SlideShare une entreprise Scribd logo
1  sur  19
Internet surveillance:
past, present and future


 Ian Brown
UKUSA alliance
  • Based on US-UK cooperation during Second
    World War
  • Canada, Australia and New Zealand have also
    become “second parties”
  • UK handles Europe, Africa and European CIS;
    US Asian CIS; Australia South Pacific and
    South-East Asia
  • Cooperates with Germany, Japan, China…
• Echelon
• Frenchelon
• Multinationals


“We steal secrets with
espionage, with
communications, with
reconnaissance satellites”
–James Woolsey

                             Source: Campbell (1999)
Menwith Hill
  Officially RAF base; is run by NSA




                                       Source: Campbell (1999)
Radio interception




                                      Source: Campbell (1999)
  High frequency radio interception
  antenna (AN/FLR9)
Microwave interception
 • Microwave links carry signals
 between cities, but spill out into
 space
 • CANYON and CHALET US
 satellites collect signals from
 Soviet Union, Middle East




                                      Source: Campbell (1999)
Submarine interception
 • Underwater cable
 interception in
 Okhotsk Sea (1971)
 and Barents Sea
 (1979)
 • USS Jimmy Carter
 specially designed
 with “ocean
 interface” for
 underwater divers       Source: US Department of Defense

 (2005)
Source: TeleGeography
Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus
DPI equipment (monitors OC-192 link in real-time)
installed in San Francisco, Seattle, San Jose, Los Angeles
and San Diego, and NSA given access to Daytona 300+
terabyte database of comms data
Communications exchange
interception 1995
Internet site       Location           Operator        Designation
FIX East            College Park, MD   US government   FIX
FIX West            Mountain View      US government   FIX
MAE East            Washington, DC     MCI             MAN
New York NAP        Pennsauken, NJ     Sprintlink      NAP
SWAB                Washington, DC     PSInet / Bell   SMDS DC Area
                                       Atlantic        Bypass
Chicago NAP         Chicago            Ameritech /     NAP
                                       Bellcorp
San Francisco NAP   San Francisco      Pacific Bell    NAP
MAE West            San Jose           MCI             MAN
CIX                 Santa Clara        CIX             CIX
Comms data requests/m people




  Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
What the watchers want
• “advance passenger information, airline bookings
  and other travel data, passport and biometric data,
  immigration, identity and border records, criminal
  records, and other governmental and private sector
  data, including financial and telephone and other
  communication records… and in some cases the
  ability to apply data mining and pattern recognition
  software to databases, might well be the key to
  effective pre-emption in future terrorist cases.”
• “Finding out other people’s secrets is going to involve
  breaking everyday moral rules. So public trust in the
  essential reasonableness of UK police, security and
  intelligence agency activity will continue to be
  essential.” –Sir David Omand (2009) p.9
Efficacy of data mining
• ~5000 Americans surveilled over 4 years; led to
  <10 warrants per year
• “[T]here is not a consensus within the relevant
  scientific community nor on the committee
  regarding whether any behavioral surveillance
  … techniques are ready for use at all in the
  counterterrorist context" –US National
  Research Council (2008) p.4
What the watchers want 2.0
• “social media intelligence … could contribute
  decisively to public safety: identifying criminal
  activity; giving early warning of disorder and
  threats to the public; or building situational
  awareness in rapidly changing situations”
• “information can also be identified and extracted
  regarding when a group is planning
  demonstrations or flashmobs, which could lead
  to violence or increasing community tensions”
  (Omand, Bartlett and Miller 2012)
1 Visitor control center
2 Administration
3 Data halls: Four 25,000-square-foot server halls
4 Backup generators and fuel tanks
5 Water storage and pumping
Able to pump 1.7 million gallons of liquid per day.
6 Chiller plant: About 60,000 tons of cooling equipment
7 Power substation: estimated 65-megawatt demand
8 Security: Video surveillance, intrusion detection, and other
protection will cost more than $10 million.
Source: Wired, U.S. Army Corps of Engineers Conceptual Site plan
Source: The Guardian, 16 January 2011
Insider threats
   Information required              Price paid to ‘blagger’                Price charged
   Occupant search                   not known                              £17.50
   Telephone reverse trace           £40                                    £75
   Friends and Family                £60 – £80                              not known
   Vehicle check at DVLA             £70                                    £150 – £200
   Criminal records check            not known                              £500
   Locating a named person           not known                              £60
   Ex-directory search               £40                                    £65 – £75
   Mobile phone account              not known                              £750
   Licence check                     not known                              £250

