Types of Surveillance Technology Currently Used by Governments

Download Report

Transcript Types of Surveillance Technology Currently Used by Governments

Types of Surveillance
Technology Currently Used
by Governments and
Corporations
Jeffrey Aresty
President, Internetbar.org
www.internetbar.org
www.cyberspaceattorney.com
March 2006
Introduction

At present, users obtain various online
identities (“IDs”) from





E-mail
ISPs
URLs
IDs function on the Internet in anonymous
space—an online “ID” does not actually
identify the person connected with the ID
Anonymity facilitates theft, fraud, and abuse
2
Introduction



In contrast, in the works are efforts to create
a new layer of identity
Focusing on the user, the new system would
not require multiple online IDs, but would be
characterized by a single sign-on
The system, called an “open security,” would
be more secure and trustworthy, reducing
theft, fraud, and abuse
3
Introduction


In part because we do not yet have security
on line, governments and corporations can,
and do, breach privacy with technology
Intrusions fall into two categories



Cyberspace intrusions
Breaches of privacy in the physical world
Increasing capacity and tendency to use
technology to connect new and old
technologies for surveillance
4
Real-World Technologies that
Intrude on Privacy




Cameras
Eavesdropping
Face-Recognition and
other Biometrics
“No Fly” and Similar
Watch Lists




Odor Prints
Radiation Detection
Technology
RFID
Smart Video
Surveillance
5
Cameras

Cameras have been used for decades

by governments



to monitor traffic
to detect and prevent crime
by corporations


to surveill private businesses
to detect and prevent crime in retail establishments
6
Cameras

In Britain,
 more than four million closed-circuit (“CCTV”) cameras
 1,800 cameras in railway stations; 6,000 in underground train
network and buses
 CCTV tapes used in July 2005 London bombings investigation

In US,
 5,000 cameras in New York City’s transportation systems
 US Border Patrol uses Remote Video System (“RVS”) along
borders, costing over $64 million in FY2005

Worldwide, video surveillance software sales in 2004 were $147
million; expected to reach $642 million in 2009
7
Eavesdropping



US government has capacity and authority to
monitor e-mail, telephone, pager, wireless
phone, facsimile, computer, and other
electronic communications and
communication devices
Court order is required except in
emergencies and cases of national security
In 2003, 1,442 wiretaps requested, all
granted, intercepting over four million
conversations
8
Eavesdropping

National Security Agency (“NSA”) uses “Echelon”—
global electronic eavesdropping system




Picks up telephone, e-mail, Internet upload
Downloads communications transmitted by satellite,
microwave tower, cable
Information sifted by supercomputers for terrorism
information
Software-defined radio, a wireless technology, makes cell
phones and computers easier to bug and makes
intercepting device compatible with networks
9
Face-Recognition and other
Biometrics





Biometric devices scan, record, and recognize
 Irises
 Voices
 Facial bone structure
Improved picture quality technology enables face-recognition
software to inspect 1/400th of face—size of pores
Infrared technology piggybacked onto face-recognition software
enables three-dimensional “map” of face
Plans for US passports with face-recognition biometrics and
RFID chips
EU requires member states to have face biometrics in passports
in mid-2006
10
Face-Recognition and other
Biometrics



In 2003, biometric face-recognition software resulted
in over 40% false positives
$4.7 billion industry in 2009
Other biometrics:




below-skin fingerprints (capture swirling patterns of
capillaries)
palm scanners that read vein patterns
iris scanners
gait-recognition systems (measure torso’s silhouette and
movement of shoulders and legs to determine individual
signature strides)
11
“No Fly” and Similar Watch Lists




In 2005, 12 separate lists maintained by nine
US governmental agencies
Confusion and lack of leadership in
maintenance of lists; some lists outdated
“List bloat”—lists become unreasonably large
from incentive to add names, sloppiness
Innocent individuals’ names appear
12
“No Fly” and Similar Watch Lists



Access to the lists curtailed in the name of
security—nearly impossible to discover if and
why a name is on the list, much less have it
removed
Lists will connect with government-developed
“Secure Flight”
Related: British government pressing for
creation of comprehensive electronic
population register
13
Odor Prints

Odor-printing technology is based on premise
that each human being has distinct set of
odors that could serve as an identifier
14
Radiation Detection Technology

US Customs and Border Protection (“CBP”)
employs radiation-detection technologies at
official entry points, including



Highly sensitive personal radiation detectors
Radiation portal monitors
Hand-held radiation isotope identifiers
15
Radio Frequency Identification
(“RFID”)




Tiny computer chips use electromagnetic energy in
the form of radio waves to track things from a
distance
Nicknamed “spychips”
Can travel through clothing, backpacks, briefcases,
wallets, walls, and windows without obstruction,
misorientation, or detection
RFID chips read and retain biometric information,
such as fingerprints and photographs
16
Radio Frequency Identification
(“RFID”)

