[11456] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: TCPA/Palladium -- likely future implications (Re: dangers of

daemon@ATHENA.MIT.EDU (Peter Fairbrother)
Sun Aug 11 19:47:31 2002

X-Envelope-To: adam@cypherspace.org
Date: Sun, 11 Aug 2002 19:09:22 +0100
From: Peter Fairbrother <zenadsl6186@zen.co.uk>
To: Adam Back <adam@cypherspace.org>,
	Seth David Schoen <schoen@loyalty.org>,
	"R. Hirschfeld" <ray@unipay.nl>, <peternbiddle@hotmail.com>
Cc: Cryptography <cryptography@wasabisystems.com>,
	Cypherpunks <cypherpunks@minder.net>
In-Reply-To: <20020809221356.A637432@exeter.ac.uk>

Adam Back wrote:
[...]
> - It is always the case that targetted people can have hardware
> attacks perpetrated against them.  (Keyboard sniffers placed during
> court authorised break-in as FBI has used in mob case of PGP using
> Mafiosa [1]).

[...]

> [1] "FBI Bugs Keyboard of PGP-Using Alleged Mafioso", 6 Dec 2000,
> slashdot

That was a software keylogger (actually two software keyloggers), not
hardware. 

(IMO Scarfo's lawyers should never have dealt, assuming the evidence was
necessary for a conviction, but the FBI statement about the techniques used
was probably too obfuscated for them - it took me a good week to understand
it. I emailed them, but got no reply.

Incidently, Nicky Scarfo used his father's prison number for the password,
so a well researched directed dictionary attack would have worked anyway.)


The FBI reputedly can (usually, on Windows boxen) now install similar
software keyloggers remotely, without needing to break in.


-- Peter Fairbrother


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post