fbpx
Wikipedia

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.[1]

Surveillance allows governments and other agencies to maintain social control, recognize and monitor threats or any suspicious or abnormal activity,[2] and prevent and investigate criminal activities. With the advent of programs such as the Total Information Awareness program, technologies such as high-speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.[3]

Many civil rights and privacy groups, such as Reporters Without Borders, the Electronic Frontier Foundation, and the American Civil Liberties Union, have expressed concern that increasing surveillance of citizens will result in a mass surveillance society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as Hepting v. AT&T.[3][4] The hacktivist group Anonymous has hacked into government websites in protest of what it considers "draconian surveillance".[5][6]

Network surveillance edit

The vast majority of computer surveillance involves the monitoring of personal data and traffic on the Internet.[7] For example, in the United States, the Communications Assistance For Law Enforcement Act mandates that all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.[8][9][10]

Packet capture (also known as "packet sniffing") is the monitoring of data traffic on a network.[11] Data sent between computers over the Internet or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A packet capture appliance intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform traffic analysis and sift through intercepted data to look for important/useful information. Under the Communications Assistance For Law Enforcement Act, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic. These technologies can be used both by the intelligence and for illegal activities.[12]

There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.[13] Billions of dollars per year are spent by agencies such as the Information Awareness Office, NSA, and the FBI, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.[14]

Similar systems are now used by Iranian Security dept. to more easily distinguish between peaceful citizens and terrorists. All of the technology has been allegedly installed by German Siemens AG and Finnish Nokia.[15]

The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to network monitoring. For instance, systems described as "Web 2.0"[16] have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0",[16] stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.[17] However, Internet surveillance also has a disadvantage. One researcher from Uppsala University said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".[18] Surveillance companies monitor people while they are focused on work or entertainment. Yet, employers themselves also monitor their employees. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive.[19] This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to ‘creeping’ on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".[20] The study shows that women can become jealous of other people when they are in an online group.

The virtual assistant(AI) has become a social integration into lives. Currently, virtual assistants such as Amazon's Alexa or Apple's Siri cannot call 911 or local services.[21] They are constantly listening for command and recording parts of conversations that will help improve algorithms. If the law enforcement is able to be called using a virtual assistant, the law enforcement would then be able to have access to all the information saved for the device.[21] The device is connected to the home's internet, because of this law enforcement would be the exact location of the individual calling for law enforcement.[21] While the virtual assistance devices are popular, many debates the lack of privacy. The devices are listening to every conversation the owner is having. Even if the owner is not talking to a virtual assistant, the device is still listening to the conversation in hopes that the owner will need assistance, as well as to gather data.[22]

Corporate surveillance edit

Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. The data can also be sold to other corporations so that they can use it for the aforementioned purpose, or it can be used for direct marketing purposes, such as targeted advertisements, where ads are targeted to the user of the search engine by analyzing their search history and emails[23] (if they use free webmail services), which are kept in a database.[24]

Such type of surveillance is also used to establish business purposes of monitoring, which may include the following:

  • Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring employee performance is one way to reduce unnecessary network traffic and reduce the consumption of network bandwidth.
  • Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.
  • Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks.
  • Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and potential spam or viruses.
  • Safeguarding company assets. The protection of intellectual property, trade secrets, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy.

The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.

For instance, Google Search stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months.[25] Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences.[26] Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies "cookies" on each visitor's computer.[27] These cookies track the user across all of these sites and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use to build a profile of the user to deliver better-targeted advertising.[26]

The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.[24]

Malicious software edit

In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's hard drive, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect passwords, and/or report back activities in real-time to its operator through the Internet connection.[28] A keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.

There are multiple ways of installing such software. The most common is remote installation, using a backdoor created by a computer virus or trojan. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such as CIPAV and Magic Lantern. More often, however, viruses created by other people or spyware installed by marketing agencies can be used to gain access through the security breaches that they create.[29]

Another method is "cracking" into the computer to gain access over a network. An attacker can then install surveillance software remotely. Servers and computers with permanent broadband connections are most vulnerable to this type of attack.[30] Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.[31]

One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc, floppy disk, or thumbdrive. This method shares a disadvantage with hardware devices in that it requires physical access to the computer.[32] One well-known worm that uses this method of spreading itself is Stuxnet.[33]

Social network analysis edit

One common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database,[34] and internet traffic data gathered under CALEA. These social network "maps" are then data mined to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.[35][36][37]

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[38][39] The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.[37][40]

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

— Jason Ethier[37]

Monitoring from a distance edit

With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting the radiation emitted by the CRT monitor. This form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.[41][42][43]

IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.[44][45]

In 2015, lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act.[46] At the same time in California, state senator Jerry Hill introduced a bill making law enforcement agencies to disclose more information on their usage and information from the Stingray phone tracker device.[46] As the law took into effect in January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device.[46] Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but now if a city wants to use this device, it must be heard by a public hearing.[46] Some cities have pulled out of using the StingRay such as Santa Clara County.

