Computer and network surveillance
Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.[1]
Surveillance allows governments and other agencies to maintain
Many
Network surveillance
Internet |
---|
Internet portal |
The vast majority of computer surveillance involves the monitoring of
There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.
Similar systems are now used by
The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to network monitoring. For instance, systems described as "Web 2.0"[16] have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0",[16] stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.[17] However, Internet surveillance also has a disadvantage. One researcher from Uppsala University said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".[18] Surveillance companies monitor people while they are focused on work or entertainment. Yet, employers themselves also monitor their employees. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive.[19] This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to 'creeping' on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".[20] The study shows that women can become jealous of other people when they are in an online group.
Corporate surveillance
Such type of surveillance is also used to establish business purposes of monitoring, which may include the following:
- Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring network bandwidth.
- Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.
- Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks.
- Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and potential spam or viruses.
- Safeguarding company assets. The protection of intellectual property, trade secrets, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy.
The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.
For instance,
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The
Malicious software
In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's
There are multiple ways of installing such software. The most common is remote installation, using a
Another method is
One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc, floppy disk, or thumbdrive. This method shares a disadvantage with hardware devices in that it requires physical access to the computer.[32] One well-known worm that uses this method of spreading itself is Stuxnet.[33]
Social network analysis
One common form of surveillance is to
Many U.S. government agencies such as the
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
— Jason Ethier[37]
Monitoring from a distance
With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting the
IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.[44][45]
In 2015, lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act.[46] At the same time in California, state senator Jerry Hill introduced a bill making law enforcement agencies to disclose more information on their usage and information from the Stingray phone tracker device.[46] As the law took into effect in January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device.[46] Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but now if a city wants to use this device, it must be heard by a public hearing.[46] Some cities have pulled out of using the StingRay such as Santa Clara County.
And it has also been shown, by Adi Shamir et al., that even the high frequency noise emitted by a CPU includes information about the instructions being executed.[47]
Policeware and govware
In German-speaking countries, spyware used or made by the government is sometimes called govware.
Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens.
The Clipper Chip, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “…protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.”[53] The government portrayed it as the solution to the secret codes or cryptographic keys that the age of technology created. Thus, this has raised controversy in the public, because the Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.[54]
The "
Surveillance as an aid to censorship
Surveillance and censorship are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance.[56] And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead to self-censorship.[57]
In March 2013
Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone.[58][59] Individuals associated with high-profile rights organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.[60]
See also
Part of a series on |
Global surveillance |
---|
Disclosures |
Systems |
Agencies |
Places |
Laws |
|
Proposed changes |
Concepts |
Related topics |
- Anonymizer, a software system that attempts to make network activity untraceable
- Computer surveillance in the workplace
- Cyber spying
- Datacasting, a means of broadcasting files and Web pages using radio waves, allowing receivers near total immunity from traditional network surveillance techniques.
- Differential privacy, a method to maximize the accuracy of queries from statistical databases while minimizing the chances of violating the privacy of individuals.
- ECHELON, a signals intelligence (SIGINT) collection and analysis network operated on behalf of Australia, Canada, New Zealand, the United Kingdom, and the United States, also known as AUSCANNZUKUS and Five Eyes
- GhostNet, a large-scale cyber spying operation discovered in March 2009
- List of government surveillance projects
- Mass surveillance
- Surveillance
National Security Agency surveillance |
---|
- Surveillance by the United States government:
- 2013 mass surveillance disclosures, reports about NSA and its international partners' mass surveillance of foreign nationals and U.S. citizens
- Bullrun (code name), a highly classified NSAprogram to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking)
- Carnivore, a U.S. Federal Bureau of Investigation system to monitor email and electronic communications
- COINTELPRO, a series of covert, and at times illegal, projects conducted by the FBI aimed at U.S. domestic political organizations
- Communications Assistance For Law Enforcement Act
- Computer and Internet Protocol Address Verifier (CIPAV), a data gathering tool used by the U.S. Federal Bureau of Investigation (FBI)
- Dropmire, a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies
- Magic Lantern, keystroke logging software developed by the U.S. Federal Bureau of Investigation
- Mass surveillance in the United States
- NSA call database, a database containing metadata for hundreds of billions of telephone calls made in the U.S.
- NSA warrantless surveillance (2001–07)
- NSA
- Spying on United Nations leaders by United States diplomats
- Stellar Wind (code name), code name for information collected under the President's Surveillance Program
- Tailored Access Operations, NSA's hacking program
- Terrorist Surveillance Program, an NSA electronic surveillance program
- Defense Advanced Research Projects Agency(DARPA)
- TEMPEST, codename for studies of unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment
References
- ^ Anne Broache. "FBI wants widespread monitoring of 'illegal' Internet activity". CNET. Retrieved 25 March 2014.
- ISSN 1524-1904.
- ^ a b "Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
- ^ "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Archived (PDF) from the original on 2022-10-09. Retrieved March 13, 2009.
