ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.

Slides:



Advertisements
Similar presentations
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Advertisements

HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
A Guide to major network components
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
ICT at Work Global Communication.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
The Office Procedures and Technology
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Cyber Crimes.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Networking LAN (Local Area Network)  A network is a collection of computers that communicate with each other through a shared network medium.  LANs.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
©2004 West Legal Studies in Business A Division of Thomson Learning 1 Cyberlaw –Law governing the use of computers and the Internet –Made up of state and.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Jump to first page Carnivore The Electronic Surveillance Tool Pedro E. Cusinga CIS450 Strayer University.
Networks.
1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Spy Systems How do the Echelon Spy system may work.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
What is the Internet? A world-wide computer network made up of tens of thousands of smaller networks. It’s the biggest network of all! So, what is a network?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Best Free Key logger Download Computer & Internet Monitoring Software.
Computer Data Security & Privacy
Wiretapping Christopher Simpson.
Intercepting Communications
Introduction to Computer Concept
Computer Security Social Legal and Ethical issues
What is keystroke logging?
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work

Introduction  Hackers aren’t the only ones who want to monitor activity  Government has reason to monitor activity  Law enforcement reasons  Anti-terrorism reasons  Businesses have reasons as well  Worker productivity  Hostile workplace  Harassment

Introduction  Civil libertarians uncomfortable  See possibilities for abuse  Invasion of individual’s privacy  Erosion of personal freedoms  Abuse by government

Echelon

Echelon  Echelon is believed to be run by a consortium of nations including:  National Security Agency (NSA)  Ft. Meade, Md  United Kingdom (Gov’t Communications HQ)  Canada (Comm. Security Establishment)  Australia (Defence Signals Directorate)  New Zealand (Gov’t Comm. Security Bureau)

Echelon  Believed to be able to monitor a large proportion of the world’s transmitted telephone, data, and fax traffic  Sites in  Sugar Grove, West Virginia  Inbound from east  Yakima, Washington  Inbound from west  Harrogate, Yorkshire

Echelon

Echelon

Echelon  Note:  There is no definitive proof of the following  It is based on the author’s evaluation of some public resources  This is a general outline only  Listening stations worldwide point satellite dishes towards international communications satellites  Used by most of the world

Echelon  Intelsat 907  Part of the Intelsat constellation  Simultaneously handles tens of thousands of  Telephone  Fax  s  Other digital communications

Echelon  Satellites not only means of communications  Undersea cables  Land-based systems  Microwave networks  Echelon is believed to tap into each of these in different ways

Echelon

Echelon  Captured data separated into two streams  Encrypted  Unencrypted  Encrypted communications are sent to supercomputers to try to decrypt them  Intercepts sent to dictionary computers at listening centers

Echelon  Search for key words and phrases related to  Terrorism  Nuclear & biological warfare  May come from foreign governments  Communications with relevant keywords stored in Echelon permanently  Includes name of dictionary computer that processed the data – Cowboy for example

Echelon  Keyworded communications sent via secure links to regional Echelon headquarters  Analyzed by communications and intelligence experts  Sent to intelligence agencies both inside and outside the U.S.

Carnivore

Carnivore  Carnivore was an FBI packet sniffer system  Outgrowth of 1997 Omnivore  Tracking people’s Internet use  s  Web sites visited  Special software running on a Windows PC  Installed in ISP data center  No keyboard or monitor  ISP had no control

Carnivore  Intercepts large volumes of  6 GB per hour  Scans subject lines and headers of traffic  Useful data copied to 2 GB removable hard drives  Controlled via secure remote access by FBI  Dedicated phone line

Carnivore  Installation based on a wiretap warrant  Might be very restrictive ( only)  Ethernet tap copied packets and forwarded to Carnivore  Filters set in local box controlled access  Only packets meeting certain criteria were captured  Others discarded

Carnivore  Removable hard drive sent to FBI periodically  Data examined by  Packeteer  Reassembled individual packets into messages  CoolMiner  Analysis tool  Carnivore, Packeteer, CoolMiner  Known as the DragonWare Suite

Carnivore  Following negative press, FBI changed designation to DCS1000  Digital Collection System  FBI retired Carnivore in 2001  Commercially available software replaced it

Workplace Surveillance  Employers use packet sniffers to monitor employee behavior on the Internet  Unfiltered sniffers capture every packet  Filtered sniffers (like Carnivore) capture only packets with special characteristics  Packets saved to a log file  Tech support can reconstruct employee’s Internet behavior

Workplace Surveillance  Sex! Sex! Sex!  No problem with  Stuff.com  Bicycles.org  Alerts for  Sex.com  Kinky.com  Singles.com

Workplace Surveillance  Keystroke loggers also used  Installed on employees computers without their knowledge  Record of every keystroke available for analysis  Every document  Every