Wednesday, December 2, 2009

Day 25

We had talked as a group before we came to class and we have divided the presentation up into 7 different slides. In class after we met with professor Squire we decided to switch the order of the slides. Mark will be doing the first two slides: keyboard sniffers/logger and acoustic key logger because the two are so similar that the information would lap if we did not give it to one person. The second two slides are going to be done my Meya who will be doing keyboard overlays and electromagnetic emissions. The final three slides, I will do. My first slide is optical surveillance and in class we decided that it would be interesting if I found a news artical to show an example of how this is really happening. My second slide is carnivore and my third is room 641A. My final slide on 641A has a very short clip from youtube. We made sure that we as a group are going to have many websites for each type of surveillance. We grouped my three topics together because they are topics that arent your basic type of surveillance. They both have to do with the goverment and some sort of lawsuit so we thought it was appropriate to group them that way. We as a group also made sure that we were going to have enough information to get the point across but not ramble over the ten minutes. Finally on each person's slide we are going to talk about how these types of surveillances can be used for good and for evil. An example of that being optical surveillance. Having cameras there might prevent someone from being mugged or attacked and if so one can recognize the person. However cameras are also being used to steal pin numbers.

Monday, November 30, 2009

Day 24 Computer surveillance

Keystroke logging or tracking, keeps track of the keys that have been hit on the keyboard and records it with many people unaware that it is happening. There are many different types of computer surveillance a few examples being: harware - based keyloggers, wireless keyboard sniffers, keyboard overlays, acoustic keyloggers, electromagnetic emissions, and optical surveillance.

Wireless keyboard sniffers - "These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver."

keyboard overlays - "Criminals have been known to use keyboard overlays on ATM machines to capture people's PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal's keypad that is placed over it."

Acoustic keylogger - "Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each character on the keyboard makes a subtly different acoustic signature when stroked."

Electromagnetic emissions - "It is possible to capture the electromagnetic emissions of a wired keyboard from up to 20 metres (66 ft) away, without being physically wired to it"

Optical surveillance - "A strategically placed camera, such as a hidden surveillance camera at an ATM, can allow a criminal to watch a PIN or password being entered"

http://en.wikipedia.org/wiki/Keystroke_logging

Room641A - Alleged wiretaping by the NSA on AT&T customers in a secret room in an AT&T SBC Communications building on Folsom St., San Francisco. The lawsuit against such accusations began in 2003 and is still continuing today.

http://www.eff.org/cases/att

http://www.experiencefestival.com/a/Computer_surveillance_-_Surveillance_techniques/id/1251548

Monday, November 16, 2009

How does email work?


The first email was sent by Ray Tomlinson in 1971. Coming to the understanding that a person can send an email to another person/machine by the @ symbol, which designates the machine that the email will be going too. In order to send an email people use an email client example being Microsoft outlook, however if a person choses to use free email from the internet then it is considered an email client from a web page examples being google and hotmail.

Most simple email server:



More complex Servers:



Most people have an email system that has two different servers running, the first is called the SMTP server (Simple Mail Transfer Protocol) which is in charge of all outgoing mail. The second is the POP3/IMAP server, which is in charge of handling the incoming mail.
Email's are placed in packets, each indicate the address of the person sending the message and a few details about the message and then finally the text.
Extra Detailed explanation from How Stuff Works.com :
Outlook Express connects to the SMTP server at mail.howstuffworks.com using port 25.
Outlook Express has a conversation with the SMTP server, telling the SMTP server the address of the sender and the address of the recipient, as well as the body of the message.
The SMTP server takes the "to" address (jsmith@mindspring.com) and breaks it into two parts: the recipient name (jsmith) and the domain name (mindspring.com). If the "to" address had been another user at howstuffworks.com, the SMTP server would simply hand the message to the POP3 server for howstuffworks.com (using a little program called the delivery agent). Since the recipient is at another domain, SMTP needs to communicate with that domain.
The SMTP server has a conversation with a Domain Name Server, or DNS (see How Web Servers Work for details). It says, "Can you give me the IP address of the SMTP server for mindspring.com?" The DNS replies with the one or more IP addresses for the SMTP server(s) that Mindspring operates.
The SMTP server at howstuffworks.com connects with the SMTP server at Mindspring using port 25. It has the same simple text conversation that my e-mail client had with the SMTP server for HowStuffWorks, and gives the message to the Mindspring server. The Mindspring server recognizes that the domain name for jsmith is at Mindspring, so it hands the message to Mindspring's POP3 server, which puts the message in jsmith's mailbox. "


