Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
The importance of digital voice-based data management in everyday communication. ABSONIC ® voice recording and management system NICOPRO USA INC -
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Nasca Internet Networking and Security viruses.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
The Communication Concepts Model: A Look into the Cellular Phone Voice Call By: Brianna Person.
Methods of communication
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
The importance of digital voice-based data management in everyday communication. ABSONIC ® voice recording and management system GALLMED Ltd. -
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
NETWORKS.
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Jump to first page Carnivore The Electronic Surveillance Tool Pedro E. Cusinga CIS450 Strayer University.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter2 Networking Fundamentals
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
Private Branch eXchange (PBX)
Sniffing and Session Hijacking Lesson 12. Session Hijacking Passive Attacker hijacks a session, but just sits back and watches and records all of the.
Computer System and Internet Misuse at the Work Place By: Kris Dimon.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Midterm review Exam is on March 8 th during class.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Modern Mobile Technologies By: Vincent Verner. Overview Mobile hardware Generation speed standards How mobile networks work Current mobile security measures.
Android and IOS Permissions Why are they here and what do they want from me?
Architecture for security monitoring in IoT environments
Systems Security Keywords Protecting Systems
Wiretapping Christopher Simpson.
Wireless Network Security
Topic 6: Issues Press F5 to view!
Intercepting Communications
Encryption, Cryptography, and Steganography:
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Firewalls Routers, Switches, Hubs VPNs
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
Jiexi Wang Master of Computer Science Program
What is keystroke logging?
Presentation transcript:

Christopher Simpson

Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you Summary Conclusion

What is Wiretapping? Wiretapping is particular form of Electronic Surveillance that monitors telephonic and telegraphic communication

Old Wiretapping

How wiretapping works Many options, easiest would be to install another phone and take out the microphone Drawback of this method is that you would have to be listening the entire time Solution would be to install a recording device inside the phone

The Bug Broadcasts audio information via radio waves Usually installed inside the phone

Modern Wiretapping Packet sniffing software like WireShark, Carnivore, Capsa Packet Sniffer Looks at all of your information you send and receive on your computer

Packet Sniffing Packet sniffer can usually be set up in one of two ways: Unfiltered - captures all of the packets Filtered - captures only those packets containing specific data elements

Desktop Monitoring Physically - Someone sits at the computer and installs the software. Remotely - A computer user opens an attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program

Legal Justifications of Wiretapping Probable cause Patriot Act

Current Wiretapping Laws Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that requires that switches in digital telephone networks be built wiretap enabled. The FBI wants to extend such requirements to IP- based communications. Electronic Communications Privacy Act

Does Wiretapping Concern Me? Mandatory software vulnerabilities on computers and smart phones Make it easier to catch bad guys What if you get wrongfully arrested?

NSA Spying On You Installed a NarusInsight system in an AT&T switching center Monitored network traffic Extremely high-tech

Problems with wiretapping Encryption Service providers outside of the U.S Peer-to-peer communication methods

Solution Extend CALEA so that IP-based communications be wiretap enabled In other words, purposely install security vulnerabilities in devices

Summary What is wiretapping Legal aspects of wiretapping Concerns of wiretapping What it means to you

Conclusion Be cautious with what you say and do because you never know who may be listening

References curity/content?g=53319&type=article&urlTitle=going- bright%3A-wiretapping-without-weakening- communications-infrastructure#top

Questions???