Download presentation
Presentation is loading. Please wait.
Published bySteven Montgomery Modified over 9 years ago
1
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work
2
Introduction Hackers aren’t the only ones who want to monitor activity Government has reason to monitor activity Law enforcement reasons Anti-terrorism reasons Businesses have reasons as well Worker productivity Hostile workplace Harassment
3
Introduction Civil libertarians uncomfortable See possibilities for abuse Invasion of individual’s privacy Erosion of personal freedoms Abuse by government
4
Echelon
5
Echelon Echelon is believed to be run by a consortium of nations including: National Security Agency (NSA) Ft. Meade, Md United Kingdom (Gov’t Communications HQ) Canada (Comm. Security Establishment) Australia (Defence Signals Directorate) New Zealand (Gov’t Comm. Security Bureau)
6
Echelon Believed to be able to monitor a large proportion of the world’s transmitted telephone, data, and fax traffic Sites in Sugar Grove, West Virginia Inbound from east Yakima, Washington Inbound from west Harrogate, Yorkshire
7
Echelon
8
Echelon
9
Echelon Note: There is no definitive proof of the following It is based on the author’s evaluation of some public resources This is a general outline only Listening stations worldwide point satellite dishes towards international communications satellites Used by most of the world
11
Echelon Intelsat 907 Part of the Intelsat constellation Simultaneously handles tens of thousands of Telephone Fax Emails Other digital communications
13
Echelon Satellites not only means of communications Undersea cables Land-based systems Microwave networks Echelon is believed to tap into each of these in different ways
14
Echelon
15
Echelon Captured data separated into two streams Encrypted Unencrypted Encrypted communications are sent to supercomputers to try to decrypt them Intercepts sent to dictionary computers at listening centers
16
Echelon Search for key words and phrases related to Terrorism Nuclear & biological warfare May come from foreign governments Communications with relevant keywords stored in Echelon permanently Includes name of dictionary computer that processed the data – Cowboy for example
17
Echelon Keyworded communications sent via secure links to regional Echelon headquarters Analyzed by communications and intelligence experts Sent to intelligence agencies both inside and outside the U.S.
18
Carnivore
19
Carnivore Carnivore was an FBI packet sniffer system Outgrowth of 1997 Omnivore Tracking people’s Internet use Emails Web sites visited Special software running on a Windows PC Installed in ISP data center No keyboard or monitor ISP had no control
20
Carnivore Intercepts large volumes of email 6 GB per hour Scans subject lines and headers of traffic Useful data copied to 2 GB removable hard drives Controlled via secure remote access by FBI Dedicated phone line
21
Carnivore Installation based on a wiretap warrant Might be very restrictive (email only) Ethernet tap copied packets and forwarded to Carnivore Filters set in local box controlled access Only packets meeting certain criteria were captured Others discarded
22
Carnivore Removable hard drive sent to FBI periodically Data examined by Packeteer Reassembled individual packets into messages CoolMiner Analysis tool Carnivore, Packeteer, CoolMiner Known as the DragonWare Suite
23
Carnivore Following negative press, FBI changed designation to DCS1000 Digital Collection System FBI retired Carnivore in 2001 Commercially available software replaced it
24
Workplace Surveillance Employers use packet sniffers to monitor employee behavior on the Internet Unfiltered sniffers capture every packet Filtered sniffers (like Carnivore) capture only packets with special characteristics Packets saved to a log file Tech support can reconstruct employee’s Internet behavior
25
Workplace Surveillance Sex! Sex! Sex! No problem with Stuff.com Bicycles.org Alerts for Sex.com Kinky.com Singles.com
26
Workplace Surveillance Keystroke loggers also used Installed on employees computers without their knowledge Record of every keystroke available for analysis Every document Every email
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.