It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA, also known as a bucket brigade attack, or sometimes Janus attack[citation needed]) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle)
The Clipper Chip is a cryptographic device purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone would be used to encrypt data.
The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA), a super-secret military intelligence agency responsible for intercepting foreign government communications and breaking the codes that protect such transmissions. In 1987, Congress passed the Computer Security Act, a law intended to limit NSA's role in developing standards for the civilian communications system. In spite of that legislation, the agency has played a leading role in the Clipper initiative and other civilian security proposals, such as the Digital Signature Standard. NSA has classified the Skipjack algorithm on national security grounds, thus precluding independent evaluation of the system's strength.
On Friday, the 16th of April, a sweeping new proposal for
both the promotion and control of cryptography was made public on the
front page of the New York Times and in press releases from the White
House and other organizations.
This proposal was to adopt a new cryptographic system as a
federal standard, but at the same time to keep the system's
functioning secret. The standard would call for the use of a tamper
resistant chip, called Clipper, and embody a `back door' that
will allow the government to decrypt the traffic for law enforcement
and national security purposes.
To Visa executives, there are only two kinds of people in the world: the "banked" and the "unbanked" - those with money stashed away in financial institutions and those sitting on mattresses stuffed with bills. To convert the latter, many of whom live in developing countries, Visa is waging a "battle against cash" and employing an unlikely weapon: the smartcard.
In fact, if Visa gets its way, South America, Russia, and Asia will get a taste of smartcard technology and digital cash even before the United States does. In a conference Thursday, a team of six regional Visa vice presidents unveiled a bare-bones smartcard system called COPAC (chip offline pre-authorized card), designed specifically for emerging economies where fluctuating currencies, unstable infrastructures, and bank insolvency have made the Western way of money - credit cards and ATMs - an unrealistic option.
What is Web 2.0? It is a question with many different answers. There is no clear definition of web 2.0, and like many concepts, it has taken on a life of its own. But one thing is clear: Web 2.0 marks a fundamental change in how we use the Internet.
Web 2.0 is the move toward a more social, collaborative, interactive and responsive web. It is a change in the philosophy of web companies and web developers, but more than that, Web 2.0 is a change in the philosophy of society as a whole.
Web 2.0 marks a change in us as a society as well as the Internet as a technology. In the early days of the web, we used it as a tool. Today, we aren't just using the Internet as a tool -- we are becoming a part of it.
What is Web 2.0? It is the process of putting us into the web.
Web 2.0 is a Social Web
The idea of human society merging with a network of computers might sound like the bad plot out of a pulp science fiction novel, but it is a fair description of what is happening in our society today.
Not only are we increasing our usage of the Internet -- from how much time we spend on it at home to how we are increasingly carrying around a version of it in our pocket -- but we are changing the way we interact with it.
Unintended disclosure (DISC) - Sensitive information posted publicly on a website, mishandled or sent to the wrong party via email, fax or mail.
Hacking or malware (HACK) - Electronic entry by an outside party, malware and spyware.
Payment Card Fraud (CARD) - Fraud involving debit and credit cards that is not accomplished via hacking. For example, skimming devices at point-of-service terminals.
Insider ( INSD) - Someone with legitimate access intentionally breaches information - such as an employee or contractor.
Physical loss (PHYS) - Lost, discarded or stolen non-electronic records, such as paper documents
Portable device (PORT) - Lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape, etc
Stationary device (STAT) - Lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility.
Unknown or other (UNKN)
The President today announced a new initiative that will bring
the Federal Government together with industry in a voluntary
program to improve the security and privacy of telephone
communications while meeting the legitimate needs of law
enforcement.
The initiative will involve the creation of new products to
accelerate the development and use of advanced and secure
telecommunications networks and wireless communications links.
For too long there has been little or no dialogue between our
private sector and the law enforcement community to resolve the
tension between economic vitality and the real challenges of
protecting Americans. Rather than use technology to accommodate
the sometimes competing interests of economic growth, privacy and
law enforcement, previous policies have pitted government against
industry and the rights of privacy against law enforcement.
Sophisticated encryption technology has been used for years to
protect electronic funds transfer. It is now being used to
protect electronic mail and computer files. While encryption
technology can help Americans protect business secrets and the
unauthorized release of personal information, it also can be used
by terrorists, drug dealers, and other criminals.
A state-of-the-art microcircuit called the "Clipper Chip" has
been developed by government engineers. The chip represents a
new approach to encryption technology. It can be used in new,
relatively inexpensive encryption devices that can be attached to
an ordinary telephone. It scrambles telephone communications
using an encryption algorithm that is more powerful than many in
commercial use today.
And here is the piece of the puzzle that I think we can all decide for ourselves, which category, many of us fit in.
A "key-escrow" system will be established to ensure that the "Clipper Chip" is used to protect the privacy of law-abiding Americans.
epic.org...
Now if this is from 93, what about all the "new" news being reported of communications being tapped now?
Peace, NRE.
Here is some of what I mean, its not just about you wanting your own privacy, but it now being suspicious if you choose it.
Why hide if you have nothing to hide?
Here is a white house statement made in 1993.
The President today announced a new initiative that will bring
the Federal Government together with industry in a voluntary
program to improve the security and privacy of telephone
communications while meeting the legitimate needs of law
enforcement.
The initiative will involve the creation of new products to
accelerate the development and use of advanced and secure
telecommunications networks and wireless communications links.
For too long there has been little or no dialogue between our
private sector and the law enforcement community to resolve the
tension between economic vitality and the real challenges of
protecting Americans. Rather than use technology to accommodate
the sometimes competing interests of economic growth, privacy and
law enforcement, previous policies have pitted government against
industry and the rights of privacy against law enforcement.
Sophisticated encryption technology has been used for years to
protect electronic funds transfer. It is now being used to
protect electronic mail and computer files. While encryption
technology can help Americans protect business secrets and the
unauthorized release of personal information, it also can be used
by terrorists, drug dealers, and other criminals.
A state-of-the-art microcircuit called the "Clipper Chip" has
been developed by government engineers. The chip represents a
new approach to encryption technology. It can be used in new,
relatively inexpensive encryption devices that can be attached to
an ordinary telephone. It scrambles telephone communications
using an encryption algorithm that is more powerful than many in
commercial use today.
And here is the piece of the puzzle that I think we can all decide for ourselves, which category, many of us fit in.
A "key-escrow" system will be established to ensure that the "Clipper Chip" is used to protect the privacy of law-abiding Americans.
epic.org...
Now if this is from 93, what about all the "new" news being reported of communications being tapped now?
Peace, NRE.
Originally posted by NoRegretsEver
reply to post by XPLodER
Thanks for the links I am sure that members will find it useful as well as myself, and duckduckgo is my fav, been using it forever.
Peace, NRE.
Originally posted by NoRegretsEver
Just to add there is a reason that I posted MItM (man in the middle). There has been so many threads concerning how some conspiracy theorists get info, or people that are apparent scaremongers, or even those that seem to have "news" fairly earlier than most.
I think that MItM is a huge clue to that. Just put "man in the middle" attacks into a search and see what you will find. These techniques have not only been rampant, but there are those that do this for a living.
Peace, NRE.
We never had privacy...this type of tech has been available for a long time...