- ^ "Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
- ^ Hacktivists in the frontline battle for the internet retrieved 17 June 2012
- ^ Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2009-03-13.
- ^ "CALEA Archive -- Electronic Frontier Foundation". Electronic Frontier Foundation (website). Archived from the original on 2009-05-03. Retrieved 2009-03-14.
- ^ "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
- ^ "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). 2007-09-20. Retrieved 2009-03-14.
- ISBN 978-0-7355-4273-0.
- ^ American Council on Education vs. FCC Archived 2012-09-07 at the Wayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
- ^ Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved 2009-03-19.
- ^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved 2009-03-13.
- ^ "First round in Internet war goes to Iranian intelligence", Debkafile, 28 June 2009. (subscription required)
- ^ a b O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
- ^ Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.
- ^ Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.
- doi:10.1146/annurev-soc-060116-053643.)
{{cite journal}}
: CS1 maint: multiple names: authors list (link - ^ Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.
- ^ a b c "Should Smart Devices Be Able to Automatically Call the Cops?". How Stuff Works. 2017-07-18. Retrieved November 10, 2017.
- ^ "Time Alexa Takes the Stand Listening Devices Raise Privacy Issues". 4 May 2017. Retrieved November 10, 2017.
- ^ Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. Retrieved 2009-03-17.
- ^ a b Butler, Don (January 31, 2009). "Are we addicted to being watched?". The Ottawa Citizen. canada.com. Archived from the original on 22 July 2013. Retrieved 26 May 2013.
- ^ Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. Archived from the original on 2011-04-29. Retrieved 2009-03-21.
- ^ a b Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. Retrieved 2009-03-21.
- ^ "Advertising and Privacy". Google (company page). 2009. Retrieved 2009-03-21.
- ^ "Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software", Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
- ISBN 978-0-387-30236-2.
- ^ "Office workers give away passwords for a cheap pen", John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.
- ^ "Passwords are passport to theft", The Register, 3 March 2004. Retrieved 7 September 2013.
- ^ "Social Engineering Fundamentals, Part I: Hacker Tactics", Sarah Granger, 18 December 2001.
- ^ "Stuxnet: How does the Stuxnet worm spread?". Antivirus.about.com. 2014-03-03. Archived from the original on 2014-04-15. Retrieved 2014-05-17.
- ^ Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". New York Times. Retrieved 14 March 2009.
- .
- ISBN 978-3-200-01428-2. Archived from the original(PDF) on February 6, 2009. Retrieved March 14, 2009.
- ^ a b c Ethier, Jason (27 May 2006). "Current Research in Social Network Theory" (PDF). Northeastern University College of Computer and Information Science. Archived (PDF) from the original on 2022-10-09. Retrieved 15 March 2009.[permanent dead link]
- ^ Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Archived from the original on 2012-07-20. Retrieved 2009-03-16.
- ^ Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
- ^ McNamara, Joel (4 December 1999). "Complete, Unofficial Tempest Page". Archived from the original on 1 September 2013. Retrieved 7 September 2013.
- (PDF) from the original on 2004-04-05.
- ^ Kuhn, M.G. (26–28 May 2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25.
- ^ Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard Acoustic Emanations (PDF), IBM Almaden Research Center, archived from the original (PDF) on 2012-02-27, retrieved 2013-09-08
- ^ Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News
- ^ a b c d "LA Times". Los Angeles Times. 2017-08-27. Retrieved November 10, 2017.
- ^ Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.
- ^ "Swiss coder publicises government spy Trojan". News.techworld.com. Archived from the original on 29 April 2014. Retrieved 25 March 2014.
- ^ Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428
- ^ "FAQ – Häufig gestellte Fragen". Ejpd.admin.ch. 2011-11-23. Archived from the original on 2013-05-06. Retrieved 2014-05-17.
- ^ Jeremy Reimer (20 July 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica.
- ^ Hopper, D. Ian (4 May 2001). "FBI's Web Monitoring Exposed". ABC News.
- ^ Levy, Steven (12 June 1994). "New York Times". Retrieved November 10, 2017.
- ^ "Stanford University Clipper Chip". Retrieved November 10, 2017.
- ^ "Consumer Broadband and Digital Television Promotion Act" Archived 2012-02-14 at the Wayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
- ^ "Censorship is inseparable from surveillance", Cory Doctorow, The Guardian, 2 March 2012
- ^ Bitso, Constance; Fourie, Ina; Bothma, Theo. "Trends in transition from classical censorship to Internet censorship: selected country overviews" (PDF). IFLA. Archived (PDF) from the original on Nov 20, 2023.
- ^ a b "Era of the digital mercenaries". The Enemies of the Internet Special Edition : Surveillance. Archived from the original on 2013-08-31.
- ^ "When Secrets Aren't Safe With Journalists", Christopher Soghoian, New York Times, 26 October 2011
- ^ Everyone's Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007
External links
- "Selected Papers in Anonymity", Free Haven Project, accessed 16 September 2011.
Yan, W. (2019) Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer.