Wiretapping Christopher Simpson
Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you Summary Conclusion
What is Wiretapping? Wiretapping is particular form of Electronic Surveillance that monitors telephonic and telegraphic communication
Old Wiretapping
How wiretapping works Many options, easiest would be to install another phone and take out the microphone Drawback of this method is that you would have to be listening the entire time Solution would be to install a recording device inside the phone
The Bug Broadcasts audio information via radio waves Usually installed inside the phone
Modern Wiretapping Packet sniffing software like WireShark, Carnivore, Capsa Packet Sniffer Looks at all of your information you send and receive on your computer
Packet Sniffing Packet sniffer can usually be set up in one of two ways: Unfiltered - captures all of the packets Filtered - captures only those packets containing specific data elements
Desktop Monitoring Physically - Someone sits at the computer and installs the software. Remotely - A computer user opens an e-mail attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program
Legal Justifications of Wiretapping Probable cause Patriot Act
Current Wiretapping Laws Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that requires that switches in digital telephone networks be built wiretap enabled. The FBI wants to extend such requirements to IP-based communications. Electronic Communications Privacy Act
Does Wiretapping Concern Me? Mandatory software vulnerabilities on computers and smart phones Make it easier to catch bad guys What if you get wrongfully arrested?
NSA Spying On You Installed a NarusInsight system in an AT&T switching center Monitored network traffic Extremely high-tech
Problems with wiretapping Encryption Service providers outside of the U.S Peer-to-peer communication methods
Solution Extend CALEA so that IP-based communications be wiretap enabled In other words, purposely install security vulnerabilities in devices
Summary What is wiretapping Legal aspects of wiretapping Concerns of wiretapping What it means to you
Conclusion Be cautious with what you say and do because you never know who may be listening
References https://www.privacyrights.org/fs/fs9-wrtp.htm https://www.computer.org/portal/web/computingnow/security/content?g=53319&type=article&urlTitle=going-bright%3A-wiretapping-without-weakening-communications-infrastructure#top http://people.howstuffworks.com/wiretapping2.htm http://computer.howstuffworks.com/carnivore1.htm
Questions???