tracking technologies 14 march

38
TRACKING TECHNOLOGIES 14 MARCH COMP 381

Upload: king

Post on 26-Feb-2016

33 views

Category:

Documents


2 download

DESCRIPTION

COMP 381. Tracking technologies 14 MARCH. Wireless Technologies. RFID Infrared: 5m, line of sight Bluetooth: 10m WiFi: 30m Cellphone: 10k GPS: reach satellite, line of sight. GPS. Global Positioning System U.S . space-based system World-wide services positioning navigation timing. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Tracking technologies 14  MARCH

TRACKING TECHNOLOGIES

14 MARCH

COMP 381

Page 2: Tracking technologies 14  MARCH

Wireless Technologies RFID Infrared: 5m, line of sight Bluetooth: 10m WiFi: 30m Cellphone: 10k GPS: reach satellite, line of sight

Page 3: Tracking technologies 14  MARCH

GPS Global Positioning System U.S. space-based system World-wide services

positioningnavigationtiming

Page 4: Tracking technologies 14  MARCH

COMPONENTS OF GPS

24 satellites receiver

and data bases galore with GPS coordinated

Page 5: Tracking technologies 14  MARCH

GPS Well Accepted UsesEmergency Tracking Marine Vessels Personal GPS Locator

Transportation Safety Aviation Automobiles

Criminal Tracking House arrest Enhanced probation Enforce prohibitions

National Security Port Security Military Tracking

Page 6: Tracking technologies 14  MARCH

And others… Parents tracking their kids

Cellphone trackingHidden GPS in teens cars

Companies tracking vehicles and driversDispatchers are privy to private

information Being tracked without knowing

Spouses tracking each other

Page 7: Tracking technologies 14  MARCH

What is RFID?

Tag Reader

Page 8: Tracking technologies 14  MARCH

Passive vs Active Passive

Power only from reader 

No battery Smaller

ActivePower from tag and

reader On board batteryLarger

Page 9: Tracking technologies 14  MARCH

Current RFID ranges Passive

Shorter rangeBetween 1 ft and 4 ft Restricted by

strength of reader magnetic field

ActiveLonger rangeUp to 50 ftRestricted by

material interference

Page 10: Tracking technologies 14  MARCH

ApplicationsProduct tracking

LivestockLibrary booksWalMart

EZ PassNightclubs in BarcelonaSecurity in MexicoPets

ID chipPet door

MedicalTracking drugsMatching patients

with drugs/procedures

Emergency medical information

Surgical spongesAlzheimer patientsGun control

Page 11: Tracking technologies 14  MARCH

RFID ExploitsEavesdropping

Impersonation

Data tampering

Information theft

Page 12: Tracking technologies 14  MARCH

RFID Hacks Your credit card info: $8

Your passport info: $250

Free gas for life: $280

Page 13: Tracking technologies 14  MARCH

Cryptography solutionsObjectives

ConfidentialityIntegrity

Standard techniquesencryptionchallenge-response

Page 14: Tracking technologies 14  MARCH

Information Transmission Attack

Trusted Third Partyarbiter, distributor of

secret informationS

ecur

e M

essa

ge

Sec

ure

Mes

sage

Mes

sage

Information channel

Sender Receiver

Secret Information Security related

transformation

Secret Information

Mes

sage

Opponent

Page 15: Tracking technologies 14  MARCH

Key Technologies

Encryption -> ConfidentialityBefore 1976 private (secret) key Public key introduced in 1976 (Diffie & Hellman)

Authentication -> IntegrityDigital Signature: Sender cannot deny having sent

message (non-repudiation)Kerberos: Central server issues identity voucher

Page 16: Tracking technologies 14  MARCH

Encryption

PLAINTEXT CIPHERTEXTKEY

ENCRYPTION

DECRYPTION

Page 17: Tracking technologies 14  MARCH

Types of Attacks

Attack Adversary has Goal is to find

ciphertext only ciphertext plaintext, maybe key

known plaintext plaintext and ciphertext

key

chosen plaintext

ciphertext of selected plaintext

key

Page 18: Tracking technologies 14  MARCH

Levels of Encryption Unconditionally Secure

Unlimited resources + unlimited timePlaintext CANNOT be recovered from

ciphertext Computationally Secure

Cost of breaking exceeds information valueTime to break exceeds useful lifetime

Page 19: Tracking technologies 14  MARCH

Private KeySender, receiver share common key

Page 20: Tracking technologies 14  MARCH

Techniques Substitution ciphers Transposition ciphers (rearrange bits) Combinations of the two basic types

