Government surveillance Engineering & Public Policy Lorrie - - PowerPoint PPT Presentation

government surveillance
SMART_READER_LITE
LIVE PREVIEW

Government surveillance Engineering & Public Policy Lorrie - - PowerPoint PPT Presentation

CyLab Government surveillance Engineering & Public Policy Lorrie Faith Cranor November 5, 2015 y & c S a e v c i u r P r i t e y l b L a a s b U o 8-533 / 8-733 / 19-608 / 95-818: b r a a t L o


slide-1
SLIDE 1

1

Government surveillance

Lorrie Faith Cranor

November 5, 2015 8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab

slide-2
SLIDE 2

2

Today’s agenda

  • Quiz
  • Homework discussion
  • Surveillance
  • Videos!
slide-3
SLIDE 3

3

Homework discussion

  • Select one technology you saw in the biometrics lab

– How is this biometric used for identification and/or authentication – Describe two specific applications for which this biometric is currently used – Does this technology raise privacy concerns, or or does it address privacy concerns?

  • What data collection is facilitated by sensors, beacons,

and other devices found in public spaces in NSH?

– Where are they? – What data is being collected and what is it used for? – How could people who spend time in NSH be notified?

slide-4
SLIDE 4

4

Homework discussion

  • Which location technologies work by receiving

transmissions to the device without sending any signals from the device?

– If the smartphone does not send signals to get the location why there could still be privacy concerns.

  • Elsa sees an ad for silver gloves with red rubies on

her Facebook page, just the day after she browsed on-line shops for silver gloves with red

  • rubies. Describe and draw a simple diagram

illustrating the mechanisms used to provide this ad to her.

slide-5
SLIDE 5

5

By the end of class you will be able to:

  • Be familiar with a variety of US government

surveillance programs and the privacy concerns that they raise

slide-6
SLIDE 6

6

Surveillance systems you should know about

  • Clipper chip
  • Echelon
  • TIA
  • Carnivore
  • CALEA
  • MATRIX
  • PRISM
slide-7
SLIDE 7

7

Clipper chip

  • 1993-1996
  • Chipset developed by NSA for encrypting telephone

conversations

  • Secret “Skipjack” algorithm developed by NSA used “key

escrow”

– Strength of encryption algorithm could not be publicly evaluated – Foreign countries would not want their keys escrowed by US gov

  • Serious vulnerability pointed out by Matt Blaze

– Relied on 16-bit hash that could be quickly brute-forced to substitute non-escrowed key, disabling the key escrow

slide-8
SLIDE 8

8

Echelon

  • Signals Intelligence (SIGINT) collection and analysis

networked operated by Australia, Canada, New Zealand, UK, and US

  • Created for military/diplomatic Cold War monitoring, but

evolved to monitoring civilians

  • Intercepted phone calls, fax, email, etc.
  • Uses satellite interception, undersea cables, microwave

transmission

  • Has list of keywords that are searched for automatically in

intercepted messages

slide-9
SLIDE 9

9

Total Information Awareness

  • DARPA 2002-2003
slide-10
SLIDE 10

10

Carnivore

  • 1997-2005
  • FBI system to monitor electronic communication
  • Custom packet sniffer to monitor Internet traffic
  • Physically located at an ISP or other network
  • Required used of custom filters
  • Lots of secret details, requires trust that it is legal
slide-11
SLIDE 11

11

CALEA

  • Communications Assistance for Law Enforcement Act
  • US wiretapping law passed in 1994
  • Required telecom carriers and manufacturers to modify

their equipment and facilities to allow law-enforcement surveillance

  • 2004 FCC expands CALEA to include some Internet

communications (broadband, VoIP)

  • 2013 and beyond – FBI pushing for CALEA to apply to all

Internet communications and force all companies to add backdoors for government

slide-12
SLIDE 12

12

PRISM

  • NSA surveillance program operated since 2007
  • Collects Internet communications, including

encrypted communications

– Foreign targets and US targets with a warrant

  • Many technology companies are participants

including Microsoft, Yahoo!, Google, Facebook, YouTube, AOL, Skype, Apple

  • Publically revealed by Edward Snowden in 2013
slide-13
SLIDE 13

13

Video

  • http://www.ted.com/talks/

edward_snowden_here_s_how_we_take_b ack_the_internet?language=en

slide-14
SLIDE 14

14

Discussion

  • Why do people care?
  • Why does this matter?
  • What can people do to protect themselves?
slide-15
SLIDE 15

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab