[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[FYI] Israeli compromise of U.S. telecommunications?




http://www.newsmax.com/archives/articles/2001/12/18/224826.shtml

"The penetration of Comverse reportedly allowed criminals to wiretap
law enforcement communications in reverse and foil authorized wiretaps
with advance warning. One major drug bust operation planned by the
Los Angeles police was foiled by what now appear to be reverse
wiretaps placed on law enforcement phones by the criminal spy ring."


===SNIP===

From: "Elyn Wollensky" <elyn@consect.com>
To: <cypherpunks@einstein.ssz.com>
Subject: CDR: Fw: Israeli compromise of U.S. telecommunications?
Date: Thu, 20 Dec 2001 13:01:58 -0500


fwd from cryptography list:
some interesting points on CALEA -
elyn

----- Original Message ----- 
From: Ronald L. Rivest 
Sent: Thursday, December 20, 2001 10:41 AM
Subject: Israeli compromise of U.S. telecommunications?


> 
> I found the following four-part report by Carl Cameron rather shocking:
> 
> Part 1: http://www.foxnews.com/story/0,2933,40684,00.html
> Part 2: http://www.foxnews.com/story/0,2933,40747,00.html
> Part 3: http://www.foxnews.com/story/0,2933,40824,00.html
> Part 4: http://www.foxnews.com/story/0,2933,40981,00.html
> 
> Why should we be freely giving to Israeli corporations
> information (call records, CALEA information) that requires
> court orders to obtain in this country?  Such information
> is obviously sensitive, and the well-motivated efforts to
> strengthen and protect our national infrastructure should
> reasonably include mandating that such information not be
> routinely handled by any foreign entities...
> 
> A more recent story indicates that the compromise was
> probably severe; criminals were escaping detection
> because of the compromise:
>    http://www.newsmax.com/archives/articles/2001/12/18/224826.shtml
> 
> This vindicates concerns many of us have expressed
> over the years about creating single points of failure
> in wiretapping systems (e.g. the vulnerability of key
> escrow, etc.).  Of course, in this case the vulnerability
> was intentionally created, it seems, by giving critical
> capabilities to foreign entities...
> 
> Ronald L. Rivest
 
===SNAP===

-- 
To unsubscribe, e-mail: debate-unsubscribe@lists.fitug.de
For additional commands, e-mail: debate-help@lists.fitug.de