380 likes | 473 Views
COMP 381. Tracking technologies 14 MARCH. Wireless Technologies. RFID Infrared: 5m, line of sight Bluetooth: 10m WiFi: 30m Cellphone: 10k GPS: reach satellite, line of sight. GPS. Global Positioning System U.S . space-based system World-wide services positioning navigation timing.
E N D
COMP 381 Tracking technologies14 MARCH
Wireless Technologies • RFID • Infrared: 5m, line of sight • Bluetooth: 10m • WiFi: 30m • Cellphone: 10k • GPS: reach satellite, line of sight
GPS • Global Positioning System • U.S. space-based system • World-wide services • positioning • navigation • timing
Components of GPS 24 satellites receiver and data bases galore with GPS coordinated
GPS Well Accepted Uses Emergency Tracking • Marine Vessels • Personal GPS Locator Transportation Safety • Aviation • Automobiles Criminal Tracking • House arrest • Enhanced probation • Enforce prohibitions National Security • Port Security • Military Tracking
And others… • Parents tracking their kids • Cellphone tracking • Hidden GPS in teens cars • Companies tracking vehicles and drivers • Dispatchers are privy to private information • Being tracked without knowing • Spouses tracking each other
What is RFID? Tag Reader
Passive vs Active • Passive • Power only from reader • No battery • Smaller • Active • Power from tag and reader • On board battery • Larger
Current RFID ranges • Passive • Shorter range • Between 1 ft and 4 ft • Restricted by strength of reader magnetic field • Active • Longer range • Up to 50 ft • Restricted by material interference
Applications Product tracking • Livestock • Library books • WalMart EZ Pass Nightclubs in Barcelona Security in Mexico Pets • ID chip • Pet door Medical • Tracking drugs • Matching patients with drugs/procedures • Emergency medical information • Surgical sponges • Alzheimer patients Gun control
RFID Exploits • Eavesdropping • Impersonation • Data tampering • Information theft
RFID Hacks • Your credit card info: $8 • Your passport info: $250 • Free gas for life: $280
Cryptography solutions • Objectives • Confidentiality • Integrity • Standard techniques • encryption • challenge-response
Message Message Secure Message Secure Message Information Transmission Attack Trusted Third Party arbiter, distributor of secret information Sender Receiver Secret Information Secret Information Security related transformation Information channel Opponent
Key Technologies • Encryption -> Confidentiality • Before 1976 private (secret) key • Public key introduced in 1976 (Diffie & Hellman) • Authentication -> Integrity • Digital Signature: Sender cannot deny having sent message (non-repudiation) • Kerberos: Central server issues identity voucher
Encryption ENCRYPTION PLAINTEXT CIPHERTEXT KEY DECRYPTION
Levels of Encryption • Unconditionally Secure • Unlimited resources + unlimited time • Plaintext CANNOT be recovered from ciphertext • Computationally Secure • Cost of breaking exceeds information value • Time to break exceeds useful lifetime
Sender, receiver share common key Private Key
Techniques • Substitution ciphers • Transposition ciphers (rearrange bits) • Combinations of the two basic types
Caesar Cipher • Substitute the letter 3 ahead for each one • Example: • Et tu, Brute • Hw wx, Euxwh • Quite sufficient for its time • High illiteracy • New idea
Enigma Machine(Germany, World War II) • Simple Caesar cipher through each rotor • But rotors shifted at different rates • Roller 1 rotated one position after every encryption • Roller 2 rotated every 26 times… http://russells.freeshell.org/enigma/
Attack Mechanisms • Brute force • Statistical analysis • Knowledge of natural language • All English words have vowels • There are only 2 1-letter words in English • High probability that u follows q • …
DES (Data Encryption Standard) • Government standard • History: • First version 1976 • Replaced with AES in 2001 • Longer keys, computationally harder • Cracking: • 1998: EFF supercomputer 56 hrs • 1999: Distributed.net 22 hrs • Today: $1M specialized hardware <1 hr
Two keys: one private, one public Public Key
Public Key Cryptography • Two keys • Private key known only to individual • Public key available to anyone • Public key, private key inverses • Confidentiality • encipher using public key • decipher using private key • Integrity/authentication • encipher using private key • decipher using public one
Popular Public Key Systems • RSA • Rivest, Shamir, and Adelman • MIT professors 1977 • PGP • Pretty Good Privacy • Zimmerman 1991 • Freeware Versions
Video Surveillance • Brief History: • Press suggested use by police as early as 1965. • 1969: Use in NYC. Became quite popular
Video Surveillance – Government • Law enforcement
Video Surveillance - Britain • 4.2 Million Closed Circuit Television Cameras currently in Britain • Britain ranks worst among Western nations about guarding privacy…. • …but compared to the World suddenly not so bad…. • Scotland Yard’s New Strategy….will it work?
Video Surveillance - Private • Private retail stores and businesses use cameras for security purposes World’s Dumbest Criminal (for your amusement) http://www.youtube.com/watch?v=_quStvTNynI • UNC http://its2.unc.edu/resnet/webcams/ • And lots more http://www.earthcam.com/
Definition of Privacy • pri·va·cy: freedom from unauthorized intrusion: state of being let alone and able to keep certain personal matters to oneself
Facial Recognition • Government • London CCTVs • Tampa PD • Airports • Private • Casinos • iPhoto
Wiretapping Brief History 2008 2001 1928
Facts and Stats • Average cost in 2008: $47,624 • Total cost 2008: $81 million • Total cost 1988: $355 million • Convictions 2008: 810 of 4133 arrests • Convictions 1998-2008: 56%
Opportunity for Misuse • Greek government had over 100 cell phones tapped by an unknown source • AT&T caught working with NSA to tap American conversations in 2003
Orwell’s 1984 • There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.