modern surveillance
TRANSCRIPT
What is surveillance?
The act of observing or the condition of being observed.1
Covert vs. Overt Surveillance
Human vs. Technology Assisted
Covert vs. Overt Surveillance
Overt Surveillance Cameras in plain view
Primarily used as a deterrentCovert Surveillance
Surveillance technology hidden
Can be hidden in everyday objects
Primarily used to identify information or behavior
Defensive Surveillance
Protect, detect, recover
Protec
t
Detect
Recover Security cameras
Activity MonitoringReview Audit LogsRemote admin tools (PC Anywhere)Alarm systems (Fire, motion detection, etc.)
Offensive Surveillance
Identify targetsScan for Vulnerabilities
Gain access and root privileges
Install a backdoorPatch system
Email interceptionPacket sniffingLog/.history reviewsUser activity surveillance (whois/finger/ps)Rootkits (trojaned logins)Remote admin tools (PC Anywhere)Remote Trojan/Spyware (Netbus, BO2K)
Where is surveillance happening?
Goverment Military Intelligence Law Enforcement
Great Trojans in history – The Great Seal
Where is surveillance happening?
Individuals Digital cams (Web cams, Traffic cams, Babysitter cams)
Spyware/Adware (on the PC)
Legal issues re: covert surveillance of individuals for private use/gain vs. expectation of privacy
Where is surveillance happening?
Corporations Corporate Networks Employee surveillance
Retail security (shrinkage, employee theft, physical security) Convenience storeBank / Financial Institutions
Casino
Surveillance Technology: Physical
CCTV Legacy technology, analog
Digital camera systems Cheaper to install/maintain, usefulness as evidence?
Satellites Expensive, Can be multitasked
Grab II SIGINT satellite
Surveillance Technology: Telecom
Wire/phone tapsRadio scanners (intercept cordless phones, etc)
Bugs (in phone handset)
Surveillance Technology: Network/Digital Packet sniffers IDS (Intrusion Detection Systems)
Logging Keyboard sniffer
Legislation
Adopted Electronic Communications Privacy Act of 1986 (ECPA)
USA Patriot Act Foreign Intelligence Surveillance Act (FISA)
Utah H.B. 323: Spyware Control Act Proposed
Senate 2145: SPY BLOCK H.R. 2929: SPY ACT
Preventative Tools
Encryption http://www.pgpi.com http://www.ssh.fi
Spyware detection http://www.zonealarm.com/ http://www.spychecker.com/ http://www.safer-networking.org/en/spybotsd/index.html