SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Internet surveillance:
past, present and future


 Ian Brown
UKUSA alliance
  • Based on US-UK cooperation during Second
    World War
  • Canada, Australia and New Zealand have also
    become “second parties”
  • UK handles Europe, Africa and European CIS;
    US Asian CIS; Australia South Pacific and
    South-East Asia
  • Cooperates with Germany, Japan, China…
• Echelon
• Frenchelon
• Multinationals


“We steal secrets with
espionage, with
communications, with
reconnaissance satellites”
–James Woolsey

                             Source: Campbell (1999)
Menwith Hill
  Officially RAF base; is run by NSA




                                       Source: Campbell (1999)
Radio interception




                                      Source: Campbell (1999)
  High frequency radio interception
  antenna (AN/FLR9)
Microwave interception
 • Microwave links carry signals
 between cities, but spill out into
 space
 • CANYON and CHALET US
 satellites collect signals from
 Soviet Union, Middle East




                                      Source: Campbell (1999)
Submarine interception
 • Underwater cable
 interception in
 Okhotsk Sea (1971)
 and Barents Sea
 (1979)
 • USS Jimmy Carter
 specially designed
 with “ocean
 interface” for
 underwater divers       Source: US Department of Defense

 (2005)
Source: TeleGeography
Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus
DPI equipment (monitors OC-192 link in real-time)
installed in San Francisco, Seattle, San Jose, Los Angeles
and San Diego, and NSA given access to Daytona 300+
terabyte database of comms data
Communications exchange
interception 1995
Internet site       Location           Operator        Designation
FIX East            College Park, MD   US government   FIX
FIX West            Mountain View      US government   FIX
MAE East            Washington, DC     MCI             MAN
New York NAP        Pennsauken, NJ     Sprintlink      NAP
SWAB                Washington, DC     PSInet / Bell   SMDS DC Area
                                       Atlantic        Bypass
Chicago NAP         Chicago            Ameritech /     NAP
                                       Bellcorp
San Francisco NAP   San Francisco      Pacific Bell    NAP
MAE West            San Jose           MCI             MAN
CIX                 Santa Clara        CIX             CIX
Comms data requests/m people




  Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
What the watchers want
• “advance passenger information, airline bookings
  and other travel data, passport and biometric data,
  immigration, identity and border records, criminal
  records, and other governmental and private sector
  data, including financial and telephone and other
  communication records… and in some cases the
  ability to apply data mining and pattern recognition
  software to databases, might well be the key to
  effective pre-emption in future terrorist cases.”
• “Finding out other people’s secrets is going to involve
  breaking everyday moral rules. So public trust in the
  essential reasonableness of UK police, security and
  intelligence agency activity will continue to be
  essential.” –Sir David Omand (2009) p.9
Efficacy of data mining
• ~5000 Americans surveilled over 4 years; led to
  <10 warrants per year
• “[T]here is not a consensus within the relevant
  scientific community nor on the committee
  regarding whether any behavioral surveillance
  … techniques are ready for use at all in the
  counterterrorist context" –US National
  Research Council (2008) p.4
What the watchers want 2.0
• “social media intelligence … could contribute
  decisively to public safety: identifying criminal
  activity; giving early warning of disorder and
  threats to the public; or building situational
  awareness in rapidly changing situations”
• “information can also be identified and extracted
  regarding when a group is planning
  demonstrations or flashmobs, which could lead
  to violence or increasing community tensions”
  (Omand, Bartlett and Miller 2012)
1 Visitor control center
2 Administration
3 Data halls: Four 25,000-square-foot server halls
4 Backup generators and fuel tanks
5 Water storage and pumping
Able to pump 1.7 million gallons of liquid per day.
6 Chiller plant: About 60,000 tons of cooling equipment
7 Power substation: estimated 65-megawatt demand
8 Security: Video surveillance, intrusion detection, and other
protection will cost more than $10 million.
Source: Wired, U.S. Army Corps of Engineers Conceptual Site plan
Source: The Guardian, 16 January 2011
Insider threats
   Information required              Price paid to ‘blagger’                Price charged
   Occupant search                   not known                              £17.50
   Telephone reverse trace           £40                                    £75
   Friends and Family                £60 – £80                              not known
   Vehicle check at DVLA             £70                                    £150 – £200
   Criminal records check            not known                              £500
   Locating a named person           not known                              £60
   Ex-directory search               £40                                    £65 – £75
   Mobile phone account              not known                              £750
   Licence check                     not known                              £250

