This article is about surreptitious monitoring of computer activity.
Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet.
Computer surveillance programs such as ECHELON and Carnivore are widespread today, and almost all internet traffic is closely monitored for clues of illegal activity.
Supporters say that watching all internet traffic is important, because by knowing everything that everyone is reading and writing, they can identify terrorists and criminals, and protect society from them.
Critics cite concerns over privacy and the possibility of a totalitarian state where political dissent is impossible and opponents of state policy are removed in COINTELPRO-like purges. Such a state may be referred to as an Electronic Police State, in which the government aggressively uses electronic technologies to record, organize, search and distribute forensic evidence against its citizens.
Network Surveillance
The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[1] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.[2][3][4]
Packet sniffing is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. Packet sniffers are programs that intercept these packets as they are travelling through the network, in order to examine their contents using other programs. A packet sniffer is an information gathering tool, but not an analysis tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform traffic analysis and sift through intercepted data looking for important/useful information. Under the Communications Assistance For Law Enforcement Act all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband internet traffic.
There is far too much data gathered by these packet sniffers for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted internet traffic, and filter out and report to human investigators those bits of information which are "interesting" -- such as the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.[5] Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.[6]
Similar systems are now operated by Iranian secret police to identify and suppress dissidents. All required hardware and software has been allegedly installed by German Siemens AG and Finnish Nokia [7]
Corporate Surveillance
Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or it the data can be sold to other corporations, so that they can use it for the aforementioned purpose. Or it can be used for direct marketing purposes, such as the targeted advertisements on Google and Yahoo, where ads are targeted to the user of the search engine by analyzing their search history and emails[8] (if they use free webmail services), which is kept in a database.[9]
For instance, Google, the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months.[10] Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences.[11] Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google ads adds, reads, and modifies "cookies" on each visitor's computer.[12] These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for build a profile of the user to deliver better-targeted advertising.[11]
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies (such as Google) for augmenting the profiles of individuals that it is monitoring.[9]
Malicious Software
For a more detailed discussion of topics mentioned in this section see: Spyware, Computer virus, Trojan (computer security), Keylogger, Backdoor (computing)
In addition to monitoring information sent over a computer network, there is also the need to examine data stored on a computer's hard drive, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect passwords, and/or report back activities in real-time to its operator through the Internet connection.
There are multiple ways of installing such software. The most common is remote installation, using a backdoor created by a computer virus or trojan. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Virii often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These virii and trojans are sometimes developed by government agencies, such as CIPAV and Magic Lantern. More often, however, virii created by other people or spyware installed by marketing agencies can be used to gain access through the security breaches that they create.
Another method is "cracking" into the computer to gain access over a network. An attacker can then install surveillance software remotely. Servers and computers with permanent broadband connections are most vulnerable to this type of attack.
One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc, floppy disk, or thumbdrive. This method shares a disadvantage with hardware devices in that it requires physical access to the computer.
Social Network Analysis
One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database,[13] and internet traffic data gathered under CALEA. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.[14][15][16]
Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[17][18] The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, and extremists. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.[16][19]
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
—Jason Ethier[16]
Emanations
It has been shown that it is possible to surveil computers from a distance, with only commercially available equipment, by detecting the radiation emitted by the CRT monitor. This form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.[20][21][22]
IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.
And it has also been shown, by Adi Shamir et al., that even the high frequency noise emitted by a CPU includes information about the instructions being executed.
See also
Surveillance
Carnivore
Total Information Awareness
Magic Lantern
CIPAV
ECHELON
NSA call database
TEMPEST
GhostNet
Cyber spying
References
^ Diffie, Whitfield; Susan Landau (August, 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. http://www.sciam.com/article.cfm?id=internet-eavesdropping. Retrieved 2009-03-13.
^ "CALEA Archive -- Electronic Frontier Foundation". Electronic Frontier Foundation (website). http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html. Retrieved 2009-03-14.
^ "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). http://www.eff.org/issues/calea. Retrieved 2009-03-14.
^ "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). http://www.eff.org/pages/calea-faq. Retrieved 2009-03-14.
^ Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". Associated Press (USA Today). http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm. Retrieved 2009-03-19.
^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. http://news.zdnet.com/2100-9595_22-151059.html. Retrieved 2009-03-13.
^ First round in Internet war goes to Iranian intelligence by Debka.com
^ Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. http://www.nytimes.com/2007/11/01/technology/01Privacy.html?_r=1. Retrieved 2009-03-17.
^ a b Butler, Don (February 24, 2009). "Surveillance in society". The Star Phoenix (CanWest). http://www.thestarphoenix.com/Technology/Surveillance+society/1322333/story.html. Retrieved 2009-03-17.
^ Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. http://news.cnet.com/8301-13739_3-10038963-46.html. Retrieved 2009-03-21.
^ a b Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. http://www.business-standard.com/india/news/every-move-you-make-google-will-be-watching-you/57071/on. Retrieved 2009-03-21.
^ "Advertising and Privacy". Google (company page). 2009. http://www.google.com/privacy_ads.html. Retrieved 2009-03-21.
^ Keefe, Patrick (March 12, 2006). ", Can Network Theory Thwart Terrorists?". New York Times.
^ Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday 13 (3). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949. Retrieved March 14, 2009.
^ Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN 978-3-200-01428-2. http://www.google.com/url?sa=t&source=web&ct=res&cd=3&url=http%3A%2F%2Ffuchs.icts.sbg.ac.at%2FSNS_Surveillance_Fuchs.pdf&ei=2XG7SY6PI4GEsQP2v9VI&usg=AFQjCNGKqGRfx90BvrQgdCZbfLfSLCqE5A&sig2=1THunpIf4nMT4MV79FGufQ. Retrieved March 14, 2009.
^ a b c Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. http://www.ccs.neu.edu/home/perrolle/archive/Ethier-SocialNetworks.html. Retrieved 2009-03-15.
^ Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. http://www.newscientist.com/article/mg19025556.200?DCMP=NLC-nletter&nsref=mg19025556.200. Retrieved 2009-03-16.
^ Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. http://news.cnet.com/8301-10784_3-6082047-7.html. Retrieved 2009-03-16.
^ Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs II (2). http://www.hsaj.org/?fullarticle=2.2.8. Retrieved March 14, 2009.
^ McNamara, Joel. "Complete, Unofficial Tempest Page". http://www.eskimo.com/~joelm/tempest.html. Retrieved 2009-03-12.
^ Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?". Computers & Security 4: 269–286. doi:10.1016/0167-4048(85)90046-X. http://jya.com/emr.pdf.
^ Kuhn, M.G. (2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays". 4th Workshop on Privacy Enhancing Technologies: 23–25. http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf.
Retrieved from "http://en.wikipedia.org/wiki/Computer_surveillance"
Categories: Surveillance Computer forensics Computer security
This Laptop Has EVERYTHING You Want For Gaming!
6 years ago
No comments:
Post a Comment