Download - Tracking technologies 14 MARCH
![Page 1: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/1.jpg)
TRACKING TECHNOLOGIES
14 MARCH
COMP 381
![Page 2: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/2.jpg)
Wireless Technologies RFID Infrared: 5m, line of sight Bluetooth: 10m WiFi: 30m Cellphone: 10k GPS: reach satellite, line of sight
![Page 3: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/3.jpg)
GPS Global Positioning System U.S. space-based system World-wide services
positioningnavigationtiming
![Page 4: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/4.jpg)
COMPONENTS OF GPS
24 satellites receiver
and data bases galore with GPS coordinated
![Page 5: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/5.jpg)
GPS Well Accepted UsesEmergency Tracking Marine Vessels Personal GPS Locator
Transportation Safety Aviation Automobiles
Criminal Tracking House arrest Enhanced probation Enforce prohibitions
National Security Port Security Military Tracking
![Page 6: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/6.jpg)
And others… Parents tracking their kids
Cellphone trackingHidden GPS in teens cars
Companies tracking vehicles and driversDispatchers are privy to private
information Being tracked without knowing
Spouses tracking each other
![Page 7: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/7.jpg)
What is RFID?
Tag Reader
![Page 8: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/8.jpg)
Passive vs Active Passive
Power only from reader
No battery Smaller
ActivePower from tag and
reader On board batteryLarger
![Page 9: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/9.jpg)
Current RFID ranges Passive
Shorter rangeBetween 1 ft and 4 ft Restricted by
strength of reader magnetic field
ActiveLonger rangeUp to 50 ftRestricted by
material interference
![Page 10: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/10.jpg)
ApplicationsProduct tracking
LivestockLibrary booksWalMart
EZ PassNightclubs in BarcelonaSecurity in MexicoPets
ID chipPet door
MedicalTracking drugsMatching patients
with drugs/procedures
Emergency medical information
Surgical spongesAlzheimer patientsGun control
![Page 11: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/11.jpg)
RFID ExploitsEavesdropping
Impersonation
Data tampering
Information theft
![Page 12: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/12.jpg)
RFID Hacks Your credit card info: $8
Your passport info: $250
Free gas for life: $280
![Page 13: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/13.jpg)
Cryptography solutionsObjectives
ConfidentialityIntegrity
Standard techniquesencryptionchallenge-response
![Page 14: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/14.jpg)
Information Transmission Attack
Trusted Third Partyarbiter, distributor of
secret informationS
ecur
e M
essa
ge
Sec
ure
Mes
sage
Mes
sage
Information channel
Sender Receiver
Secret Information Security related
transformation
Secret Information
Mes
sage
Opponent
![Page 15: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/15.jpg)
Key Technologies
Encryption -> ConfidentialityBefore 1976 private (secret) key Public key introduced in 1976 (Diffie & Hellman)
Authentication -> IntegrityDigital Signature: Sender cannot deny having sent
message (non-repudiation)Kerberos: Central server issues identity voucher
![Page 16: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/16.jpg)
Encryption
PLAINTEXT CIPHERTEXTKEY
ENCRYPTION
DECRYPTION
![Page 17: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/17.jpg)
Types of Attacks
Attack Adversary has Goal is to find
ciphertext only ciphertext plaintext, maybe key
known plaintext plaintext and ciphertext
key
chosen plaintext
ciphertext of selected plaintext
key
![Page 18: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/18.jpg)
Levels of Encryption Unconditionally Secure
Unlimited resources + unlimited timePlaintext CANNOT be recovered from
ciphertext Computationally Secure
Cost of breaking exceeds information valueTime to break exceeds useful lifetime
![Page 19: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/19.jpg)
Private KeySender, receiver share common key
![Page 20: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/20.jpg)
Techniques Substitution ciphers Transposition ciphers (rearrange bits) Combinations of the two basic types
![Page 21: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/21.jpg)
Caesar Cipher Substitute the letter 3 ahead for each
one Example:
Et tu, BruteHw wx, Euxwh
Quite sufficient for its timeHigh illiteracyNew idea
![Page 22: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/22.jpg)
Enigma Machine(Germany, World War II)
Simple Caesar cipher through each rotor
But rotors shifted at different ratesRoller 1 rotated one
position after every encryption
Roller 2 rotated every 26 times…
http://russells.freeshell.org/enigma/
![Page 23: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/23.jpg)
Attack Mechanisms Brute force Statistical analysis
Knowledge of natural language○ All English words have vowels○ There are only 2 1-letter words in English○ High probability that u follows q○ …
![Page 24: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/24.jpg)
DES (Data Encryption Standard)
Government standard History:
First version 1976Replaced with AES in 2001
Longer keys, computationally harder Cracking:
1998: EFF supercomputer 56 hrs 1999: Distributed.net 22 hrs Today:$1M specialized hardware <1 hr
![Page 25: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/25.jpg)
Public KeyTwo keys: one private, one public
![Page 26: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/26.jpg)
Public Key Cryptography Two keys
Private key known only to individualPublic key available to anyone
○ Public key, private key inverses Confidentiality
encipher using public keydecipher using private key
Integrity/authenticationencipher using private key decipher using public one
![Page 27: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/27.jpg)
Popular Public Key Systems
RSA Rivest, Shamir, and Adelman MIT professors 1977
PGPPretty Good PrivacyZimmerman 1991Freeware Versions
![Page 28: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/28.jpg)
Surveillance
![Page 29: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/29.jpg)
Video Surveillance Brief History:
Press suggested use by police as early as 1965.
1969: Use in NYC. Became quite popular
![Page 30: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/30.jpg)
Video Surveillance – Government Law enforcement
![Page 31: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/31.jpg)
Video Surveillance - Britain 4.2 Million Closed Circuit Television
Cameras currently in Britain
Britain ranks worst among Western nations about guarding privacy….
…but compared to the World suddenly not so bad….
Scotland Yard’s New Strategy….will it work?
![Page 32: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/32.jpg)
Video Surveillance - Private Private retail stores and businesses use
cameras for security purposesWorld’s Dumbest Criminal (for your amusement)
http://www.youtube.com/watch?v=_quStvTNynI
UNChttp://its2.unc.edu/resnet/webcams/
And lots morehttp://www.earthcam.com/
![Page 33: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/33.jpg)
Definition of Privacy
pri·va·cy: freedom from unauthorized intrusion: state of being let alone and able to keep certain personal matters to oneself
![Page 34: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/34.jpg)
Facial Recognition Government
London CCTVsTampa PDAirports
PrivateCasinos iPhoto
![Page 35: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/35.jpg)
Wiretapping
Ruled legal
PATRIOT Act
1,891 wiretaps authorized
1928
2001
2008
Brief History
![Page 36: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/36.jpg)
Facts and Stats Average cost in 2008: $47,624 Total cost 2008: $81 million Total cost 1988: $355 million
Convictions 2008: 810 of 4133 arrests Convictions 1998-2008: 56%
![Page 37: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/37.jpg)
Opportunity for Misuse Greek government
had over 100 cell phones tapped by an unknown source
AT&T caught working with NSA to tap American conversations in 2003
![Page 38: Tracking technologies 14 MARCH](https://reader035.vdocuments.net/reader035/viewer/2022062815/56816979550346895de16efe/html5/thumbnails/38.jpg)
Orwell’s 1984There was of course no way of knowing whether you
were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.