Download presentation
Presentation is loading. Please wait.
1
Wiretapping Christopher Simpson
2
Road Map Definition of wiretapping Laws concerning wiretapping
Legal justifications of wiretapping What wiretapping means to you Summary Conclusion
3
What is Wiretapping? Wiretapping is particular form of Electronic Surveillance that monitors telephonic and telegraphic communication
4
Old Wiretapping
6
How wiretapping works Many options, easiest would be to install another phone and take out the microphone Drawback of this method is that you would have to be listening the entire time Solution would be to install a recording device inside the phone
7
The Bug Broadcasts audio information via radio waves
Usually installed inside the phone
8
Modern Wiretapping Packet sniffing software like WireShark, Carnivore, Capsa Packet Sniffer Looks at all of your information you send and receive on your computer
9
Packet Sniffing Packet sniffer can usually be set up in one of two ways: Unfiltered - captures all of the packets Filtered - captures only those packets containing specific data elements
10
Desktop Monitoring Physically - Someone sits at the computer and installs the software. Remotely - A computer user opens an attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program
11
Legal Justifications of Wiretapping
Probable cause Patriot Act
12
Current Wiretapping Laws
Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that requires that switches in digital telephone networks be built wiretap enabled. The FBI wants to extend such requirements to IP-based communications. Electronic Communications Privacy Act
13
Does Wiretapping Concern Me?
Mandatory software vulnerabilities on computers and smart phones Make it easier to catch bad guys What if you get wrongfully arrested?
14
NSA Spying On You Installed a NarusInsight system in an AT&T switching center Monitored network traffic Extremely high-tech
15
Problems with wiretapping
Encryption Service providers outside of the U.S Peer-to-peer communication methods
16
Solution Extend CALEA so that IP-based communications be wiretap enabled In other words, purposely install security vulnerabilities in devices
17
Summary What is wiretapping Legal aspects of wiretapping
Concerns of wiretapping What it means to you
18
Conclusion Be cautious with what you say and do because you never know who may be listening
19
References https://www.privacyrights.org/fs/fs9-wrtp.htm
20
Questions???
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.