Featured Research

from universities, journals, and other organizations

Penn Researchers Warn Against Potential Flaws In Wiretapping Technology

Date:
November 30, 2005
Source:
University of Pennsylvania
Summary:
As part of a federally funded program on electronic security, engineers at the University of Pennsylvania have discovered flaws in wiretapping technology that could allow parties being wiretapped to disable the recording and monitoring of their calls. The Penn researchers' findings will enable law-enforcement agencies to detect and compensate for the flaws.

As part of a federally funded program on electronic security, engineers at the University of Pennsylvania have discovered flaws in wiretapping technology that could allow parties being wiretapped to disable the recording and monitoring of their calls. The Penn researchersfindings will enable law-enforcement agencies to detect and compensate for the flaws.Using publicly available information and surplus interception devices including en registersthat record dialed numbers, the researchers were able to reverse-engineer wiretapping protocols and devise several means of confounding them. According to the researchers, a simple tone transmitted over the phone line by the monitored party can trick wiretap devices into believing that the tapped phone is still on the hook, thereby disabling recoding equipment.

"If we could figure out these flaws so easily, it stands to reason that motivated wiretap subjects have as well," said Matt Blaze, a professor in Penn's Department of Computer and Information Sciences and lead researcher in the project. "Fortunately, these flaws can at least theoretically be fixed in the more recent wiretap systems. Those that are vulnerable may be able to be re-configured to prevent such countermeasures."

The researchers are part of the Trustworthy Network Eavesdropping and Countermeasures project at Penn, funded through the National Science Foundation's Cyber-Trust program. Their findings are to be published Dec. 1 in the journal IEEE Security and Privacy.

"Legal wiretaps are widely-used tools for both law enforcement and national security. Thousands of federal, state and local agencies conduct wiretaps," Blaze said. "If they are to be truly useful, we need to find any exploitable flaws in the systems currently in use and create ways to fix them.According to Blaze and his colleagues, it is not just the law enforcement community that has a stake in the security of wiretapping technology.

ny questions about the reliability of information obtained by wiretap has implications for both the legal and technological communities,Blaze said. iretap evidence introduced in court, for example, may need to be examined for any telltale signs of signaling countermeasures before it is accepted.There are two general types of wiretap technologies used by U.S. law-enforcement agencies. The first are called loop extender taps and the second, more modern, types are known as CALEA taps.

Loop extenders are the most basic and oldest form of wiretap technology. They involve a direct connection between the subject's phone line and the law-enforcement agency.

The CALEA tapping technology named after the federal 1994 Communications Assistance for Law Enforcement Act mandates a standard interface between telephone-service providers and law enforcement. In CALEA taps, the telephone company decodes the signal and, when authorized, separates the call to a channel accessible by law enforcement.

Among the vulnerabilities Blaze and his colleagues noted, the loop extender taps are easily confounded by a simple two-frequency audio tone that phone systems use to determine if a particular line is idle that is, when the phone is on the hook. Automated recording equipment then assumes that the line is not in use and therefore does not record. They also noted techniques to manipulate dialed-number recorders that make false or incorrect numbers appear in call logs. Such logs should be examined for discrepancies, the researchers said.

While at first glance, CALEA seems secure against these manipulations, many of the vulnerabilities can extend there as well. The CALEA system involves two separate channels: one for data signaling and the other for voice content. Some CALEA systems are configured, however, so that they also respond to the two-frequency idle tone over the voice content channel.

"While there is relatively little that can be done to make the loop-extender technology more secure, it may be possible to configure some CALEA systems to better withstand these countermeasures," Blaze said. "It is a matter of programming them not to shut off when the voice channel hears the idle tone. Instead, the system should rely only on the data channel for that information."

Blaze and his colleagues recommend that law-enforcement agencies and telecommunications companies confirm settings of CALEA equipment withvendors.

Co-authors of the paper include Micah Sherr and Eric Cronin of Penn and Sandy Clark of Princeton University.

More information is available at www.crypto.com/papers/wiretapping/.


Story Source:

The above story is based on materials provided by University of Pennsylvania. Note: Materials may be edited for content and length.


Cite This Page:

University of Pennsylvania. "Penn Researchers Warn Against Potential Flaws In Wiretapping Technology." ScienceDaily. ScienceDaily, 30 November 2005. <www.sciencedaily.com/releases/2005/11/051130173754.htm>.
University of Pennsylvania. (2005, November 30). Penn Researchers Warn Against Potential Flaws In Wiretapping Technology. ScienceDaily. Retrieved April 17, 2014 from www.sciencedaily.com/releases/2005/11/051130173754.htm
University of Pennsylvania. "Penn Researchers Warn Against Potential Flaws In Wiretapping Technology." ScienceDaily. www.sciencedaily.com/releases/2005/11/051130173754.htm (accessed April 17, 2014).

Share This



More Computers & Math News

Thursday, April 17, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Heartbleed Hack Leads To Arrest

Heartbleed Hack Leads To Arrest

Newsy (Apr. 17, 2014) A 19-year-old computer science student has been arrested in relation to a data breach of 900 social insurance numbers from Canada's revenue agency. Video provided by Newsy
Powered by NewsLook.com
Apple Rumored To Introduce Song ID Service In Next iOS Build

Apple Rumored To Introduce Song ID Service In Next iOS Build

Newsy (Apr. 17, 2014) Sources close to Apple told Bloomberg the company plans to introduce an integrated song identification service during the launch of its next iOS. Video provided by Newsy
Powered by NewsLook.com
Honda's New ASIMO Robot, More Human-Like Than Ever

Honda's New ASIMO Robot, More Human-Like Than Ever

AFP (Apr. 17, 2014) It walks and runs, even up and down stairs. It can open a bottle and serve a drink, and politely tries to shake hands with a stranger. Meet the latest ASIMO, Honda's humanoid robot. Duration: 00:54 Video provided by AFP
Powered by NewsLook.com
Yahoo's Ousted COO Gets $58M Severance Package

Yahoo's Ousted COO Gets $58M Severance Package

Newsy (Apr. 17, 2014) According to SEC filings, Yahoo gave ousted COO Henrique de Castro a $58 million severance package. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins