SOC/CRYPTO/LAW: Establishing Big Brother using covert channels and other covert techniques

From: Chris Rasch (crasch@openknowledge.org)
Date: Tue Feb 13 2001 - 00:30:26 MST


Department of Electrical Engineering and Computer Science, University of
Wisconsin-Milwaukee, WI 53201-0784, U.S.A., e-mail:
desmedt@cs.uwm.edu

Establishing Big Brother using covert channels and other covert
techniques
Yvo Desmedt

Abstract:

Weiser's vision about computers in the next century is that they will
be ubiquitous and in MIT's Media Lab project, called Things That
Think, they will be embedded in such objects as shoes, belt buckles,
tie clasps, etc. In this paper we explain how covert technology, such
as covert channels, covert sensors and covert computing facilitates
the set up of Big Brother, for example in a society where computers
are ubiquitous. Detecting the absence of covert hardware and covert
software is actually undecidable and cryptography alone seems
inadequate to protect against the abuse of covert technology,
extending the work of Anderson regarding the limitations of
cryptography. Also, the use of covert technology to protect copyright
can be abused to suppress freedom of expression.

http://www.cs.uwm.edu/~desmedt/IH1/

http://www.cs.uwm.edu/~desmedt/IH1/



This archive was generated by hypermail 2b30 : Mon May 28 2001 - 09:56:39 MDT