal (private) choices in our own homes, control our daily lives, and decide with whom we share information that is of our concern.
Illustrates how security and privacy can coexist by using student campus as an example. at american university in bulgaria, skaptopara campus is equipped with security cameras in every hallway.
Analyzes how aubg administration decides to put surveillance cameras in every room in addition to those in the hallways in order to increase security on campus.
Explains that governments don't have a clear overview of the effectiveness of their efforts to increase security. for example, in 2003, commercial planes in the us were updated with bulletproof cockpit doors.
Argues that the secure flight program, which checks whether travelers are on the government's no-fly list, severely hurts passenger’s privacy by collecting their personal information.
Argues that airports could consider enhanced baggage security, which would ensure that bags do not fly without the passenger to whom they belong, and would screen all baggages for explosives.
Argues that governments should focus on finding productive ways not to increase security and privacy, but rather to optimize them.
Opines that centralized government should have constant checks and balances over government policies. clear separation of power and decentralization are good ways to give each government flexibility in executing security measures without hurting their citizens’ liberties.
Explains the term cyber security, which is used to protect information from being stolen, compromised, or attacked. the real question is not whether governments are entitled to impose these measures.
Explains the oxford dictionary defines privacy as a state in which one is not observed or disturbed by other people. amazon and facebook store our data to improve customer experience.
Explains that everything we post or send on the web can be easily tracked by the government, and many other entities can easily use this information against us.
Opines that amazon stores and uses information to benefit us, and when we have such an attitude, we are more willing to give out the necessary information.
Carnivore poses certain concerns to any network user concerned about their security. Unfortunately many of the issues are in the hands of the FBI and not the common civilian population of the United States, because it does not seem as though Carnivore will be forced to change. As a result, the only safeguard available to most people is encryption of any important information that is transmitted over a network. Public awareness of the issues involved, and the voicing of the concerns could prompt legislation to ensure that personal privacy is observed and respected by the FBI. In the meantime, the FBI will have to be trusted to handle the power provided by Carnivore in an ethical manner, doing everything they can to respect the privacy of the common citizen.
In this essay, the author
Analyzes the potential for widespread invasion of the public's privacy on the internet by the united states government.
Describes carnivore as the fbi's attempt to create the digital equivalent of an analog wiretap.
Explains that carnivore allows for the filtering of packets, which is the most basic piece of data sent over a network.
Describes how carnivore is deployed on standard windows nt machines. after getting approval from a judge, the computer is attached to the network at the internet service provider and begins collecting data.
Describes some potential problems regarding personal privacy on the internet, including misuse by fbi or individual agents, security of the computer, and validity and applicability of data.
Opines that if the fbi can monitor all email instead of a single individual, what will stop them?
Explains that the security of the carnivore computer needs to be addressed. the first network connection is reasonably secure, although nothing is fail-proof.
Explains that the third issue is establishing the validity of the data. the fbi could read a spoofed email and attribute illegal actions to an individual who did not send the message.
Explains that strong encryption schemes such as rsa remain secure and could prevent the fbi from obtaining any useful knowledge by monitoring email.
Opines that the fbi's refusal to release details of carnivore to the public makes it impossible to accurately assess the potential invasion of privacy.
Opines that law enforcement officials need to be able to read email when there is sufficient proof that doing so will help convict a criminal. the fbi needs to regulate the collection of data.
Explains that the fbi needs to get an order from a judge before using carnivore. once the system is in place, an authorized agent could adjust what data is collected beyond the bounds of what is authorized by the court.
Opines that personal privacy is always going to be an issue on the internet, whether one is worried about malicious crackers or the nation's law enforcement.
Opines that encryption is the best solution for privacy on the internet. it will obscure the body of an email, but limits third parties to knowing who the recipient is, while withholding the contents.
Opines that carnivore poses certain concerns to any network user concerned about their security. the only safeguard available to most people is encryption of any important information transmitted over a network.