And it has also been shown, by Adi Shamir et al., that even the high frequency noise emitted by a CPU includes information about the instructions being executed.[47]

Policeware and govware edit

In German-speaking countries, spyware used or made by the government is sometimes called govware.[48] Some countries like Switzerland and Germany have a legal framework governing the use of such software.[49][50] Known examples include the Swiss MiniPanzer and MegaPanzer and the German R2D2 (trojan).

Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens.[51] Within the U.S., Carnivore was the first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails.[52] Magic Lantern is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging. CIPAV, deployed by the FBI, is a multi-purpose spyware/trojan.

The Clipper Chip, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “…protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.”[53] The government portrayed it as the solution to the secret codes or cryptographic keys that the age of technology created. Thus, this has raised controversy in the public, because the Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.[54]

The "Consumer Broadband and Digital Television Promotion Act" (CBDTPA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) without Digital Rights Management (DRM) that prevented access to this material without the permission of the copyright holder.[55]

Surveillance as an aid to censorship edit

Surveillance and censorship are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance.[56] And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead to self-censorship.[57]

In March 2013 Reporters Without Borders issued a Special report on Internet surveillance that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists, citizen-journalists, and dissidents. The report includes a list of "State Enemies of the Internet", Bahrain, China, Iran, Syria, and Vietnam, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet", Amesys (France), Blue Coat Systems (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future.[58]

Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone.[58][59] Individuals associated with high-profile rights organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.[60]