                          Source: What price privacy? UK Information Commissioner’s Office (2006)
Conclusion
• UKUSA allies spend many billions of dollars per
  year on COMINT
• Internet and fibre optics initially proved
  challenging; now main problem is dealing with
  the mountains of data captured inc. “SOCMINT”
• HTTPS may speed transition from COMINT to
  access to data at rest
• Intelligence agencies are not the only watchers
References
• Duncan Campbell (1999) The state of the art in
  communications Intelligence. Working document for
  European Parliament DG Research, PE 168. 184 Vol 2/5
• US National Research Council (2008) Protecting Individual
  Privacy in the Struggle Against Terrorists: A Framework for
  Program Assessment, National Academies Press
• I. Brown & D. Korff (2009) Terrorism and the
  Proportionality of Internet Surveillance, European Journal of
  Criminology, 6(2) pp.119-134
• D. Omand (2009) The National Security Strategy:
  Implications for the UK intelligence community, Institute for
  Public Policy Research
• D. Omand, J. Bartlett & C. Miller (2012) #Intelligence, Demos

Contenu connexe

En vedette

Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
Zied Jebali
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
Shakeb Nabi
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
Claire Cross
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
Neil Ballantyne
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
carla
 

En vedette (20)

Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Public Health Surveillance
Public Health SurveillancePublic Health Surveillance
Public Health Surveillance
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Monitoring and Surveillance
Monitoring and SurveillanceMonitoring and Surveillance
Monitoring and Surveillance
 

Similaire à Internet surveillance: past, present and future

Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Atmos
 
The use and abuse of “cybercrime”
The use and abuse of “cybercrime”The use and abuse of “cybercrime”
The use and abuse of “cybercrime”
blogzilla
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
Gannett
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
Klamberg
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
Klamberg
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 

Similaire à Internet surveillance: past, present and future (20)

Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
 
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
 
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
 
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
 
The use and abuse of “cybercrime”
The use and abuse of “cybercrime”The use and abuse of “cybercrime”
The use and abuse of “cybercrime”
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
 
2004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-12004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-1
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economics
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Database
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 

Plus de blogzilla

Plus de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Internet surveillance: past, present and future

