Wiretapping Christopher Simpson.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

The importance of digital voice-based data management in everyday communication. ABSONIC ® voice recording and management system NICOPRO USA INC -
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Nasca Internet Networking and Security viruses.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Methods of communication
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter2 Networking Fundamentals
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
Midterm review Exam is on March 8 th during class.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Networks DEVICES. Repeater device to amplify or regenerate digital signals received while setting them from one part of a network into another. Works.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Sniffing cable modems Guy Martin HackCon 4 - Feb 2009 – Oslo.
Virtual Private Networks
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Unit Communication Hardware
Presented by: Kevin Regaldo Phillip Dai
Networking and Health Information Exchange
Architecture for security monitoring in IoT environments
Systems Security Keywords Protecting Systems
PowerPoint® Slides to Accompany
Wireless Network Security
Computer Security Fundamentals
PowerPoint® Slides to Accompany
Firewalls.
Introduction to Networks
Topic 6: Issues Press F5 to view!
Security in Networking
Computer Technology Notes #4
Intercepting Communications
IS4550 Security Policies and Implementation
PowerPoint® Slides to Accompany
Encryption, Cryptography, and Steganography:
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Click here to advance to the next slide.
Ian Ramsey C of E School GCSE ICT Smart working Any time, anywhere.
Firewalls Routers, Switches, Hubs VPNs
Network Devices Hub Definition:
Computer communications
Wireshark(Ethereal).
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
A Gift of Fire Third edition Sara Baase
Cengage Learning: Computer Networking from LANs to WANs
Jiexi Wang Master of Computer Science Program
Computer Networks Lesson 2.
Wireless Spoofing Attacks on Mobile Devices
What is keystroke logging?
Topic 12: Virtual Private Networks
Presentation transcript:

Wiretapping Christopher Simpson

Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you Summary Conclusion

What is Wiretapping? Wiretapping is particular form of Electronic Surveillance that monitors telephonic and telegraphic communication

Old Wiretapping

How wiretapping works Many options, easiest would be to install another phone and take out the microphone Drawback of this method is that you would have to be listening the entire time Solution would be to install a recording device inside the phone

The Bug Broadcasts audio information via radio waves Usually installed inside the phone

Modern Wiretapping Packet sniffing software like WireShark, Carnivore, Capsa Packet Sniffer Looks at all of your information you send and receive on your computer

Packet Sniffing Packet sniffer can usually be set up in one of two ways: Unfiltered - captures all of the packets Filtered - captures only those packets containing specific data elements

Desktop Monitoring Physically - Someone sits at the computer and installs the software. Remotely - A computer user opens an e-mail attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program

Legal Justifications of Wiretapping Probable cause Patriot Act

Current Wiretapping Laws Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that requires that switches in digital telephone networks be built wiretap enabled. The FBI wants to extend such requirements to IP-based communications. Electronic Communications Privacy Act

Does Wiretapping Concern Me? Mandatory software vulnerabilities on computers and smart phones Make it easier to catch bad guys What if you get wrongfully arrested?

NSA Spying On You Installed a NarusInsight system in an AT&T switching center Monitored network traffic Extremely high-tech

Problems with wiretapping Encryption Service providers outside of the U.S Peer-to-peer communication methods

Solution Extend CALEA so that IP-based communications be wiretap enabled In other words, purposely install security vulnerabilities in devices

Summary What is wiretapping Legal aspects of wiretapping Concerns of wiretapping What it means to you

Conclusion Be cautious with what you say and do because you never know who may be listening

References https://www.privacyrights.org/fs/fs9-wrtp.htm https://www.computer.org/portal/web/computingnow/security/content?g=53319&type=article&urlTitle=going-bright%3A-wiretapping-without-weakening-communications-infrastructure#top http://people.howstuffworks.com/wiretapping2.htm http://computer.howstuffworks.com/carnivore1.htm

Questions???