>* "IP number capturing" software
>* "chat monitoring" software
>* "image matching" software
>* "steganography detection" software
>* a "framework for a program" to enable remotely searching subjects' PCs.
>
>Any of these could raise some obvious concerns.  I'm curious if anyone
>might have a clear idea what "image matching software" is, and whether
>"steganography detection software" is even feasible and what one might
>do to defeat it.  The others are fairly obivious in both intent and
>viability.

Re image matching - see <http://www.newsbytes.com/pubNews/00/153556.html> 
for a press release from a private company today who are (trying to decode 
the PR-speak) using hashing to match files.

The problem with using that technology with intercepts is that data over 
the wire will be packetized; so the surveilling software will need to 
reassemble streams of data to compare, or else store hashes of common 
packet sizes (like the max packet size for PPP, which is around 1500 bytes, 
IIRC). That still won't work well where the first packet is going to have a 
bunch of crap (err, headers) meant for interpretation by a requesting web 
browser - would probably work better for FTP's or Napster-like transfers.

(Sure, it's possible to do the stream reassembly and header-stripping, but 
harder to do in realtime for appreciable bandwidth.)

For stego detection, seems like it wouldn't be so hard to build a profile 
for expected entropy as a function of filetype and size, then look for 
out-of-profile traffic. See above for practical limits.

Yesterday's Murky News (I left my copy on the train, alas) said that they 
got special access to the plea agreement in the Naughton case via a motion 
before the sentencing judge.

--
Greg Broiles
[EMAIL PROTECTED]

Reply via email to