                          Source: What price privacy? UK Information Commissioner’s Office (2006)
Conclusion
• UKUSA allies spend many billions of dollars per
  year on COMINT
• Internet and fibre optics initially proved
  challenging; now main problem is dealing with
  the mountains of data captured inc. “SOCMINT”
• HTTPS may speed transition from COMINT to
  access to data at rest
• Intelligence agencies are not the only watchers
References
• Duncan Campbell (1999) The state of the art in
  communications Intelligence. Working document for
  European Parliament DG Research, PE 168. 184 Vol 2/5
• US National Research Council (2008) Protecting Individual
  Privacy in the Struggle Against Terrorists: A Framework for
  Program Assessment, National Academies Press
• I. Brown & D. Korff (2009) Terrorism and the
  Proportionality of Internet Surveillance, European Journal of
  Criminology, 6(2) pp.119-134
• D. Omand (2009) The National Security Strategy:
  Implications for the UK intelligence community, Institute for
  Public Policy Research
• D. Omand, J. Bartlett & C. Miller (2012) #Intelligence, Demos

Más contenido relacionado

Destacado

Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetNakedLime
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationShakeb Nabi
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillancerooneys27
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INClaire Cross
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSHOEB SHAH
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...GNWP
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network societyNeil Ballantyne
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...Jacqueline Vickery
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyGry Tina Tinde
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in Warcarla
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance Cristina Costa
 
Public Health Surveillance
Public Health SurveillancePublic Health Surveillance
Public Health Surveillanceuroosa farooq
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflictRanjani K.Murthy
 

Destacado (20)

Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Public Health Surveillance
Public Health SurveillancePublic Health Surveillance
Public Health Surveillance
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Monitoring and Surveillance
Monitoring and SurveillanceMonitoring and Surveillance
Monitoring and Surveillance
 

Similar a Internet surveillance: past, present and future

Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Atmos
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Atmos
 
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraphChris Marsden
 
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Atmos
 
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Atmos
 
Wiretapping In The United States
Wiretapping In The United StatesWiretapping In The United States
Wiretapping In The United StatesDiana Meza
 
The use and abuse of “cybercrime”
The use and abuse of “cybercrime”The use and abuse of “cybercrime”
The use and abuse of “cybercrime”blogzilla
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaGannett
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
 
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in ForensicsStephen Turner
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economicsDATA SECURITY SOLUTIONS
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
Internet Basics
Internet BasicsInternet Basics
Internet BasicsAnn Treacy
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Databasecherazigzag
 

Similar a Internet surveillance: past, present and future (20)

Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
 
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
#Gikii2013 and #ICIC2013 Chris Marsden on Tempora and telegraph
 
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...
 
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770
 
Wiretapping In The United States
Wiretapping In The United StatesWiretapping In The United States
Wiretapping In The United States
 
The use and abuse of “cybercrime”
The use and abuse of “cybercrime”The use and abuse of “cybercrime”
The use and abuse of “cybercrime”
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
 
2004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-12004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-1
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economics
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Database
 

Más de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 

Último (20)