Monday, November 2, 2009

Day 18

Network neutrality is a principle that believes that all internet traffic should be treated equally.
Absolute non-discrimination, limited discrimination without QoS tiering, and limited discrimination and tiering. This principle will allow networks to carry info and support all applications. The internet is working to be neutral state. It is striving to make a law. If this law is passed it will make everything a little slower and maybe more expensive.
http://timwu.org/network_neutrality.html
http://www.washingtonpost.com/wpdyn/content/article/2006/06/25/AR2006062500735.html
http://news.bbc.co.uk/2/hi/technology/5009250.stm

(From Wiki)
"Absolute non-discrimination:
Tim Wu: "Network neutrality is best defined as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally."[2] Susan P. Crawford "believes that a neutral Internet must forward packets on a first-come, first served basis, without regard for quality-of-service (QoS) considerations."[11]

Limited discrimination without QoS tiering:
United States lawmakers have introduced bills that would allow quality of service discrimination as long as no special fee is charged for higher-quality service.

Limited discrimination and tiering:
This approach allows higher fees for QoS as long as there is no exclusivity in service contracts. According to Tim Berners-Lee: "If I pay to connect to the Net with a given quality of service, and you pay to connect to the net with the same or higher quality of service, then you and I can communicate across the net, with that quality of service." "[We] each pay to connect to the Net, but no one can pay for exclusive access to me."

Probems with QoS:
dropped packets, delays, error, jitter, out-of order delivery.

Tiered Internet:
Allows telecommunication providers to divide up there traffic onto more than one tiers.
http://en.wikipedia.org/wiki/Tiered_Internet

http://en.wikipedia.org/wiki/Network_neutrality#Definitions_of_network_neutrality

Verizon is against network neutrality. They are arguing that we should be able to prioritze based on importance. Traffic is based on what type of packet you are sending. Ex: Spam would be the last to go when sending a message because it is the least important to Verizon.
http://news.cnet.com/8301-30686_3-10379932-266.html
http://www.washingtonpost.com/wpdyn/content/article/2006/02/06/AR2006020601624.html

Wednesday, October 28, 2009

Day 17 IP address

My IP address is 152.33.51.201. I also looked up my parent's company schaefferbmw.com. They are register with Network Solutions, LLC and they are due to expire in the year November 2010. Also I found that there IP address is 72.247.52.133. I tried to type in my first name with .com on the end but that took me to a search engine that brought up related sights with the name carolyn in them.

http://www.networksolutions.com/whois-search/schaefferbmw.com

Monday, October 26, 2009

Day 16

I was sent the word aasvogel. It means a number of species of the South African Vulture. hmmmm.... i never would have guessed that! The word I was sending was uxorious, which means doting upon, foolishjly fond of, or affectionately submissive toward one's wife. I have never heard of that word either! It took me around 40 minutes. I got the first 5 done very quickly but because of the different ways of communication that we tried I was unable to get the rest of my message across until the end.
I thought that both sending and retreiving were fairly easy. Sending was very simple as long as you did not clash with another person who was trying to communicate and retrieving was easy as long as it was easy to understand the person. So people read very quitely, making it difficult to understand. A few troubles that we hit while trying to get out messages across were everyone speaking at once and then a connection was called then more people trying to jump in. Also the other methods we tried were difficult because not everyone was able to send a recieve messages. As for making it fast.... I think that the way we did it was the fastest because though we had some collisions it was still faster than going in a circle and everyone had the opportunity to speak, sometimes the more organized you try to be the harder it is. Also people were left out because everyone has to send and recieve.
Overall I really liked the exercise!

Wednesday, October 21, 2009

Day 15

A way to connect computers and insure that your message gets there in one piece could be similar to to the bus idea. Having all computers connected to a strip of wires for communication however a down fall of the bus could be that the bus itself would get so busy that it would cause communication to be transfered slowly. Maybe if you had more than one bus and you used one bus for certain types of communication ex:email and the other bus could be for another type of communications for example sending excel sheets and word documents. This way the bus would not get to over crowded because not all of the computers are going to be sent the same things, more buses would help to give more lines of communication. Rather than all computers trying to communicate through one line.