The RFID tag, in use in 2005, contains



RFID tag is




Tiny silicon computer chip with unique ID number
Connected antenna
Thumbnail size
Affixed to plastic surface
Paper thin
Can be embedded into clothing label, where
it is virtually undetectable
17
Radio Frequency Identification
(“RFID”)





“Passive” RFID tags do not have their own internal power
source, but communicate when a reader seeks a signal
from them
“Active” or self-powered RFID tags have a battery attached
and so can actively transmit information
RFID reader emits radio waves, seeking out RFID
tags
RFID easily integrates into existing database
systems
Electronic Product Code—every, single object on
Earth will have its own unique ID number
18
Radio Frequency Identification
(“RFID”)

By 2005 embedded in some











Worker uniforms
Employee and student ID badges
Toll transponders
Animals (pets and livestock)
Warehouse crates and pallets
Gasoline cards
Consumer products such as diapers and shampoo
Library books
Toll collection systems such as EZ-Pass
Keyless remote systems for cars
Keyless remote systems for garage door openers
19
Radio Frequency Identification
(“RFID”)

Predicted to be embedded soon in










Clothing
Passports
ATM cards
Vehicles
US postage stamps
Paintings
Beads
Nails
Wires
Cash
20
Radio Frequency Identification
(“RFID”)

“VeriChip”—glass capsule containing RFID device to be injected
into human flesh for ID and payment purposes
 60 persons in US had VeriChips at end of 2005
 Also, injected into deceased victims of Hurricane Katrina

RFID is predicted to be used by
 Retailers to price products according to customer’s purchase
history and value to store
 Pharmaceutical manufacturers on prescription medications
 Banks to identify and profile customers who enter premises
 Governments to




electronically frisk citizens at invisible checkpoints
track citizens in airports and border-crossing points
track mail sent from point to point through embedded postage stamps
track library materials
21
Smart Video Surveillance


Video surveillance combined with behaviorrecognition software
Uses computer to



“Learn” what “normal” behavior is
Identify unusual activity, such as shifting in one’s
seat on a bus
Work in conjunction with other technology such as
facial-recognition systems
22
Privacy Intrusions in
Cyberspace








Clickstream Data Analysis
Cookies
Man-in-the-Middle Attacks
Pharming
Phishing
Spyware
Voice Over Internet Protocols (VoIPs)
Web Bugs
23
Clickstream Data Analysis

Logs of transactions recently performed on Internet
computers, such as







Addresses of computers that have made requests
Date and time
How computer’s services were used
Which page was visited prior to entrance into Website
How Website was exited
Internet logs also called “Clickstreams”
Can be used to prepare statistics about paths taken
and not taken by Internet users
24
Cookies


Small file placed and stored on user’s computer by
remote computer
Used to track information about how user moved
about Website





Which choices made
Which links clicked
User visits same Website again and cookie, now
written onto user’s computer, provides information
about user’s last visit
Cookies can be used to build user profiles
Internet sites share cookie information with others
25
Man-in-the-Middle Attacks

Computer security breach in which hacker
intercepts, reads, and alters data traveling
along network between two Websites

Also called “TCP hijacking”
26
Pharming





Hacker’s redirection of Internet traffic from
one Website to another
Second Website appears identical to
legitimate site
User is tricked into entering user name and
password into fake site
“DNS poisoning” or “DNS cache poisoning”
used to reroute user
Domain name system’s servers corrupted
27
Phishing


Internet user receives e-mail appearing to be legitimate
and from reputable company, asking user to reply with
updated credit card information
Clicking on link sends user to fake Website, where user
provides

Credit card information
Date of birth
Address
Site password

Social Security number





Also called “brand spoofing”
“Puddle phishing” is phishing specifically targeting a
small company, such as community bank
28
Spyware

Software that sends data about user when
computer is connected to the Internet
29
Voice Over Internet Protocols
(VoIPs)

Method for speaking through computer by
phone or microphone




Analog voice signal converts to digital format
Broadband networks transmit calls in Internet
Protocol (“IP”) packets
Also called Internet telephony
VoIP vulnerable to eavesdropping

A free Internet program captures and converts
transmissions to audio files
30
Voice Over Internet Protocols
(VoIPs)



Is VoIP a communications service or
information service?
In 2005, FCC adopted rules requiring VoIP
providers to allow law enforcement to tap into
Internet phone calls
FBI has authority and ability to conduct
surveillance of broadband users pursuant to
court order
31
Web Bugs



Tiny, invisible image or graphic embedded into
HTML-formatted Website or e-mail message to track
users’ activities
Web bugs present as HTML IMG tags
Provide Website owner with information about hits,
including





