Presentation is loading. Please wait.

Presentation is loading. Please wait.

ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.

Similar presentations


Presentation on theme: "ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work."— Presentation transcript:

1 ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work

2 Introduction  Hackers aren’t the only ones who want to monitor activity  Government has reason to monitor activity  Law enforcement reasons  Anti-terrorism reasons  Businesses have reasons as well  Worker productivity  Hostile workplace  Harassment

3 Introduction  Civil libertarians uncomfortable  See possibilities for abuse  Invasion of individual’s privacy  Erosion of personal freedoms  Abuse by government

4 Echelon

5 Echelon  Echelon is believed to be run by a consortium of nations including:  National Security Agency (NSA)  Ft. Meade, Md  United Kingdom (Gov’t Communications HQ)  Canada (Comm. Security Establishment)  Australia (Defence Signals Directorate)  New Zealand (Gov’t Comm. Security Bureau)

6 Echelon  Believed to be able to monitor a large proportion of the world’s transmitted telephone, data, and fax traffic  Sites in  Sugar Grove, West Virginia  Inbound from east  Yakima, Washington  Inbound from west  Harrogate, Yorkshire

7 Echelon

8 Echelon

9 Echelon  Note:  There is no definitive proof of the following  It is based on the author’s evaluation of some public resources  This is a general outline only  Listening stations worldwide point satellite dishes towards international communications satellites  Used by most of the world

10

11 Echelon  Intelsat 907  Part of the Intelsat constellation  Simultaneously handles tens of thousands of  Telephone  Fax  Emails  Other digital communications

12

13 Echelon  Satellites not only means of communications  Undersea cables  Land-based systems  Microwave networks  Echelon is believed to tap into each of these in different ways

14 Echelon

15 Echelon  Captured data separated into two streams  Encrypted  Unencrypted  Encrypted communications are sent to supercomputers to try to decrypt them  Intercepts sent to dictionary computers at listening centers

16 Echelon  Search for key words and phrases related to  Terrorism  Nuclear & biological warfare  May come from foreign governments  Communications with relevant keywords stored in Echelon permanently  Includes name of dictionary computer that processed the data – Cowboy for example

17 Echelon  Keyworded communications sent via secure links to regional Echelon headquarters  Analyzed by communications and intelligence experts  Sent to intelligence agencies both inside and outside the U.S.

18 Carnivore

19 Carnivore  Carnivore was an FBI packet sniffer system  Outgrowth of 1997 Omnivore  Tracking people’s Internet use  Emails  Web sites visited  Special software running on a Windows PC  Installed in ISP data center  No keyboard or monitor  ISP had no control

20 Carnivore  Intercepts large volumes of email  6 GB per hour  Scans subject lines and headers of traffic  Useful data copied to 2 GB removable hard drives  Controlled via secure remote access by FBI  Dedicated phone line

21 Carnivore  Installation based on a wiretap warrant  Might be very restrictive (email only)  Ethernet tap copied packets and forwarded to Carnivore  Filters set in local box controlled access  Only packets meeting certain criteria were captured  Others discarded

22 Carnivore  Removable hard drive sent to FBI periodically  Data examined by  Packeteer  Reassembled individual packets into messages  CoolMiner  Analysis tool  Carnivore, Packeteer, CoolMiner  Known as the DragonWare Suite

23 Carnivore  Following negative press, FBI changed designation to DCS1000  Digital Collection System  FBI retired Carnivore in 2001  Commercially available software replaced it

24 Workplace Surveillance  Employers use packet sniffers to monitor employee behavior on the Internet  Unfiltered sniffers capture every packet  Filtered sniffers (like Carnivore) capture only packets with special characteristics  Packets saved to a log file  Tech support can reconstruct employee’s Internet behavior

25 Workplace Surveillance  Sex! Sex! Sex!  No problem with  Stuff.com  Bicycles.org  Alerts for  Sex.com  Kinky.com  Singles.com

26 Workplace Surveillance  Keystroke loggers also used  Installed on employees computers without their knowledge  Record of every keystroke available for analysis  Every document  Every email


Download ppt "ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work."

Similar presentations


Ads by Google