modern surveillance

14
Modern Surveillance Techniques NS 684 – Complementary Security Allison Miller 2004.07.21

Upload: webster

Post on 20-Feb-2023

1 views

Category:

Documents


0 download

TRANSCRIPT

Modern Surveillance Techniques

NS 684 – Complementary Security

Allison Miller2004.07.21

What is surveillance?

The act of observing or the condition of being observed.1

Covert vs. Overt Surveillance

Human vs. Technology Assisted

Covert vs. Overt Surveillance

Overt Surveillance Cameras in plain view

Primarily used as a deterrentCovert Surveillance

Surveillance technology hidden

Can be hidden in everyday objects

Primarily used to identify information or behavior

Defensive Surveillance

Protect, detect, recover

Protec

t

Detect

Recover Security cameras

Activity MonitoringReview Audit LogsRemote admin tools (PC Anywhere)Alarm systems (Fire, motion detection, etc.)

Offensive Surveillance

Identify targetsScan for Vulnerabilities

Gain access and root privileges

Install a backdoorPatch system

Email interceptionPacket sniffingLog/.history reviewsUser activity surveillance (whois/finger/ps)Rootkits (trojaned logins)Remote admin tools (PC Anywhere)Remote Trojan/Spyware (Netbus, BO2K)

Where is surveillance happening?

Goverment Military Intelligence Law Enforcement

Great Trojans in history – The Great Seal

Where is surveillance happening?

Individuals Digital cams (Web cams, Traffic cams, Babysitter cams)

Spyware/Adware (on the PC)

Legal issues re: covert surveillance of individuals for private use/gain vs. expectation of privacy

Where is surveillance happening?

Corporations Corporate Networks Employee surveillance

Retail security (shrinkage, employee theft, physical security) Convenience storeBank / Financial Institutions

Casino

Surveillance Technology: Physical

CCTV Legacy technology, analog

Digital camera systems Cheaper to install/maintain, usefulness as evidence?

Satellites Expensive, Can be multitasked

Grab II SIGINT satellite

Surveillance Technology: Telecom

Wire/phone tapsRadio scanners (intercept cordless phones, etc)

Bugs (in phone handset)

Surveillance Technology: Network/Digital Packet sniffers IDS (Intrusion Detection Systems)

Logging Keyboard sniffer

Issues

Fraud prevention vs. marketing National security vs. privacy Identity Theft

Legislation

Adopted Electronic Communications Privacy Act of 1986 (ECPA)

USA Patriot Act Foreign Intelligence Surveillance Act (FISA)

Utah H.B. 323: Spyware Control Act Proposed

Senate 2145: SPY BLOCK H.R. 2929: SPY ACT

Preventative Tools

Encryption http://www.pgpi.com http://www.ssh.fi

Spyware detection http://www.zonealarm.com/ http://www.spychecker.com/ http://www.safer-networking.org/en/spybotsd/index.html