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 

Internet surveillance: past, present and future

  • 2. UKUSA alliance • Based on US-UK cooperation during Second World War • Canada, Australia and New Zealand have also become “second parties” • UK handles Europe, Africa and European CIS; US Asian CIS; Australia South Pacific and South-East Asia • Cooperates with Germany, Japan, China…
  • 3. • Echelon • Frenchelon • Multinationals “We steal secrets with espionage, with communications, with reconnaissance satellites” –James Woolsey Source: Campbell (1999)
  • 4. Menwith Hill Officially RAF base; is run by NSA Source: Campbell (1999)
  • 5. Radio interception Source: Campbell (1999) High frequency radio interception antenna (AN/FLR9)
  • 6. Microwave interception • Microwave links carry signals between cities, but spill out into space • CANYON and CHALET US satellites collect signals from Soviet Union, Middle East Source: Campbell (1999)
  • 7. Submarine interception • Underwater cable interception in Okhotsk Sea (1971) and Barents Sea (1979) • USS Jimmy Carter specially designed with “ocean interface” for underwater divers Source: US Department of Defense (2005)
  • 9. Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus DPI equipment (monitors OC-192 link in real-time) installed in San Francisco, Seattle, San Jose, Los Angeles and San Diego, and NSA given access to Daytona 300+ terabyte database of comms data
  • 10. Communications exchange interception 1995 Internet site Location Operator Designation FIX East College Park, MD US government FIX FIX West Mountain View US government FIX MAE East Washington, DC MCI MAN New York NAP Pennsauken, NJ Sprintlink NAP SWAB Washington, DC PSInet / Bell SMDS DC Area Atlantic Bypass Chicago NAP Chicago Ameritech / NAP Bellcorp San Francisco NAP San Francisco Pacific Bell NAP MAE West San Jose MCI MAN CIX Santa Clara CIX CIX
  • 11. Comms data requests/m people Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
  • 12. What the watchers want • “advance passenger information, airline bookings and other travel data, passport and biometric data, immigration, identity and border records, criminal records, and other governmental and private sector data, including financial and telephone and other communication records… and in some cases the ability to apply data mining and pattern recognition software to databases, might well be the key to effective pre-emption in future terrorist cases.” • “Finding out other people’s secrets is going to involve breaking everyday moral rules. So public trust in the essential reasonableness of UK police, security and intelligence agency activity will continue to be essential.” –Sir David Omand (2009) p.9
  • 13. Efficacy of data mining • ~5000 Americans surveilled over 4 years; led to <10 warrants per year • “[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context" –US National Research Council (2008) p.4
  • 14. What the watchers want 2.0 • “social media intelligence … could contribute decisively to public safety: identifying criminal activity; giving early warning of disorder and threats to the public; or building situational awareness in rapidly changing situations” • “information can also be identified and extracted regarding when a group is planning demonstrations or flashmobs, which could lead to violence or increasing community tensions” (Omand, Bartlett and Miller 2012)
  • 15. 1 Visitor control center 2 Administration 3 Data halls: Four 25,000-square-foot server halls 4 Backup generators and fuel tanks 5 Water storage and pumping Able to pump 1.7 million gallons of liquid per day. 6 Chiller plant: About 60,000 tons of cooling equipment 7 Power substation: estimated 65-megawatt demand 8 Security: Video surveillance, intrusion detection, and other protection will cost more than $10 million. Source: Wired, U.S. Army Corps of Engineers Conceptual Site plan
  • 16. Source: The Guardian, 16 January 2011
  • 17. Insider threats Information required Price paid to ‘blagger’ Price charged Occupant search not known £17.50 Telephone reverse trace £40 £75 Friends and Family £60 – £80 not known Vehicle check at DVLA £70 £150 – £200 Criminal records check not known £500 Locating a named person not known £60 Ex-directory search £40 £65 – £75 Mobile phone account not known £750 Licence check not known £250 Source: What price privacy? UK Information Commissioner’s Office (2006)
  • 18. Conclusion • UKUSA allies spend many billions of dollars per year on COMINT • Internet and fibre optics initially proved challenging; now main problem is dealing with the mountains of data captured inc. “SOCMINT” • HTTPS may speed transition from COMINT to access to data at rest • Intelligence agencies are not the only watchers
  • 19. References • Duncan Campbell (1999) The state of the art in communications Intelligence. Working document for European Parliament DG Research, PE 168. 184 Vol 2/5 • US National Research Council (2008) Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, National Academies Press • I. Brown & D. Korff (2009) Terrorism and the Proportionality of Internet Surveillance, European Journal of Criminology, 6(2) pp.119-134 • D. Omand (2009) The National Security Strategy: Implications for the UK intelligence community, Institute for Public Policy Research • D. Omand, J. Bartlett & C. Miller (2012) #Intelligence, Demos

Notas del editor

  1. Intelligence authority for economic well-being
  2. http://cryptome.org/eyeball/mmp/jimmy-carter.htm
  3. http://www.telegeography.com/telecom-resources/map-gallery/global-traffic-map-2008/index.html See also http://www.telegeography.com/assets/website/images/maps/global-internet-map-2011/global-internet-map-2011-x.png
  4. Data: European Commission evaluation of data retention directive p.33; IMF World Economic Outlook 2009 population figures for 2008
  5. Surveillance Net Yields Few Suspects. NSA&apos;s Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared. By Barton Gellman, Dafna Linzer and Carol D. Leonnig Washington Post Staff Writers
Sunday, February 5, 2006; Page A01
  6. http://www.guardian.co.uk/media/2011/jan/16/glenn-mulcaire-andy-coulson-sienna#