  • 2. UKUSA alliance • Based on US-UK cooperation during Second World War • Canada, Australia and New Zealand have also become “second parties” • UK handles Europe, Africa and European CIS; US Asian CIS; Australia South Pacific and South-East Asia • Cooperates with Germany, Japan, China…
  • 3. • Echelon • Frenchelon • Multinationals “We steal secrets with espionage, with communications, with reconnaissance satellites” –James Woolsey Source: Campbell (1999)
  • 4. Menwith Hill Officially RAF base; is run by NSA Source: Campbell (1999)
  • 5. Radio interception Source: Campbell (1999) High frequency radio interception antenna (AN/FLR9)
  • 6. Microwave interception • Microwave links carry signals between cities, but spill out into space • CANYON and CHALET US satellites collect signals from Soviet Union, Middle East Source: Campbell (1999)
  • 7. Submarine interception • Underwater cable interception in Okhotsk Sea (1971) and Barents Sea (1979) • USS Jimmy Carter specially designed with “ocean interface” for underwater divers Source: US Department of Defense (2005)
  • 9. Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus DPI equipment (monitors OC-192 link in real-time) installed in San Francisco, Seattle, San Jose, Los Angeles and San Diego, and NSA given access to Daytona 300+ terabyte database of comms data
  • 10. Communications exchange interception 1995 Internet site Location Operator Designation FIX East College Park, MD US government FIX FIX West Mountain View US government FIX MAE East Washington, DC MCI MAN New York NAP Pennsauken, NJ Sprintlink NAP SWAB Washington, DC PSInet / Bell SMDS DC Area Atlantic Bypass Chicago NAP Chicago Ameritech / NAP Bellcorp San Francisco NAP San Francisco Pacific Bell NAP MAE West San Jose MCI MAN CIX Santa Clara CIX CIX
  • 11. Comms data requests/m people Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
  • 12. What the watchers want • “advance passenger information, airline bookings and other travel data, passport and biometric data, immigration, identity and border records, criminal records, and other governmental and private sector data, including financial and telephone and other communication records… and in some cases the ability to apply data mining and pattern recognition software to databases, might well be the key to effective pre-emption in future terrorist cases.” • “Finding out other people’s secrets is going to involve breaking everyday moral rules. So public trust in the essential reasonableness of UK police, security and intelligence agency activity will continue to be essential.” –Sir David Omand (2009) p.9
  • 13. Efficacy of data mining • ~5000 Americans surveilled over 4 years; led to <10 warrants per year • “[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context" –US National Research Council (2008) p.4
  • 14. What the watchers want 2.0 • “social media intelligence … could contribute decisively to public safety: identifying criminal activity; giving early warning of disorder and threats to the public; or building situational awareness in rapidly changing situations” • “information can also be identified and extracted regarding when a group is planning demonstrations or flashmobs, which could lead to violence or increasing community tensions” (Omand, Bartlett and Miller 2012)
  • 15. 1 Visitor control center 2 Administration 3 Data halls: Four 25,000-square-foot server halls 4 Backup generators and fuel tanks 5 Water storage and pumping Able to pump 1.7 million gallons of liquid per day. 6 Chiller plant: About 60,000 tons of cooling equipment 7 Power substation: estimated 65-megawatt demand 8 Security: Video surveillance, intrusion detection, and other protection will cost more than $10 million. Source: Wired, U.S. Army Corps of Engineers Conceptual Site plan
  • 16. Source: The Guardian, 16 January 2011
  • 17. Insider threats Information required Price paid to ‘blagger’ Price charged Occupant search not known £17.50 Telephone reverse trace £40 £75 Friends and Family £60 – £80 not known Vehicle check at DVLA £70 £150 – £200 Criminal records check not known £500 Locating a named person not known £60 Ex-directory search £40 £65 – £75 Mobile phone account not known £750 Licence check not known £250 Source: What price privacy? UK Information Commissioner’s Office (2006)
  • 18. Conclusion • UKUSA allies spend many billions of dollars per year on COMINT • Internet and fibre optics initially proved challenging; now main problem is dealing with the mountains of data captured inc. “SOCMINT” • HTTPS may speed transition from COMINT to access to data at rest • Intelligence agencies are not the only watchers
  • 19. References • Duncan Campbell (1999) The state of the art in communications Intelligence. Working document for European Parliament DG Research, PE 168. 184 Vol 2/5 • US National Research Council (2008) Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, National Academies Press • I. Brown & D. Korff (2009) Terrorism and the Proportionality of Internet Surveillance, European Journal of Criminology, 6(2) pp.119-134 • D. Omand (2009) The National Security Strategy: Implications for the UK intelligence community, Institute for Public Policy Research • D. Omand, J. Bartlett & C. Miller (2012) #Intelligence, Demos

Notes de l'éditeur

  1. Intelligence authority for economic well-being
  2. http://cryptome.org/eyeball/mmp/jimmy-carter.htm
  3. http://www.telegeography.com/telecom-resources/map-gallery/global-traffic-map-2008/index.html See also http://www.telegeography.com/assets/website/images/maps/global-internet-map-2011/global-internet-map-2011-x.png
  4. Data: European Commission evaluation of data retention directive p.33; IMF World Economic Outlook 2009 population figures for 2008
  5. Surveillance Net Yields Few Suspects. NSA&apos;s Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared. By Barton Gellman, Dafna Linzer and Carol D. Leonnig Washington Post Staff Writers
Sunday, February 5, 2006; Page A01
  6. http://www.guardian.co.uk/media/2011/jan/16/glenn-mulcaire-andy-coulson-sienna#