Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Why Bush's NSA Wire tapping is defeated by VoIP Networks (VIDEO)

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:15 PM
Original message
Why Bush's NSA Wire tapping is defeated by VoIP Networks (VIDEO)
Edited on Sun Oct-22-06 04:24 PM by file83
Ran across this interesting argument supporting the belief that the wiretapping program by Bush is really just a domestic surveillance program which has no intentions of intercepting phone calls of actual terrorists.

Basically, he demonstrates that by using off the shelf software/hardware, anyone can legally set up their own "voice over IP" phone network. These networks are encrypted, mobile. Terrorists have no reason to rely on the regular phone networks that Bush is tapping.

From Google Video: Why Bush's NSA Wire tapping is defeated by VoIP Networks



It's also kind of a cool idea - setting up your own phone network. Of course, I'm a nerd.

Printer Friendly | Permalink |  | Top
Holly_Hobby Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:23 PM
Response to Original message
1. Posted here....
Printer Friendly | Permalink |  | Top
 
MADem Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:25 PM
Response to Original message
2. HA!! That guy is wearing a TIA tee shirt!!! See the logo???
Printer Friendly | Permalink |  | Top
 
rman Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:36 PM
Response to Original message
3. Interesting, but i'm not so sure the NSA can't crack the encryption
Printer Friendly | Permalink |  | Top
 
bleever Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:41 PM
Response to Original message
4. Very interesting. More evidence that the NSA surveillance
is much more likely to be used to suppress and track dissent, and to spy on the opposition party's attempts to win elections.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 04:47 PM
Response to Original message
5. Ha! GREAT post. Thank you! n/t
PB
Printer Friendly | Permalink |  | Top
 
NoodleyAppendage Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 05:00 PM
Response to Original message
6. Why does he hate Amerika? Great stuff.
All valid points and a good system, but the weak link is the necessity for a static IP for the VoIP server.

J
Printer Friendly | Permalink |  | Top
 
lumberjack_jeff Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-23-06 10:40 AM
Response to Reply #6
15. I read somewhere that you can use a service like dyndns
to emulate a static address.

Using DynDns, Tor, VPN, encryption AND using asterisk (which enables the traffic on your local network to not go through vonage's systems) would seem to me to be for all practical purposes, untraceable.

The basic point is that the people who are supposed to be caught by wiretaps are the people most motivated to avoid it. Wiretaps are good for listening to democrats, not so good at listening for terrorists.
Printer Friendly | Permalink |  | Top
 
ContraBass Black Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 05:06 PM
Response to Original message
7. Vonage and some other VoIP providers have added tapping functionality
To their networks voluntarily for law enforcement's use.
Printer Friendly | Permalink |  | Top
 
hootinholler Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 05:11 PM
Response to Reply #7
8. Yes, but this technology bypasses all that...
Effectively establishing a VPN telephone network. This is actually very doable.

-Hoot
Printer Friendly | Permalink |  | Top
 
pnorman Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 05:15 PM
Response to Original message
9. That is an utter MINDBLOWER!!!
Let's all see that this is as widely promulgated as possible. (Let's also give this enough votes for it to get a "GREATEST" rating)

pnorman
Printer Friendly | Permalink |  | Top
 
redacted Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 05:53 PM
Response to Original message
10. BRILLIANT!
Printer Friendly | Permalink |  | Top
 
Festivito Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 06:36 PM
Response to Original message
11. It does have some tappable qualities.
I'd be certain the government is tapping the Internet. After all, the Internet taps the Internet just to make reports on usage. Regardless of the encryption used for the actual voice, the header data describes where the voice is going and where it came from unencrypted for all the world to see.

The individual network might encrypt the few user numbers inside the network.

However, if you know one of the endpoints you can easily read is somewhere in Pakistan, it would pique interest. Public Internet. No warrant needed. Both endpoints go on a watchlist. Collect a series of endpoints that go through the VoIP endpoint, and back and forth through the domestic endpoints. Figure how they determine a static address, e.g. buying one somewhere, getting it from a constant website, installing it on a hacked website,... You can begin to identify the enpoint users.

The de-encryption takes too long, but if really wanted such is just a matter of money and time.

Then, where is the program installed? (At one of the endpoints of course) Who bought the space? ..investigative footwork..

It's probably why he's on a watchlist. After all, we know Republicans are smart, they just are not bright enough to run a country well.
Printer Friendly | Permalink |  | Top
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-22-06 10:13 PM
Response to Reply #11
12. But if your "Phone Network Server" is communicating over the TOR
protocol, they'll never be able to locate either the source or the destination in the headers.
Printer Friendly | Permalink |  | Top
 
pnorman Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-23-06 07:24 AM
Response to Reply #12
13. TOR protocol --- that's well outside of my area of knowledge.
Edited on Mon Oct-23-06 07:32 AM by pnorman
But here's what came up: http://idtrail.org/files/Dingledine%20-%20Tor.pdf

"Intuitively", it may seem that anything we can do, Big Brother can do bigger, better, and faster. But that may be no more than Orwellian mind-fuck. Bit by bit, we're starting to learn that Big Brother (The Mighty Oz") is NOT Infallible, or All-Seeing.

pnorman
On edit: Here's another Google hit: http://petworkshop.org/2006/preproc/preproc_18.pdf Looks promising.
Printer Friendly | Permalink |  | Top
 
IronLionZion Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-23-06 10:05 AM
Response to Original message
14. Only stupid people think people are stupid.
I assure you, Law Enforcement is not stupid. They aggressively crack the encryption as if lives depend on it because they do. I just wish they needed warrants to do it.
Printer Friendly | Permalink |  | Top
 
BurningDog Donating Member (184 posts) Send PM | Profile | Ignore Mon Oct-23-06 02:59 PM
Response to Reply #14
16. Stupid has nothing to do with it.
Any sufficiently advanced encryption that is implemented securely is practically unbreakable. Its true that any encryption except a one-time pad is breakable by brute forcing the key, however the computational time required would make it impractical to try to break it because the information would either be 1)out of date because it took so long to break or 2)completely worthless anyway.

If more and more people start using encrypted links even for normal mundane conversations it would increase the amount of white noise going out encrypted over the internet, and make it even further impractical to try to break.

Its much more worrying that they're trying to mandate back doors in VOIP software by legislation and any software that doesn't have one would be illegal.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 08th 2024, 04:43 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC