250 likes | 458 Views
Telephone Call Interception System. Kevin Colkitt Politics and Government Terrorist Monitoring. Flowchart. Process. Decryption RFID Gathered Tower Guise Data Intercepted. Processing Device http://photosinbox.com/wp-content/uploads/2012/02/gsm-sim-card.jpg. SIM Card. IMSI Catcher.
E N D
Telephone Call Interception System Kevin Colkitt Politics and Government Terrorist Monitoring
Process • Decryption • RFID Gathered • Tower Guise • Data Intercepted
Processing Device http://photosinbox.com/wp-content/uploads/2012/02/gsm-sim-card.jpg SIM Card
IMSI Catcher • Processing Device • http://cdn.arstechnica.net/wp-content/uploads/2013/08/body-worn-imsi-catcher-640x454.jpg
Input Device http://www.motorolasolutions.com/web/Business/Products/Accessories/G%20-%20I/HAF4025/_images/_staticfiles/HAF4025_LG.jpg Antenna
Server • Output Device • http://www.ghacks.net/wp-content/uploads/2009/03/dedicated_server.jpg
Input Device http://www.phoneparts-accessories.com/img/p/767-1720-thickbox.jpg Cellphone Microphone
http://www.download32.com/images/screen/hs_crypto_c_source_library-28541.bmphttp://www.download32.com/images/screen/hs_crypto_c_source_library-28541.bmp Decryption Software
Necessity for Decryption • Creates the possibility of obtaining a mobile phone network’s RFID.
Beneficiary • The Indian Government receives expedited security and monitoring capabilities.
Suffering Stakeholder • The same administration garners disdain and disapproval
Beneficiary • Indian citizens receive enhanced terrorist prevention.
Suffering Stakeholder • The Indian citizens have their privacy reduced
Privacy http://govbooktalk.files.wordpress.com/2013/06/protecting-your-privacy.jpg
Privacy • Undetected Intrusions into confidential information by the government
Security http://www.wufoo.com/images/powered/security.png
Security • The entire purpose the program was created for.
Surveillance http://www.entrepreneur.com/dbimages/article/h1/amid-surveillance-concerns.jpg
Surveillance • Moral crossroads due to the monitoring of lawful civilians. Credits Jha, Prashant. "Balancing vigilance and privacy." Hindu 19 8 2013, n. pag. Web. 12 Sep. 2013. <http://www.thehindu.com/sci-tech/technology/balancing-vigilance-and-privacy/article5037582.ece>.