www.wired.com/news/privacy/0,1848,51917,00.html
By 19 Declan McCullagh | 20 Also by this reporter Page 1 of 1 02:00 AM Apr. Servicemen in Iraq * 37 Western Firm Pulls Staff from Yanbu; Demands * 41 More Breaking News * 42 Wire Service Photo Gallery Tech Jobs Partner 43 Today's the Day. Iliev's system relies on technology, not Congress or federal judges, to keep 45 Carnivore on a very short leash. Much of the public outcry over Carnivore and similar eavesdropping methods arises because they take a vacuum-cleaner approach, sucking in all the data flowing through a network and then storing only the desired information. But if the snooperware is buggy or if police agencies go beyond what a court order allows, the system will snare far more traffic than it is authorized to retain. The data would be encrypted, with the only key able to unlock the information kept by the vault. An FBI agent who wanted to access the information would obtain a search order that was digitally signed by a judge. The vault would recognize that signature and divulge only the information specified by the court. There would be no chance -- assuming the vault was programmed properly -- for a fishing expedition. Even if the FBI physically seized the vault, legally or otherwise, it's supposed to be just about impossible for the cops to crack. Iliev's program runs on an IBM 4758 48 cryptographic coprocessor, designed to destroy itself if it detects an intrusion attempt. Iliev says he isn't necessarily suggesting that administrators store terabytes of traffic -- after all, the best way to protect someone's privacy is never to have their information on file in the first place. Rather, Iliev says, if an administrator is required to play Big Brother, he wants them to have a reasonable way to do it. Other applications for the vault, beyond storing network data, include encrypting medical or financial information that would be released only to authorized users. End of story Send e-mail icon Have a comment on this article? Your use of this website constitutes acceptance of the Lycos 78 Privacy Policy and 79 Terms & Conditions Note: You are reading this message either because you can not see our css files (served from Akamai for performance reasons), or because you do not have a standards-compliant browser.
|