IP address of user’s computer
Type of browser used
Time of the hit
Previously set cookies
Also called “HTML bugs” or “clear GIFs”
32
Connectors of Information












Automated Targeting System
Automatic Number Plate Recognition System
CALEA Petition for Rulemaking
Data Mining
ID Cards
Integrated Automated Fingerprint Identification System
Multistate Anti-Terrorism Information Exchange
“Secure Flight” and other Targeting Systems
Sharing/Databases
Terrorist Screening Database of the Terrorist Screening Center
Total Information Awareness
US-VISIT
33
Automated Targeting System
(“ATS”)


US Customs and Border Protection
technology collects and analyzes cargo
shipping data
Distinguishes and identifies high-risk
shipments
34
Automatic Number Plate
Recognition System (“ANPR”)





Britain’s national database
Each camera on a pole or in police van is
supported by a computer
Allows for automatic tracking
Information obtained by camera immediately
cross-referenced with database
In 2006, information could be stored for two
years; projected to be able to store for five
years
35
CALEA Petition for Rulemaking

In August 2005, FCC ruled that Internet
broadband access providers and certain VoIP
service providers must design networks to be
wiretap-friendly pursuant to Communications
Assistance for Law Enforcement Act (CALEA)
of 1994
36
Data Mining


Computer systems that search numerous
databases for correlations between data
Currently used by corporations to determine
consumer preferences
37
ID Cards


Biometric ID cards to be issued starting in 2008 to voluntary
participants in Britain would become compulsory in 2013
Cards contain
 Name
 Gender
 Date and place of birth
 Current and previous addresses
 Immigration status
 Chip containing



Digital photo
Fingerprints
Iris scans
38
Integrated Automated Fingerprint
Identification System (“IAFIS”)

System electronically compares live-scanned
fingerprint with database of previously
captured fingerprints
39
Multistate Anti-Terrorism Information
Exchange (“MATRIX”)


Integration of factual, disparate data from existing sources to Webenabled storage systems to identify and combat criminal activity
Includes
 Aircraft and other property ownership records
 Bankruptcy filings
 Corporate filings
 Criminal history records
 Digital photographs
 Driver’s and pilot’s licenses
 State professional licenses
 State sexual offenders lists
 Terrorism watch lists
 UCC filings
 Vehicle registrations
40
“Secure Flight” and other
Targeting Systems

Secure Flight passenger-screening program





Computer-assisted passenger screening system that
searches databases, matches passenger against FBI
consolidated watch list, and rates passenger with a “threat
level” in red, yellow, or green
Based on tagging, passengers could be scrutinized,
interrogated, or detained
Might incorporate behavioral profiling
Goal is to link in real time to video images—automatic link
between video of terrorist suspect and watch list
Not yet approved in mid-2005
41
“Secure Flight” and other
Targeting Systems


Border Patrol Targeting Systems Enhancement
 Over $20 million budgeted in US Department of Homeland
Security in 2005
 Seeks to develop and refine automated target recognition
systems using latest sensor technology
Semantic Information Fusion
 Seeks to correlate disparate data about human targets, including





Location
Identity
Behavior
Creates composite description of a particular situation
Uses linguistic information and physics-based models of access,
mobility, and visibility to reconstruct past and infer current events
42
Sharing/Databases


Governments increasingly share citizens’
personal information with each other and with
the private sector
“Data . . . are tributaries flowing into one giant
river of databases.” Lee Tien, Electronic
Frontier Foundation (Aug. 8, 2005)
43
Terrorist Screening Database (“TSDB”) of the
Terrorist Screening Center (“TSC”)




Aggregates numerous government watch-lists
In 2005, TSDB had over 200,000 names, ranging
from known terrorists to persons suspected of
having some ties to terrorism
Each name receives one of 28 codes, describing
person’s connection to terrorism
Names are categorized according to the actions
users should take when encountering someone on
list
44
Total Information Awareness
(“TIA”)


Computer surveillance system proposed by
Department of Defense
Would have used data mining and networking
to connect sources of information including




Credit card purchases
Bank transactions
E-mail
Shut down by Congress in 2003
45
US-VISIT


Project of US Department of Homeland
Security to develop biometric-enabled system
for collecting, maintaining, and exchanging
information on foreign nationals
$340 million budgeted for FY2005
46
Conclusion

Government and corporations are using
many technologies for surveillance, invading
privacy in cyberspace and in the real world

Do citizens and consumers care?
What can we do to protect our privacy and to
manage our digital identities and digital
reputations?

47
For more information

Contact Jeffrey Aresty, President,
Internetbar.org,
[email protected]

Articles on privacy-invading technologies and
public attitudes toward privacy invasions are
available now
Article on digital identity will be available soon

48