Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Eliminating Privacy Concerns for Online Access to Public Documents Nick Haralampopoulos April 16, 2003.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Security, Privacy, and Ethics Online Computer Crimes.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Computer Networks IGCSE ICT Section 4.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Introduction Our Topic: Mobile Security Why is mobile security important?
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Internet Safety Internet Safety LPM
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Prepared by Haverford High School Students “Against All Odds”
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Take Charge of your Finances
Information Security.
Wiretapping Christopher Simpson.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Take Charge of your Finances
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Wiretapping and Encryption
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Take Charge of your Finances
Presentation transcript:

Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for the benefit of others on the network Who else is a stakeholder, what is their interest? RIAA, other users of the ISP Who else would use this technique? Why? Hackers, find passwords, financial details, logons the key issue with the monitoring of Internet traffic is analyzing connections rather than content I have nothing to hide so why should I care? the government easily could get it wrong what future purposes might crop up to justify putting it to use

A Gift of Fire Encryption and Interception of Communications Overview of the Controversies Intercepting Communications Cryptography and Its Uses Encryption Policy: Access to Software, Keys, and Plaintext Fundamental Issues

Overview of the Controversies Communications Privacy Affected by: – Interception of communications, including: Telephone, , and Web activity. – Restrictions on secure encryption. Exportation of strong encryption was viewed as a threat to national security. – CALEA (Communications Assistance for Law Enforcement Act). Communications technology must assist law enforcement, not hinder. – Global surveillance systems. The constitutionality of domestic systems and the necessity of international systems are under question.

Intercepting Communications Wiretapping – Telephone: Pre-1934: used widely by government, businesses, and private sector. 1934: the Federal Communications Act disallowed unauthorized wiretaps; many ignored the law. 1968: the Omnibus Crime Control and Safe Streets Act restricted wiretapping by requiring a court order. Q : Can law enforcement intercept communications without a court order?

Intercepting Communications Wiretapping – New Technologies: 1986: Electronic Communications Privacy Act (ECPA) and its amendments restricted government interception of , cell-phones, etc : USA Patriot Act loosened restrictions on government wiretapping and communications interception. Q : Does the USA Patriot Act supersede ECPAs restrictions?

Intercepting Communications Designing Communications Systems for Interception and Tracking – Obstacles to interception: Incomplete pen-registers as a result of long distance service. Packet-mode communications ( , file transfers, Internet phones). – Solutions: CALEA: Requires telecommunications equipment be designed to ensure interception by law enforcement (with court order). Q : Why did privacy advocates object to CALEA?

Intercepting Communications Designing Communications Systems for Interception and Tracking (cont’d) – CALEA Costs include modified hardware, software, andpossible overuse by authorities. Wiretappable systems vulnerable to criminal hacking, industrial spies, etc.? Competition weakened due to restricted changes and diversities? Civil liberties threatened by nationwide standard for surveillance? In 2007, legal battles still rage between FCC (issues regulations based on the law) and civil liberty and communications interests. Makes some distinctions between who communicated with whom, and what was said in the communication. Attempts to extend to search services etc, not just p2p communications. See –EFF is a good source for 4001 topics –Is EFF a neutral site? Q : CALEA allows for the interception of PINs. Do you support this use?

Intercepting Communications Carnivore – FBI’s system to intercept with a court order. Pro: Law enforcement needs this tool to fight crime. Con: All goes through FBI’s Carnivore system. – Has also been known as Omnivore and DCS1000 – Now replaced by commercial “sniffer” software. – Installed at ISPs. Q : Does Carnivore violate the 4 th Amendment?

Intercepting Communications NSA and Echelon – NSA (National Security Agency): Collects and analyzes communications to find threats to national security. – Echelon: Member nations intercept communications for each other. Q : Should the NSA be permitted to intercept all entering and leaving the U.S.?

Intercepting Communications Much recent controversy on use of sniffers and Echelon on communications within the US under US Patriot Act – Without court order

Password security User change every 3 months policy vs issued password every 3 months policy. How does it relate? Invasion of privacy task.

Apple What technology is being used to log location? Apple also triangulates your location from cell phone towers and logs that information in order to help get a faster GPS lock (or to find your location without GPS if you're getting bad GPS signal). Users don't get to decide whether their locations are tracked via cell towers or not—unlike GPS, there is no setting that lets users turn it off, there's no explicit consent every time it happens, and there's no way to block the logging. regular people cannot access that data—law enforcement must obtain a court order before they can get it for an investigation, and your jealous spouse can't get it from the wireless company at all. What the cellco has on you is now basically being mirrored in a file on your iPhone or iPad without any kind of encryption, and is also being copied to your computer. "It is bad for privacy this file exists, especially when it doesn't seem to be linked to any particular feature that provides any benefit," Miller said. "[T]here is no easy way to wipe the data from it." Response These calculations are performed live on the iPhone using a crowd-sourced database of Wi-Fi hotspot and cell tower data that is generated by tens of millions of iPhones sending the geo-tagged locations of nearby Wi-Fi hotspots and cell towers in an anonymous and encrypted form to Apple. Apple is now collecting anonymous traffic data to build a crowd-sourced traffic database with the goal of providing iPhone users an improved traffic service in the next couple of years. As Apple rushed to allay privacy concerns over its handling of location data, it also let slip that it was working on a "crowd-sourced traffic database". Now a patent application dating from 2009 has been made public which suggests Apple is thinking of this technology not merely as an add-on to iOS Maps, but as something which could feed into other areas such as calendars and alarms. The implicit suggestion is that if Apple can figure out how long it will take you to get from A to B, then it should be able to adjust your appointments to make sure you get there on time without having to go on a rampage. Until then, if everyone just stays out of the way, then no one will get hurt.privacy concernslet slip

Census E-Census. Stakeholders? Advantages? Disadvantages? The primary objective of the proposal is to create a Statistical Longitudinal Census Dataset (the SLCD) … In response to the privacy risks highlighted by the Australian Privacy Foundation and other concerned organisations and individuals, the ABS changed its proposal to only cover 5% of the population, instead of the entire population.

Articles on Google Wiretapping and Mobile Pinging