See also edit

References edit

  1. ^ Anne Broache. "FBI wants widespread monitoring of 'illegal' Internet activity". CNET. Retrieved 25 March 2014.
  2. ^ Jeske, Daniel R.; Stevens, Nathaniel T.; Tartakovsky, Alexander G.; Wilson, James D. (2018-04-17). "Statistical methods for network surveillance". Applied Stochastic Models in Business and Industry. 34 (4): 425–445. doi:10.1002/asmb.2326. ISSN 1524-1904.
  3. ^ a b "Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
  4. ^ "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Archived (PDF) from the original on 2022-10-09. Retrieved March 13, 2009.
  5. ^ "Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
  6. ^ Hacktivists in the frontline battle for the internet retrieved 17 June 2012
  7. ^ Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2009-03-13.
  8. ^ . Electronic Frontier Foundation (website). Archived from the original on 2009-05-03. Retrieved 2009-03-14.
  9. ^ "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
  10. ^ "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). 2007-09-20. Retrieved 2009-03-14.
  11. ^ Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. p. 131. ISBN 978-0-7355-4273-0.
  12. ^ American Council on Education vs. FCC 2012-09-07 at the Wayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
  13. ^ Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved 2009-03-19.
  14. ^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved 2009-03-13.
  15. ^ "First round in Internet war goes to Iranian intelligence", Debkafile, 28 June 2009. (subscription required)
  16. ^ a b O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
  17. ^ Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.
  18. ^ Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.
  19. ^ Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017). "Toward a Sociology of Privacy". Annual Review of Sociology. 43: 249–269. doi:10.1146/annurev-soc-060116-053643.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  20. ^ Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.
  21. ^ a b c "Should Smart Devices Be Able to Automatically Call the Cops?". How Stuff Works. 2017-07-18. Retrieved November 10, 2017.
  22. ^ "Time Alexa Takes the Stand Listening Devices Raise Privacy Issues". 4 May 2017. Retrieved November 10, 2017.
  23. ^ Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. Retrieved 2009-03-17.
  24. ^ a b Butler, Don (January 31, 2009). . The Ottawa Citizen. canada.com. Archived from the original on 22 July 2013. Retrieved 26 May 2013.
  25. ^ Soghoian, Chris (September 11, 2008). . CNET News. Archived from the original on 2011-04-29. Retrieved 2009-03-21.
  26. ^ a b Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. Retrieved 2009-03-21.
  27. ^ "Advertising and Privacy". Google (company page). 2009. Retrieved 2009-03-21.
  28. ^ "Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software", Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
  29. ^ Aycock, John (2006). Computer Viruses and Malware. Advances in Information Security. Springer. ISBN 978-0-387-30236-2.
  30. ^ "Office workers give away passwords for a cheap pen", John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.
  31. ^ "Passwords are passport to theft", The Register, 3 March 2004. Retrieved 7 September 2013.
  32. ^ "Social Engineering Fundamentals, Part I: Hacker Tactics", Sarah Granger, 18 December 2001.
  33. ^ . Antivirus.about.com. 2014-03-03. Archived from the original on 2014-04-15. Retrieved 2014-05-17.
  34. ^ Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". New York Times. Retrieved 14 March 2009.
  35. ^ Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). doi:10.5210/fm.v13i3.2142.
  36. ^ Fuchs, Christian (2009). (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN 978-3-200-01428-2. Archived from the original (PDF) on February 6, 2009. Retrieved March 14, 2009.
  37. ^ a b c Ethier, Jason (27 May 2006). "Current Research in Social Network Theory" (PDF). Northeastern University College of Computer and Information Science. Archived (PDF) from the original on 2022-10-09. Retrieved 15 March 2009.[permanent dead link]
  38. ^ Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved 2009-03-16.
  39. ^ Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Archived from the original on 2012-07-20. Retrieved 2009-03-16.
  40. ^ Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
  41. ^ McNamara, Joel (4 December 1999). . Archived from the original on 1 September 2013. Retrieved 7 September 2013.
  42. ^ Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X. (PDF) from the original on 2004-04-05.
  43. ^ Kuhn, M.G. (26–28 May 2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25.
  44. ^ Asonov, Dmitri; Agrawal, Rakesh (2004), (PDF), IBM Almaden Research Center, archived from the original (PDF) on 2012-02-27, retrieved 2013-09-08
  45. ^ Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News
  46. ^ a b c d "LA Times". Los Angeles Times. 2017-08-27. Retrieved November 10, 2017.
  47. ^ Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.
  48. ^ . News.techworld.com. Archived from the original on 29 April 2014. Retrieved 25 March 2014.
  49. ^ Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428
  50. ^ . Ejpd.admin.ch. 2011-11-23. Archived from the original on 2013-05-06. Retrieved 2014-05-17.
  51. ^ Jeremy Reimer (20 July 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica.
  52. ^ Hopper, D. Ian (4 May 2001). "FBI's Web Monitoring Exposed". ABC News.
  53. ^ Levy, Steven (12 June 1994). "New York Times". Retrieved November 10, 2017.
  54. ^ "Stanford University Clipper Chip". Retrieved November 10, 2017.
  55. ^ "Consumer Broadband and Digital Television Promotion Act" 2012-02-14 at the Wayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
  56. ^ "Censorship is inseparable from surveillance", Cory Doctorow, The Guardian, 2 March 2012
  57. ^ "Trends in transition from classical censorship to Internet censorship: selected country overviews"
  58. ^ a b The Enemies of the Internet Special Edition : Surveillance 2013-08-31 at the Wayback Machine, Reporters Without Borders, 12 March 2013
  59. ^ "When Secrets Aren’t Safe With Journalists", Christopher Soghoian, New York Times, 26 October 2011
  60. ^ Everyone's Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007

External links edit

  • "Selected Papers in Anonymity", Free Haven Project, accessed 16 September 2011.

