Wiretapping Christopher Simpson Road Map Definition of wiretapping

  • Slides: 20
Download presentation
Wiretapping Christopher Simpson

Wiretapping Christopher Simpson

Road Map �Definition of wiretapping �Laws concerning wiretapping �Legal justifications of wiretapping �What wiretapping

Road Map �Definition of wiretapping �Laws concerning wiretapping �Legal justifications of wiretapping �What wiretapping means to you �Summary �Conclusion

What is Wiretapping? �Wiretapping is particular form of Electronic Surveillance that monitors telephonic and

What is Wiretapping? �Wiretapping is particular form of Electronic Surveillance that monitors telephonic and telegraphic communication

Old Wiretapping

Old Wiretapping

How wiretapping works �Many options, easiest would be to install another phone and take

How wiretapping works �Many options, easiest would be to install another phone and take out the microphone �Drawback of this method is that you would have to be listening the entire time �Solution would be to install a recording device inside the phone

The Bug �Broadcasts audio information via radio waves �Usually installed inside the phone

The Bug �Broadcasts audio information via radio waves �Usually installed inside the phone

Modern Wiretapping �Packet sniffing software like Wire. Shark, Carnivore, Capsa Packet Sniffer �Looks at

Modern Wiretapping �Packet sniffing software like Wire. Shark, Carnivore, Capsa Packet Sniffer �Looks at all of your information you send and receive on your computer

Packet Sniffing �Packet sniffer can usually be set up in one of two ways:

Packet Sniffing �Packet sniffer can usually be set up in one of two ways: �Unfiltered - captures all of the packets �Filtered - captures only those packets containing specific data elements

Desktop Monitoring �Physically - Someone sits at the computer and installs the software. �Remotely

Desktop Monitoring �Physically - Someone sits at the computer and installs the software. �Remotely - A computer user opens an e-mail attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program

Legal Justifications of Wiretapping �Probable cause �Patriot Act

Legal Justifications of Wiretapping �Probable cause �Patriot Act

Current Wiretapping Laws �Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that

Current Wiretapping Laws �Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that requires that switches in digital telephone networks be built wiretap enabled. The FBI wants to extend such requirements to IPbased communications. �Electronic Communications Privacy Act

Does Wiretapping Concern Me? �Mandatory software vulnerabilities on computers and smart phones �Make it

Does Wiretapping Concern Me? �Mandatory software vulnerabilities on computers and smart phones �Make it easier to catch bad guys �What if you get wrongfully arrested?

NSA Spying On You �Installed a Narus. Insight system in an AT&T switching center

NSA Spying On You �Installed a Narus. Insight system in an AT&T switching center �Monitored network traffic �Extremely high-tech

Problems with wiretapping �Encryption �Service providers outside of the U. S �Peer-to-peer communication methods

Problems with wiretapping �Encryption �Service providers outside of the U. S �Peer-to-peer communication methods

Solution �Extend CALEA so that IP-based communications be wiretap enabled �In other words, purposely

Solution �Extend CALEA so that IP-based communications be wiretap enabled �In other words, purposely install security vulnerabilities in devices

Summary �What is wiretapping �Legal aspects of wiretapping �Concerns of wiretapping �What it means

Summary �What is wiretapping �Legal aspects of wiretapping �Concerns of wiretapping �What it means to you

Conclusion �Be cautious with what you say and do because you never know who

Conclusion �Be cautious with what you say and do because you never know who may be listening

References �https: //www. privacyrights. org/fs/fs 9 -wrtp. htm �https: //www. computer. org/portal/web/computingnow/se curity/content? g=53319&type=article&url.

References �https: //www. privacyrights. org/fs/fs 9 -wrtp. htm �https: //www. computer. org/portal/web/computingnow/se curity/content? g=53319&type=article&url. Title=goingbright%3 A-wiretapping-without-weakeningcommunications-infrastructure#top �http: //people. howstuffworks. com/wiretapping 2. htm �http: //computer. howstuffworks. com/carnivore 1. htm

Questions? ? ?

Questions? ? ?