Page 21: Tracking technologies 14  MARCH

Caesar Cipher Substitute the letter 3 ahead for each

one Example:

Et tu, BruteHw wx, Euxwh

Quite sufficient for its timeHigh illiteracyNew idea

Page 22: Tracking technologies 14  MARCH

Enigma Machine(Germany, World War II)

Simple Caesar cipher through each rotor

But rotors shifted at different ratesRoller 1 rotated one

position after every encryption

Roller 2 rotated every 26 times…

http://russells.freeshell.org/enigma/

Page 23: Tracking technologies 14  MARCH

Attack Mechanisms Brute force Statistical analysis

Knowledge of natural language○ All English words have vowels○ There are only 2 1-letter words in English○ High probability that u follows q○ …

Page 24: Tracking technologies 14  MARCH

DES (Data Encryption Standard)

Government standard History:

First version 1976Replaced with AES in 2001

Longer keys, computationally harder Cracking:

1998: EFF supercomputer 56 hrs 1999: Distributed.net 22 hrs Today:$1M specialized hardware <1 hr

Page 25: Tracking technologies 14  MARCH

Public KeyTwo keys: one private, one public

Page 26: Tracking technologies 14  MARCH

Public Key Cryptography Two keys

Private key known only to individualPublic key available to anyone

○ Public key, private key inverses Confidentiality

encipher using public keydecipher using private key

Integrity/authenticationencipher using private key decipher using public one

Page 27: Tracking technologies 14  MARCH

Popular Public Key Systems

RSA Rivest, Shamir, and Adelman MIT professors 1977

PGPPretty Good PrivacyZimmerman 1991Freeware Versions

Page 28: Tracking technologies 14  MARCH

Surveillance

Page 29: Tracking technologies 14  MARCH

Video Surveillance Brief History:

Press suggested use by police as early as 1965.

1969: Use in NYC. Became quite popular

Page 30: Tracking technologies 14  MARCH

Video Surveillance – Government Law enforcement

Page 31: Tracking technologies 14  MARCH

Video Surveillance - Britain 4.2 Million Closed Circuit Television

Cameras currently in Britain

Britain ranks worst among Western nations about guarding privacy….

…but compared to the World suddenly not so bad….

Scotland Yard’s New Strategy….will it work?

Page 32: Tracking technologies 14  MARCH

Video Surveillance - Private Private retail stores and businesses use

cameras for security purposesWorld’s Dumbest Criminal (for your amusement)

http://www.youtube.com/watch?v=_quStvTNynI

UNChttp://its2.unc.edu/resnet/webcams/

And lots morehttp://www.earthcam.com/

Page 33: Tracking technologies 14  MARCH

Definition of Privacy

pri·va·cy: freedom from unauthorized intrusion: state of being let alone and able to keep certain personal matters to oneself

Page 34: Tracking technologies 14  MARCH

Facial Recognition Government

London CCTVsTampa PDAirports

PrivateCasinos iPhoto

Page 35: Tracking technologies 14  MARCH

Wiretapping

Ruled legal

PATRIOT Act

1,891 wiretaps authorized

1928

2001

2008

Brief History

Page 36: Tracking technologies 14  MARCH

Facts and Stats Average cost in 2008: $47,624 Total cost 2008: $81 million Total cost 1988: $355 million

Convictions 2008: 810 of 4133 arrests Convictions 1998-2008: 56%

Page 37: Tracking technologies 14  MARCH

Opportunity for Misuse Greek government

had over 100 cell phones tapped by an unknown source

AT&T caught working with NSA to tap American conversations in 2003

Page 38: Tracking technologies 14  MARCH

Orwell’s 1984There was of course no way of knowing whether you

were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.