computer, network, surveillance, this, article, about, monitoring, computer, network, activity, information, methods, preventing, unauthorized, access, computer, data, computer, security, main, articles, surveillance, mass, surveillance, global, surveillance, . This article is about monitoring of computer and network activity For information on methods of preventing unauthorized access to computer data see computer security Main articles Surveillance Mass surveillance and Global surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet This monitoring is often carried out covertly and may be completed by governments corporations criminal organizations or individuals It may or may not be legal and may or may not require authorization from a court or other independent government agencies Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored 1 Surveillance allows governments and other agencies to maintain social control recognize and monitor threats or any suspicious or abnormal activity 2 and prevent and investigate criminal activities With the advent of programs such as the Total Information Awareness program technologies such as high speed surveillance computers and biometrics software and laws such as the Communications Assistance For Law Enforcement Act governments now possess an unprecedented ability to monitor the activities of citizens 3 Many civil rights and privacy groups such as Reporters Without Borders the Electronic Frontier Foundation and the American Civil Liberties Union have expressed concern that increasing surveillance of citizens will result in a mass surveillance society with limited political and or personal freedoms Such fear has led to numerous lawsuits such as Hepting v AT amp T 3 4 The hacktivist group Anonymous has hacked into government websites in protest of what it considers draconian surveillance 5 6 Contents 1 Network surveillance 2 Corporate surveillance 3 Malicious software 4 Social network analysis 5 Monitoring from a distance 6 Policeware and govware 7 Surveillance as an aid to censorship 8 See also 9 References 10 External linksNetwork surveillance editSee also Signals intelligence The vast majority of computer surveillance involves the monitoring of personal data and traffic on the Internet 7 For example in the United States the Communications Assistance For Law Enforcement Act mandates that all phone calls and broadband internet traffic emails web traffic instant messaging etc be available for unimpeded real time monitoring by Federal law enforcement agencies 8 9 10 Packet capture also known as packet sniffing is the monitoring of data traffic on a network 11 Data sent between computers over the Internet or between any networks takes the form of small chunks called packets which are routed to their destination and assembled back into a complete message A packet capture appliance intercepts these packets so that they may be examined and analyzed Computer technology is needed to perform traffic analysis and sift through intercepted data to look for important useful information Under the Communications Assistance For Law Enforcement Act all U S telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers broadband Internet and voice over Internet protocol VoIP traffic These technologies can be used both by the intelligence and for illegal activities 12 There is far too much data gathered by these packet sniffers for human investigators to manually search through Thus automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic filtering out and reporting to investigators those bits of information which are interesting for example the use of certain words or phrases visiting certain types of web sites or communicating via email or chat with a certain individual or group 13 Billions of dollars per year are spent by agencies such as the Information Awareness Office NSA and the FBI for the development purchase implementation and operation of systems which intercept and analyze this data extracting only the information that is useful to law enforcement and intelligence agencies 14 Similar systems are now used by Iranian Security dept to more easily distinguish between peaceful citizens and terrorists All of the technology has been allegedly installed by German Siemens AG and Finnish Nokia 15 The Internet s rapid development has become a primary form of communication More people are potentially subject to Internet surveillance There are advantages and disadvantages to network monitoring For instance systems described as Web 2 0 16 have greatly impacted modern society Tim O Reilly who first explained the concept of Web 2 0 16 stated that Web 2 0 provides communication platforms that are user generated with self produced content motivating more people to communicate with friends online 17 However Internet surveillance also has a disadvantage One researcher from Uppsala University said Web 2 0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user generated self produced content We can characterize Web 2 0 surveillance as mass self surveillance 18 Surveillance companies monitor people while they are focused on work or entertainment Yet employers themselves also monitor their employees They do so in order to protect the company s assets and to control public communications but most importantly to make sure that their employees are actively working and being productive 19 This can emotionally affect people this is because it can cause emotions like jealousy A research group states we set out to test the prediction that feelings of jealousy lead to creeping on a partner through Facebook and that women are particularly likely to engage in partner monitoring in response to jealousy 20 The study shows that women can become jealous of other people when they are in an online group The virtual assistant AI has become a social integration into lives Currently virtual assistants such as Amazon s Alexa or Apple s Siri cannot call 911 or local services 21 They are constantly listening for command and recording parts of