CS551: Security and Privacy on the Internet, Fall 2000
Manifest: Monday 27 November
- Wednesday 29 November, before class (or Friday 1 December, 5:00pm for early project presenters): Problem Set 4
- Wednesday 29 November: Team 1-3, 10-12 Project Presentations
- Monday, 4 December: Team 4-9 Project Presentations
- Wednesday, 6 December (before class): Project Reports
- Monday, 11 December (5:00pm): Final Due
- Echelon - ZDNet news special, June 2000.
- Somebody's listening, New Statesman, August 1988.
- Echelon Watch
- Buy a TEMPEST monitoring device (if you are an "authorized government agency")
- Declassified NSA TEMPSET documents
- Ross Anderson and Markus Kuhn, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, 1998.
- FBI's Carnivore site, Stop Carnivore
- David Mazires and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server., 1998.
- The Dining Cryptographers Problem, David Chaum, 1988.
- Andre Bacard's Remailer FAQ
- Rewebber.com, http://www.rewebber.com/surf_encrypted/MTCoBvzpGVZK9u3mF6IruNXnD1andOtptXwL1O4agNRvSIRYyC51AnLpReI8P5eD14U8eS+BqrJddR6B5tj8BLGcLdTMG9RFUKRwGD$qfYScvLePc9CD8lamTvmZnP28xJs=.
There was of course no way of knowing whether you were being watched at any given moment...You had to live --- did live, from habit that became instinct --- in the assumption that every sound you made was overheard and, except in darkness, every movement scrutinized.
- Is annonymity a right?
- How can email be sent anonymously?
- How can tamper-proof documents be published anonymously?
George Orwell, 1984
That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide.
Senator Frank Church, 1975
University of Virginia
Department of Computer Science
CS 551: Security and Privacy on the Internet