Escolar Documentos
Profissional Documentos
Cultura Documentos
NSC NPTH Jatin Poornima
NSC NPTH Jatin Poornima
Made It Possible
By tapping into the cables that connect the mobile networks globally and
working with the corporate partners to install intercept equipment
NSA can apply mathematical techniques that enable the analysts to map
cellphone owners' relationships by correlating their patterns of movement
over time with thousands or millions of other phone users who cross their
paths.
This "Co-traveler" program allowed to look for unknown associates of
known intelligence targets by tracking people whose movements intersect.
https://nsa.gov1.info/surv
XKeyscoresystem:
1. indexes the data flowing through the
worldwide data collection points
2. Stores it in a rolling three-day buffer
database
. XKeyscore is a massive distributed
Linux cluster with over 700 servers
distributed around the world.
. Theory behind XKeyscore:
1. People spend a large amount of time
on the web performing actions that are
anonymous.
2. NSA uses this traffic to detect
anomalies which can lead them to
https://nsa.gov1.info/surveillanc
https://nsa.gov1.info/surveilla
UNEXPECTED !!
Public Surveillance
Close observation, especially of a suspected
spy or criminal.
Consequences of surveillance:
a) It shuts down competence.
b) It shuts down joy.
c) It shuts down creativity and innovation.
When we're being watched, we tend to "normalize" our
behavior. We want - more than anything - to be accepted,
to not be "voted off the island". So, when people can see
(or hear) us, we present what we think they want to see
(or hear) - we turn off what we genuinely feel like doing,
and substitute a socially-acceptable version. We become
fake.
on subpoenas
Experts say the landmark decision has effectively paved the way
for a full legal challenge against the legitimacy of the NSA.
"minimization" procedures that govern what the NSA can do with the
domestic information it has intercepted
For the first time, the personal information of non-U.S. citizens now can
only be kept for five years
If, within five years, agents havent determined whether the information
is important, it must be deleted unless the DNI determines that theres a
national security reason to keepit.
Any query now also requires advanced approval from the secret court
designed to evaluate such requests, the Foreign Intelligence Security Court.
CYBER ATTACKS
MAKING HEADLINES
TOMORROWS SURVEILLANCE
1. The NSAs plans dont end with collecting your phone records.
2. Revealed plans to build acode-breaking quantum computer, a
technology which could spellthe end for cryptographyand privacy.
3. Ways the NSA is trying to crack encryption or keep tabs on you in
general:. Backdooring Encryption: split-key encryption, companies like Apple,
Microsoft, and Google would be forced into creating a digital key that
could unlock
any smartphone
andtablet and
this key would
be
Currently
in
Techniques
being
available to government
agencies
SINGLE-KEY
KEY ESCROW
SPLIT-KEY
use
considered
NO ENCRYPTION
ENCRYPTION
ENCRYPTIONENCRYPTION
Artificial Intelligence?: Mark Bishop, chair of the Society for the Study
of Artificial Intelligence and Simulation of Behaviour,said that, though
he has no proof, hed be
- astonished if the NSA and GCHQ werent using the best AI they
could to scan all electronic communication they could.
- hes always believed that theyre not doing their job properly if
theyre not
using Artificial Intelligence, regardless of belief of
whether thats right or
wrong.
Mobile Surveillance:
- Smartphone extremely precise gyroscopes let them detect the
phonesrotation
LETS DISCUSS!