conversations that will help improve algorithms If the law enforcement is able to be called using a virtual assistant the law enforcement would then be able to have access to all the information saved for the device 21 The device is connected to the home s internet because of this law enforcement would be the exact location of the individual calling for law enforcement 21 While the virtual assistance devices are popular many debates the lack of privacy The devices are listening to every conversation the owner is having Even if the owner is not talking to a virtual assistant the device is still listening to the conversation in hopes that the owner will need assistance as well as to gather data 22 Corporate surveillance editSee also Computer surveillance in the workplace Corporate surveillance of computer activity is very common The data collected is most often used for marketing purposes or sold to other corporations but is also regularly shared with government agencies It can be used as a form of business intelligence which enables the corporation to better tailor their products and or services to be desirable by their customers The data can also be sold to other corporations so that they can use it for the aforementioned purpose or it can be used for direct marketing purposes such as targeted advertisements where ads are targeted to the user of the search engine by analyzing their search history and emails 23 if they use free webmail services which are kept in a database 24 Such type of surveillance is also used to establish business purposes of monitoring which may include the following Preventing misuse of resources Companies can discourage unproductive personal activities such as online shopping or web surfing on company time Monitoring employee performance is one way to reduce unnecessary network traffic and reduce the consumption of network bandwidth Promoting adherence to policies Online surveillance is one means of verifying employee observance of company networking policies Preventing lawsuits Firms can be held liable for discrimination or employee harassment in the workplace Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks Safeguarding records Federal legislation requires organizations to protect personal information Monitoring can determine the extent of compliance with company policies and programs overseeing information security Monitoring may also deter unlawful appropriation of personal information and potential spam or viruses Safeguarding company assets The protection of intellectual property trade secrets and business strategies is a major concern The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy The second component of prevention is determining the ownership of technology resources The ownership of the firm s networks servers computers files and e mail should be explicitly stated There should be a distinction between an employee s personal electronic devices which should be limited and proscribed and those owned by the firm For instance Google Search stores identifying information for each web search An IP address and the search phrase used are stored in a database for up to 18 months 25 Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences 26 Google is by far the largest Internet advertising agency millions of sites place Google s advertising banners and links on their websites in order to earn money from visitors who click on the ads Each page containing Google advertisements adds reads and modifies cookies on each visitor s computer 27 These cookies track the user across all of these sites and gather information about their web surfing habits keeping track of which sites they visit and what they do when they are on these sites This information along with the information from their email accounts and search engine histories is stored by Google to use to build a profile of the user to deliver better targeted advertising 26 The United States government often gains access to these databases either by producing a warrant for it or by simply asking The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring 24 Malicious software editFurther information Spyware Computer virus Trojan computer security Keylogger and Backdoor computing In addition to monitoring information sent over a computer network there is also a way to examine data stored on a computer s hard drive and to monitor the activities of a person using the computer A surveillance program installed on a computer can search the contents of the hard drive for suspicious data can monitor computer use collect passwords and or report back activities in real time to its operator through the Internet connection 28 A keylogger is an example of this type of program Normal keylogging programs store their data on the local hard drive but some are programmed to automatically transmit data over the network to a remote computer or Web server There are multiple ways of installing such software The most common is remote installation using a backdoor created by a computer virus or trojan This tactic has the advantage of potentially subjecting multiple computers to surveillance Viruses often spread to thousands or millions of computers and leave backdoors which are accessible over a network connection and enable an intruder to remotely install software and execute commands These viruses and trojans are sometimes developed by government agencies such as CIPAV and Magic Lantern More often however viruses created by other people or spyware installed by marketing agencies can be used to gain access through the security breaches that they create 29 Another method is cracking into the computer to gain access over a network An attacker can then install surveillance software remotely Servers and computers with permanent broadband connections are most vulnerable to this type of attack 30 Another source of security cracking is employees giving out information or users using brute force tactics to guess their password 31 One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc