Featured Research

from universities, journals, and other organizations

Penn Researchers Warn Against Potential Flaws In Wiretapping Technology

Date:
November 30, 2005
Source:
University of Pennsylvania
Summary:
As part of a federally funded program on electronic security, engineers at the University of Pennsylvania have discovered flaws in wiretapping technology that could allow parties being wiretapped to disable the recording and monitoring of their calls. The Penn researchers' findings will enable law-enforcement agencies to detect and compensate for the flaws.

As part of a federally funded program on electronic security, engineers at the University of Pennsylvania have discovered flaws in wiretapping technology that could allow parties being wiretapped to disable the recording and monitoring of their calls. The Penn researchersfindings will enable law-enforcement agencies to detect and compensate for the flaws.Using publicly available information and surplus interception devices including en registersthat record dialed numbers, the researchers were able to reverse-engineer wiretapping protocols and devise several means of confounding them. According to the researchers, a simple tone transmitted over the phone line by the monitored party can trick wiretap devices into believing that the tapped phone is still on the hook, thereby disabling recoding equipment.

"If we could figure out these flaws so easily, it stands to reason that motivated wiretap subjects have as well," said Matt Blaze, a professor in Penn's Department of Computer and Information Sciences and lead researcher in the project. "Fortunately, these flaws can at least theoretically be fixed in the more recent wiretap systems. Those that are vulnerable may be able to be re-configured to prevent such countermeasures."

The researchers are part of the Trustworthy Network Eavesdropping and Countermeasures project at Penn, funded through the National Science Foundation's Cyber-Trust program. Their findings are to be published Dec. 1 in the journal IEEE Security and Privacy.

"Legal wiretaps are widely-used tools for both law enforcement and national security. Thousands of federal, state and local agencies conduct wiretaps," Blaze said. "If they are to be truly useful, we need to find any exploitable flaws in the systems currently in use and create ways to fix them.According to Blaze and his colleagues, it is not just the law enforcement community that has a stake in the security of wiretapping technology.

ny questions about the reliability of information obtained by wiretap has implications for both the legal and technological communities,Blaze said. iretap evidence introduced in court, for example, may need to be examined for any telltale signs of signaling countermeasures before it is accepted.There are two general types of wiretap technologies used by U.S. law-enforcement agencies. The first are called loop extender taps and the second, more modern, types are known as CALEA taps.

Loop extenders are the most basic and oldest form of wiretap technology. They involve a direct connection between the subject's phone line and the law-enforcement agency.

The CALEA tapping technology named after the federal 1994 Communications Assistance for Law Enforcement Act mandates a standard interface between telephone-service providers and law enforcement. In CALEA taps, the telephone company decodes the signal and, when authorized, separates the call to a channel accessible by law enforcement.

Among the vulnerabilities Blaze and his colleagues noted, the loop extender taps are easily confounded by a simple two-frequency audio tone that phone systems use to determine if a particular line is idle that is, when the phone is on the hook. Automated recording equipment then assumes that the line is not in use and therefore does not record. They also noted techniques to manipulate dialed-number recorders that make false or incorrect numbers appear in call logs. Such logs should be examined for discrepancies, the researchers said.

While at first glance, CALEA seems secure against these manipulations, many of the vulnerabilities can extend there as well. The CALEA system involves two separate channels: one for data signaling and the other for voice content. Some CALEA systems are configured, however, so that they also respond to the two-frequency idle tone over the voice content channel.

"While there is relatively little that can be done to make the loop-extender technology more secure, it may be possible to configure some CALEA systems to better withstand these countermeasures," Blaze said. "It is a matter of programming them not to shut off when the voice channel hears the idle tone. Instead, the system should rely only on the data channel for that information."

Blaze and his colleagues recommend that law-enforcement agencies and telecommunications companies confirm settings of CALEA equipment withvendors.

Co-authors of the paper include Micah Sherr and Eric Cronin of Penn and Sandy Clark of Princeton University.

More information is available at www.crypto.com/papers/wiretapping/.


Story Source:

The above story is based on materials provided by University of Pennsylvania. Note: Materials may be edited for content and length.


Cite This Page:

University of Pennsylvania. "Penn Researchers Warn Against Potential Flaws In Wiretapping Technology." ScienceDaily. ScienceDaily, 30 November 2005. <www.sciencedaily.com/releases/2005/11/051130173754.htm>.
University of Pennsylvania. (2005, November 30). Penn Researchers Warn Against Potential Flaws In Wiretapping Technology. ScienceDaily. Retrieved September 17, 2014 from www.sciencedaily.com/releases/2005/11/051130173754.htm
University of Pennsylvania. "Penn Researchers Warn Against Potential Flaws In Wiretapping Technology." ScienceDaily. www.sciencedaily.com/releases/2005/11/051130173754.htm (accessed September 17, 2014).

Share This



More Computers & Math News

Wednesday, September 17, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

FBI Finishes $1 Billion Facial Recognition System

FBI Finishes $1 Billion Facial Recognition System

Newsy (Sep. 15, 2014) The FBI announced it plans to make its Next Generation Identification System available to law enforcement, but some privacy advocates are worried. Video provided by Newsy
Powered by NewsLook.com
A+ for Apple iPhone Pre-Sales

A+ for Apple iPhone Pre-Sales

Reuters - Business Video Online (Sep. 15, 2014) Apple says it received a record 4 million first-day pre-orders for its new iPhone 6 and iPhone 6 Plus, pushing delivery dates into October. Bobbi Rebell reports. Video provided by Reuters
Powered by NewsLook.com
Microsoft to Buy 'Minecraft' Maker for $2.5B

Microsoft to Buy 'Minecraft' Maker for $2.5B

AP (Sep. 15, 2014) Microsoft will acquire the maker of the long-running hit game Minecraft for $2.5 billion as the company continues to invest in its Xbox gaming platform and looks to grab attention on mobile phones. (Sept. 15) Video provided by AP
Powered by NewsLook.com
Manufacturer Prints 3-D Car In Record Time

Manufacturer Prints 3-D Car In Record Time

Newsy (Sep. 15, 2014) Automobile manufacturer Local Motors created a drivable electric car using a 3-D printer. Printing the body only took 44 hours. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

    Environment News

      Technology News



      Save/Print:
      Share:

      Free Subscriptions


      Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

      Get Social & Mobile


      Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

      Have Feedback?


      Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
      Mobile: iPhone Android Web
      Follow: Facebook Twitter Google+
      Subscribe: RSS Feeds Email Newsletters
      Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins