On Thu, 17 Dec 2009 18:33:53 -0800 (PST), Le Chaud Lapin
<***@gmail.com> wrote:
>On Dec 17, 7:15 pm, David Schwartz <***@webmaster.com> wrote:
>> Passing encrypted video over a satellite network built for unencrypted
>> analog video is not a trivial challenge. As far as I know, there
>> exists no scheme to do this that has not been broken already. The
>> problem is that encryption works partly by diffusing information so
>> that no part of the output looks like any part of the input. The
>> satellite link is filled with errors and distortion that have to be
>> contained to retain adequate video quality.
>
>????
>
>Data encryption of the kind that they need for someone who is
>experienced in cryptography is near-trivial. The biggest problem,
>which is not a problem in this particular case, is key distribution.
Even that is no problem for an experienced cryptographer. A little
public key magic and all done. ;-)
>Maybe I misunderstand, but the system, based on this link:
>
>http://www.skygrabber.com/en/skygrabber.php
>
>...looks like it is entirely in the digital domain.
>
>If that is true, encryption, under the scenarios required by US DoD,
>would take maybe 3 weeks using Rijndael or other symmetric cipher for
>a rough run, and maybe a month more by a crypto expert to remove the
>fatal flaws.
Likely wouldn't even need that. The video has a shelf life. It
needn't be secure for a generation.
>The more I think about this, the more I find it hard to believe that
>the people who designed the communications of the Predator could be
>so...ahem....
>
>A more plausible, conspiracy-theorist, explanation might be this:
>
>The US Military realizes that al-Quaeda/Taliban are becoming more and
>more sophisticated in their employment of technology such as laptop
>computers, desktoop computers, networks, smartphones with Internet
>connections, etc. Ideally, one could inject a nerd-mole into these
>groups to infiltrate their computer systems, but that would be
>expensive, hit-or-miss, and if he is caught, he would be surely
>executed.
>
>A much easier alternative would be to fake a breach of your own
>security system, then publicize widely exactly how it was breached:
>via software that is readily avaialble on Internet. Make the software
>ridiculously cheap, since most terrorists do not have Bin Laden's
>billions. Then wait for the fish.
That's my conspiracy theory of the day. ;-)
>Every terrorist and wannabe-terrorist who wants to be able to break
>into US military satellite com's will visit the web site, whereupon IP
>addresses and times of visit will be collected into a database,
>creating a nice map (using Google Earth of course) of distribution of
>terrorists. Furthermore, by clandestine agrement with author of
>software, a root-kit will be built into the software. When terrorists'
>computers become infected by the download, the military will be able
>to receive highly valuable information from infected computers. If
>military is fortunate, these computers will occasionally become
>networked, in which case, the virus could propagate.
>
>Yes, it's a long shot, but give me a break...a $10 million drone,
>under a multi-billion-dollar program, designed by Ph.D's in electrical
>engineering, computer science, and aero/astro, and they forget
>something as simple as a little symmetric crypto? NSA, which has last
>say in all crypto/data security matters, would have/should have never
>allowed this.
>
>Smells fishy.
>
>-Le Chaud Lapin-