floppy disk or thumbdrive This method shares a disadvantage with hardware devices in that it requires physical access to the computer 32 One well known worm that uses this method of spreading itself is Stuxnet 33 Social network analysis editOne common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database 34 and internet traffic data gathered under CALEA These social network maps are then data mined to extract useful information such as personal interests friendships and affiliations wants beliefs thoughts and activities 35 36 37 Many U S government agencies such as the Defense Advanced Research Projects Agency DARPA the National Security Agency NSA and the Department of Homeland Security DHS are currently investing heavily in research involving social network analysis 38 39 The intelligence community believes that the biggest threat to the U S comes from decentralized leaderless geographically dispersed groups These types of threats are most easily countered by finding important nodes in the network and removing them To do this requires a detailed map of the network 37 40 Jason Ethier of Northeastern University in his study of modern social network analysis said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people In order to be successful SSNA will require information on the social interactions of the majority of people around the globe Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists it will be necessary for them to gather data on innocent civilians as well as on potential terrorists Jason Ethier 37 Monitoring from a distance editWith only commercially available equipment it has been shown that it is possible to monitor computers from a distance by detecting the radiation emitted by the CRT monitor This form of computer surveillance known as TEMPEST involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters 41 42 43 IBM researchers have also found that for most computer keyboards each key emits a slightly different noise when pressed The differences are individually identifiable under some conditions and so it s possible to log key strokes without actually requiring logging software to run on the associated computer 44 45 In 2015 lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant calling this Electronic Communications Privacy Act 46 At the same time in California state senator Jerry Hill introduced a bill making law enforcement agencies to disclose more information on their usage and information from the Stingray phone tracker device 46 As the law took into effect in January 2016 it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device 46 Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking but now if a city wants to use this device it must be heard by a public hearing 46 Some cities have pulled out of using the StingRay such as Santa Clara County And it has also been shown by Adi Shamir et al that even the high frequency noise emitted by a CPU includes information about the instructions being executed 47 Policeware and govware editIn German speaking countries spyware used or made by the government is sometimes called govware 48 Some countries like Switzerland and Germany have a legal framework governing the use of such software 49 50 Known examples include the Swiss MiniPanzer and MegaPanzer and the German R2D2 trojan Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens 51 Within the U S Carnivore was the first incarnation of secretly installed e mail monitoring software installed in Internet service providers networks to log computer communication including transmitted e mails 52 Magic Lantern is another such application this time running in a targeted computer in a trojan style and performing keystroke logging CIPAV deployed by the FBI is a multi purpose spyware trojan The Clipper Chip formerly known as MYK 78 is a small hardware chip that the government can install into phones designed in the nineties It was intended to secure private communication and data by reading voice messages that are encoded and decode them The Clipper Chip was designed during the Clinton administration to protect personal safety and national security against a developing information anarchy that fosters criminals terrorists and foreign foes 53 The government portrayed it as the solution to the secret codes or cryptographic keys that the age of technology created Thus this has raised controversy in the public because the Clipper Chip is thought to have been the next Big Brother tool This led to the failure of the Clipper proposal even though there have been many attempts to push the agenda 54 The Consumer Broadband and Digital Television Promotion Act CBDTPA was a bill proposed in the United States Congress CBDTPA was known as the Security Systems and Standards Certification Act SSSCA while in draft form and was killed in committee in 2002 Had CBDTPA become law it would have prohibited technology that could be used to read digital content under copyright such as music video and e books without Digital Rights Management DRM that prevented access to this material without the permission of the copyright holder 55 Surveillance as an aid to censorship editSee also Internet censorship and Internet censorship circumvention Surveillance and censorship are different Surveillance can be performed without censorship but it is harder to engage in censorship without some forms of surveillance 56 And even when surveillance does not lead directly to censorship the widespread knowledge or belief that a person their computer or their use of the Internet is under surveillance can lead to self censorship 57 In March 2013 Reporters Without Borders issued a Special report on Internet surveillance that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists citizen journalists and dissidents The report includes a list of State Enemies of the Internet Bahrain China Iran Syria and Vietnam countries whose governments are involved in active intrusive surveillance of news providers resulting in grave violations of freedom of information