Spy Systems How do the Echelon Spy system may work.

Slides:



Advertisements
Similar presentations
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Advertisements

TYPES OF COMPUTER NETWORKS
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
P1g(ii) Wireless Signals You will learn about: How radio signals are transmitted around the Earth How radio waves are diffracted
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Section 3: Radio Communication Radio Transmission – The music and the words are sent to the radio by radio waves. – The radio’s metal antenna detects the.
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
Lecture Week 2 Networks, The Internet and the World Wide Web.
ICT at Work Global Communication.
Company LOGO Ways of Communicating in Australia Developed by.
Communications and Networks Chapter 8 in Discovering Computers Fundamentals.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
COMMUNICATION GADGETS
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Understanding Networks. What is a Network?  A network consists of two or more computers that are linked in order to share resources (such as printers.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
The Internet and Multimedia Chapter 2. How the Internet Developed The Internet grew out of the Cold Ware between the United States and the Soviet Union.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
Extended Learning Module D
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Living Online Module Lesson 23 — Networks and Telecommunication
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Computers Are Your Future Eleventh Edition Chapter 8: Wired & Wireless Communication Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1Prepared by:Mazhar Javed Awan Paper work For many years offices were dominated by paper. For many years offices were dominated by paper. Everything was.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
The seven layers of the OSI Model are: Basics of Networking.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
Telemedicine, Communications and Health Information Maria Zolfo.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
 It is the transmission of data from one place to another.  A data communication system is made up from hardware, software and communications facilities.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
Why Do We Use Computers For Communication?. Read the words and make up the word combinations fax phone electronic to receive to send printed to use computer.
People to People Communication Technology Education.
Communications & Networks National 4 & 5 Computing Science.
Networking… By: Allan Joe Next page.
By: D’Kihya Cooper.  The first messages are sent.
Higher Computing Networking. Networking – Local Area Networks.
Match these words to the letters in the picture.. screen, monitor, keyboard, mouse, microphone, speakers, system unit.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Slide No. 1 Chapter 1, Unit c Data Communications H Telecommunications H LANs, WANs and Intranets.
TELECOMMUNICATIONS AND NETWORKS ~ Pertemuan 8 ~ Oleh: Ir. Abdul Hayat, MTI.
Subject: Information Technology Grade: 9
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected.
Computer Technology Semester 2 Final Exam Review.
IC 3 BASICS, Internet and Computing Core Certification Computing Fundamentals Lesson 1 What Is a Computer?
Paula Valdez 10MO ALFA BASIC CONCEPTS OF NETWORK.
UNIT 4 NETWORK ENVIRONMENTS.
The Internet and Multimedia
Professional Web Designing For Absolute Beginners
Progress leisure OCR GCSE ICT.
Lecture 5: TELEPHONE NETWORK
Computers Are Your Future
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
ELECTROMAGNETIC WAVES Radio Communication
Lecture 5: TELEPHONE NETWORK.
Lecture 3: TELEPHONE NETWORK.
Presentation transcript:

Spy Systems How do the Echelon Spy system may work.

How Spy Systems Work At the present time, Echelon monitors virtually all electronic signals made in the entire world. At the present time, Echelon monitors virtually all electronic signals made in the entire world. Currently, apart from mobile phones, almost all transmissions -- phone calls, faxes or -- are sent through telephone lines to junctions/exchanges where they are redirected to the next part of their journey. Mobile phones operate in a similar fashion, except without the land-line: they transmit a signal to a receiving station which then sends the signal to an exchange for further direction. Currently, apart from mobile phones, almost all transmissions -- phone calls, faxes or -- are sent through telephone lines to junctions/exchanges where they are redirected to the next part of their journey. Mobile phones operate in a similar fashion, except without the land-line: they transmit a signal to a receiving station which then sends the signal to an exchange for further direction.

How Spy Systems Work After processing to assess its end target, the signal is then redirected to either a land based line, a sea based line, or a microwave or satellite link, depending on the final destination. What Echelon does is scoop up all the information at one or more of these points, then sift through it, using a massive number of supercomputers, looking for anything of interest. After processing to assess its end target, the signal is then redirected to either a land based line, a sea based line, or a microwave or satellite link, depending on the final destination. What Echelon does is scoop up all the information at one or more of these points, then sift through it, using a massive number of supercomputers, looking for anything of interest.

How Spy Systems Work It gathers the signals through a variety of means. Satellites can be monitored with satellite dishes or other satellites: when the communications satellite receives or beams down it's signal, another satellite or dish can also listen in on that same signal. Land and sea lines can be tapped, too, at points along the route or at points within telephone exchanges: this, of course, would probably require a degree of formal or informal co-operation from the telephone companies, or some clever covert work. Microwave signals between cities can either be monitored through land dishes or from eavesdropping satellites, depending on the country. Underwater optical fibre cables would probably be the hardest to illicitly monitor, although the extent to which a number of telecommunications companies are formally or tacitly complicit with the Echelon system might possibly render such points academic It gathers the signals through a variety of means. Satellites can be monitored with satellite dishes or other satellites: when the communications satellite receives or beams down it's signal, another satellite or dish can also listen in on that same signal. Land and sea lines can be tapped, too, at points along the route or at points within telephone exchanges: this, of course, would probably require a degree of formal or informal co-operation from the telephone companies, or some clever covert work. Microwave signals between cities can either be monitored through land dishes or from eavesdropping satellites, depending on the country. Underwater optical fibre cables would probably be the hardest to illicitly monitor, although the extent to which a number of telecommunications companies are formally or tacitly complicit with the Echelon system might possibly render such points academic

How Spy Systems Work Once the information is gathered and directed to central processing areas, Echelon searches through it all for selected words. Advanced speech recognition software is apparently used to sort through telephone calls, and keyword recognition software searches through and faxes. Once the information is gathered and directed to central processing areas, Echelon searches through it all for selected words. Advanced speech recognition software is apparently used to sort through telephone calls, and keyword recognition software searches through and faxes. The Echelon keyword detection system probably works in a similar way to a standard internet search engine. The Echelon keyword detection system probably works in a similar way to a standard internet search engine.

How Spy Systems Work With a search engine, you can type in a word and the engine searches -- sometimes through hundreds or thousands of gigabytes or terabytes of stored data -- until it finds a match or matches to your query, and it then directs the matches onto a page. The Echelon system apparently works in a remarkably similar way, except it processes the searches in real time as the data is sent, or just trawls and filters all transmissions looking for word matches. Having found any match, it will then - - most likely -- save the find for human or machine inspection: it's fairly likely that a relatively small number of human operators could monitor the transmissions of the entire English-speaking world. With a search engine, you can type in a word and the engine searches -- sometimes through hundreds or thousands of gigabytes or terabytes of stored data -- until it finds a match or matches to your query, and it then directs the matches onto a page. The Echelon system apparently works in a remarkably similar way, except it processes the searches in real time as the data is sent, or just trawls and filters all transmissions looking for word matches. Having found any match, it will then - - most likely -- save the find for human or machine inspection: it's fairly likely that a relatively small number of human operators could monitor the transmissions of the entire English-speaking world.