and human rights Computer and network surveillance is on the increase in these countries The report also includes a second list of Corporate Enemies of the Internet Amesys France Blue Coat Systems U S Gamma UK and Germany Hacking Team Italy and Trovicor Germany companies that sell products that are liable to be used by governments to violate human rights and freedom of information Neither list is exhaustive and they are likely to be expanded in the future 58 Protection of sources is no longer just a matter of journalistic ethics Journalists should equip themselves with a digital survival kit if they are exchanging sensitive information online storing it on a computer hard drive or mobile phone 58 59 Individuals associated with high profile rights organizations dissident groups protest groups or reform groups are urged to take extra precautions to protect their online identities 60 See also editAnonymizer a software system that attempts to make network activity untraceable Computer surveillance in the workplace Cyber spying Datacasting a means of broadcasting files and Web pages using radio waves allowing receivers near total immunity from traditional network surveillance techniques Differential privacy a method to maximize the accuracy of queries from statistical databases while minimizing the chances of violating the privacy of individuals ECHELON a signals intelligence SIGINT collection and analysis network operated on behalf of Australia Canada New Zealand the United Kingdom and the United States also known as AUSCANNZUKUS and Five Eyes GhostNet a large scale cyber spying operation discovered in March 2009 List of government surveillance projects Mass surveillance China s Golden Shield Project Mass surveillance in Australia Mass surveillance in China Mass surveillance in East Germany Mass surveillance in India Mass surveillance in North Korea Mass surveillance in the United Kingdom Mass surveillance in the United States Surveillance Surveillance by the United States government 2013 mass surveillance disclosures reports about NSA and its international partners mass surveillance of foreign nationals and U S citizens Bullrun code name a highly classified NSA program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards by obtaining master encryption keys and by gaining access to data before or after it is encrypted either by agreement by force of law or by computer network exploitation hacking Carnivore a U S Federal Bureau of Investigation system to monitor email and electronic communications COINTELPRO a series of covert and at times illegal projects conducted by the FBI aimed at U S domestic political organizations Communications Assistance For Law Enforcement Act Computer and Internet Protocol Address Verifier CIPAV a data gathering tool used by the U S Federal Bureau of Investigation FBI Dropmire a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff including those of NATO allies Magic Lantern keystroke logging software developed by the U S Federal Bureau of Investigation Mass surveillance in the United States NSA call database a database containing metadata for hundreds of billions of telephone calls made in the U S NSA warrantless surveillance 2001 07 NSA whistleblowers William Binney Thomas Andrews Drake Mark Klein Edward Snowden Thomas Tamm Russ Tice Spying on United Nations leaders by United States diplomats Stellar Wind code name code name for information collected under the President s Surveillance Program Tailored Access Operations NSA s hacking program Terrorist Surveillance Program an NSA electronic surveillance program Total Information Awareness a project of the Defense Advanced Research Projects Agency DARPA TEMPEST codename for studies of unintentional intelligence bearing signals which if intercepted and analyzed may disclose the information transmitted received handled or otherwise processed by any information processing equipmentReferences edit Anne Broache FBI wants widespread monitoring of illegal Internet activity CNET Retrieved 25 March 2014 Jeske Daniel R Stevens Nathaniel T Tartakovsky Alexander G Wilson James D 2018 04 17 Statistical methods for network surveillance Applied Stochastic Models in Business and Industry 34 4 425 445 doi 10 1002 asmb 2326 ISSN 1524 1904 a b Is the U S Turning Into a Surveillance Society American Civil Liberties Union Retrieved March 13 2009 Bigger Monster Weaker Chains The Growth of an American Surveillance Society PDF American Civil Liberties Union January 15 2003 Archived PDF from the original on 2022 10 09 Retrieved March 13 2009 Anonymous hacks UK government sites over draconian surveillance Emil Protalinski ZDNet 7 April 2012 retrieved 12 March 2013 Hacktivists in the frontline battle for the internet retrieved 17 June 2012 Diffie Whitfield Susan Landau August 2008 Internet Eavesdropping A Brave New World of Wiretapping Scientific American Retrieved 2009 03 13 CALEA Archive Electronic Frontier Foundation Electronic Frontier Foundation website Archived from the original on 2009 05 03 Retrieved 2009 03 14 CALEA The Perils of Wiretapping the Internet Electronic Frontier Foundation website Retrieved 2009 03 14 CALEA Frequently Asked Questions Electronic Frontier Foundation website 2007 09 20 Retrieved 2009 03 14 Kevin J Connolly 2003 Law of Internet Security and Privacy Aspen Publishers p 131 ISBN 978 0 7355 4273 0 American Council on Education vs FCC Archived 2012 09 07 at the Wayback Machine Decision United States Court of Appeals for the District of Columbia Circuit 9 June 2006 Retrieved 8 September 2013 Hill Michael October 11 2004 Government funds chat room surveillance research USA Today Associated Press Retrieved 2009 03 19 McCullagh Declan January 30 2007 FBI turns to broad new wiretap method ZDNet News Retrieved 2009 03 13 First round in Internet war goes to Iranian intelligence Debkafile 28 June 2009 subscription required a b O Reilly T 2005 What is Web 2 0 Design Patterns and Business Models for the Next Generation of Software O Reilly Media 1 5 Fuchs C 2011 New Media Web 2 0 and Surveillance Sociology Compass 134 147 Fuchs C 2011 Web 2 0 Presumption and Surveillance Surveillance amp Society 289 309 Anthony Denise Celeste Campos Castillo Christine Horne 2017 Toward a Sociology of Privacy Annual Review of Sociology 43 249 269 doi 10 1146 annurev soc 060116 053643 a href Template Cite journal html title Template Cite journal cite journal a CS1 maint multiple names authors list link Muise A Christofides E amp Demsmarais S 2014 Creeping or just information seeking Gender differences in partner monitoring in response to jealousy on Facebook Personal Relationships 21 1 35 50 a b c Should Smart Devices Be Able to Automatically Call the Cops How Stuff Works 2017 07 18 Retrieved November 10 2017 Time Alexa Takes the Stand Listening Devices Raise Privacy Issues 4 May 2017 Retrieved November 10 2017 Story Louise November 1 2007 F T C to Review Online Ads and Privacy New York Times Retrieved 2009 03 17 a b Butler Don January 31 2009 Are we addicted to being watched The Ottawa Citizen canada com Archived from the original on 22 July 2013 Retrieved 26 May 2013 Soghoian Chris September 11 2008 Debunking Google s log anonymization propaganda CNET News Archived from the original on 2011 04 29 Retrieved 2009 03 21 a b Joshi Priyanki March 21 2009 Every move you make Google will be watching you Business Standard Retrieved 2009 03 21 Advertising and Privacy Google company page 2009 Retrieved 2009 03 21 Spyware Workshop Monitoring Software on Your OC Spywae Adware and Other Software Staff Report U S Federal Trade Commission March 2005 Retrieved 7 September 2013 Aycock John 2006 Computer Viruses and Malware Advances in Information Security Springer ISBN 978 0 387 30236 2 Office workers give away passwords for a cheap pen John Leyden The Register 8 April 2003 Retrieved 7 September 2013 Passwords are passport to theft The Register 3 March 2004 Retrieved 7 September 2013 Social Engineering Fundamentals Part I Hacker Tactics Sarah Granger 18 December 2001 Stuxnet How does the Stuxnet worm spread Antivirus about com 2014 03 03 Archived from the original on 2014 04 15 Retrieved 2014 05 17 Keefe Patrick March 12 2006 Can Network Theory Thwart Terrorists New York Times Retrieved 14 March 2009 Albrechtslund Anders March 3 2008 Online Social Networking as Participatory Surveillance First Monday 13 3 doi 10 5210 fm v13i3 2142 Fuchs Christian 2009 Social Networking Sites and the Surveillance Society A Critical Case Study of the Usage of studiVZ Facebook and MySpace by Students in Salzburg in the Context of Electronic Surveillance PDF Salzburg and Vienna Forschungsgruppe Unified Theory of Information ISBN 978 3 200 01428 2 Archived from the original PDF on February 6 2009 Retrieved March 14 2009 a b c Ethier Jason 27 May 2006 Current Research in Social Network Theory PDF Northeastern University College of Computer and Information Science Archived PDF from the original on 2022 10 09 Retrieved 15 March 2009 permanent dead link Marks Paul June 9 2006 Pentagon sets its sights on social networking websites New Scientist Retrieved 2009 03 16 Kawamoto Dawn June 9 2006 Is the NSA reading your MySpace profile CNET News Archived from the original on 2012 07 20 Retrieved 2009 03 16 Ressler Steve July 2006 Social Network Analysis as an Approach to Combat Terrorism Past Present and Future Research Homeland Security Affairs II 2 Retrieved March 14 2009 McNamara Joel 4 December 1999 Complete Unofficial Tempest Page Archived from the original on 1 September 2013 Retrieved 7 September 2013 Van Eck Wim 1985 Electromagnetic Radiation from Video Display Units An Eavesdropping Risk PDF Computers amp Security 4 4 269 286 CiteSeerX 10 1 1 35 1695 doi 10 1016 0167 4048 85 90046 X Archived PDF from the original on 2004 04 05 Kuhn M G 26 28 May 2004 Electromagnetic Eavesdropping Risks of Flat Panel Displays PDF 4th Workshop on Privacy Enhancing Technologies Toronto 23 25 Asonov Dmitri Agrawal Rakesh 2004 Keyboard Acoustic Emanations PDF IBM Almaden Research Center archived from the original PDF on 2012 02 27 retrieved 2013 09 08 Yang Sarah 14 September 2005 Researchers recover typed text using audio recording of keystrokes UC Berkeley News a b c d LA Times Los Angeles Times 2017 08 27 Retrieved November 10 2017 Adi Shamir amp Eran Tromer Acoustic cryptanalysis Blavatnik School of Computer Science Tel Aviv University Retrieved 1 November 2011 Swiss coder publicises government spy Trojan News techworld com Archived from the original on 29 April 2014 Retrieved 25 March 2014 Basil Cupa Trojan Horse Resurrected On the Legality of the Use of Government Spyware Govware LISS 2013 pp 419 428 FAQ Haufig gestellte Fragen Ejpd admin ch 2011 11 23 Archived from the original on 2013 05 06 Retrieved 2014 05 17 Jeremy Reimer 20 July 2007 The tricky issue of spyware with a badge meet policeware Ars Technica Hopper D Ian 4 May 2001 FBI s Web Monitoring Exposed ABC News Levy Steven 12 June 1994 New York Times Retrieved November 10 2017 Stanford University Clipper Chip Retrieved November 10 2017 Consumer Broadband and Digital Television Promotion Act Archived 2012 02 14 at the Wayback Machine U S Senate bill S 2048 107th Congress 2nd session 21 March 2002 Retrieved 8 September 2013 Censorship is inseparable from surveillance Cory Doctorow The Guardian 2 March 2012 Trends in transition from classical censorship to Internet censorship selected country overviews a b The Enemies of the Internet Special Edition Surveillance Archived 2013 08 31 at the Wayback Machine Reporters Without Borders 12 March 2013 When Secrets Aren t Safe With Journalists Christopher Soghoian New York Times 26 October 2011 Everyone s Guide to By passing Internet Censorship The Citizen Lab University of Toronto September 2007External links edit Selected Papers in Anonymity Free Haven Project accessed 16 September 2011 Portal nbsp Internet Retrieved from https en wikipedia org w index php title Computer and network surveillance amp oldid 1189777580, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.