Prisluškivanje. Modifikacija. Fabrikacija 2/16

Similar documents
The 14 th International Animated Film Festival NAFF 2019

GV3P401 TeSys GV3 termo magnetski-prekidač-30 40A- EverLink BTR/izravni konektori

Osnovna pravila. Davanje i prihvatanje kritike. Sadržaj. Šta je to kritika?

TDDC03 Project, Spring 2005

MEĐUNARODNI KONGRES MARKETING PROGRAM

SAVREMENE TEHNOLOGIJE ZAŠTITE PODATAKA KOD DIGITALNOG PRAVA

The ISBN number is a 10-digit number consisting of 4 groups, each separated by a hyphen:

Significant TRF TROODOS stories over past 6 months

RANI BOOKING TURSKA LJETO 2018

viša razina ISPIT SLUŠANJA (Listening Paper)

6.115 KryptoPhone Final Project Report

Update to 8 June 2011 Press Release

Universal Voice Logger

NUMB3RS Activity: Coded Messages. Episode: The Mole

TEMPEST Compromising Emanations

Broadband System - K

A Novel Study on Data Rate by the Video Transmission for Teleoperated Road Vehicles

RESULT-BASED ACTION PLAN

viša razina ISPIT SLUŠANJA (Listening Paper)

MULTI CHANNEL VOICE LOGGER MODEL: DVR MK I

BOOK REVIEW. LUCA MALATESTI University of Rijeka. Received: 18/02/2019 Accepted: 21/02/2019

GD-171 GD-191 LCD MONITOR. User s Guide. European Union only

viša razina LISTENING PAPER

AUTOMATIC LICENSE PLATE RECOGNITION(ALPR) ON EMBEDDED SYSTEM

DIGITALNO DOBA I TRADICIONALNA TELEVIZIJA U SRBIJI

MULTI CHANNEL VOICE LOGGER MODEL PCVL - 4/8/10/16/32/64. ORIGINAL EQUIPMENT MANUFACTURER OF VOICE LOGGING SYSTEMS Radio and CTI Expert Organisation

Copying is illegal. Review copy only. U j œ. œ œ œ œ œ. œ œ. # œ œ œ œ œ œ œ. ? b. œ œ œ œ œ œ œ œ. œ œ. Nancy M. Raabe

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

A) Instructions for preparing original articles Krajnji rok za prihvaćanje radova i sažetaka je godine.

SCS. Sniper Coordination System. 5/12 Slide 1 ORTEK Proprietary Information

Agilent 81600B Tunable Laser Source Family Technical Specifications August New model: nm, low SSE output!

JUN GODINE E N G L E S K I J E Z I K

Abstract Cover letter. Igor Pašti

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 S 2 SENATE BILL 887 Commerce Committee Substitute Adopted 5/12/09

Medicinski časopisi u otvorenom pristupu: iskorak ili privilegij?

DIGITAL TELEVISION: MAINTENANCE OF ANALOGUE TRANSMISSION IN REMOTE AREAS PAPER E

TITLE OF ARTICLE 3 (11 pt, Times New Roman, Bold, Centered, Uppercase)

MN9320A. Optical Channel Drop Unit. Independent Test Access Tool for Comprehensive DWDM Measurements

APPLICATION NOTE. Fiber Alignment Now Achievable with Commercial Software

Smart Traffic Control System Using Image Processing

GPU s for High Performance Signal Processing in Infrared Camera System

THE INTERNATIONAL REMOTE MONITORING PROJECT RESULTS OF THE SWEDISH NUCLEAR POWER FACILITY FIELD TRIAL

Fiber-optic microscopes rely on an internal filter to protect the eye from an accidental live fiber inspection. Eyepiece. Light Source.

Exploring the Enigma [The MATH Connection]

XXIV Simpozijum o novim tehnologijama u poštanskom i telekomunikacionom saobraćaju PosTel 2006, Beograd, 12. i 13. decembar 2006.

J. ISSN: The ISSN/EAN-13 barcode has the following components:

THE INTERNET OF VISION ENABLED THINGS. Tom Brennan Artemis Vision

V9A01 Solution Specification V0.1

CASE STUDY. Smart Motorways Project. Temporary CCTV Monitoring Systems for England s Motorway network.

Ford AMS Test Bench Operating Instructions

E3X-DA-S. Digital Fiber Sensors. Perfection Transcended! A Wealth of Advanced Functions for Easy and Reliable Application

Image Acquisition Technology

The comparison of actual system with expected system is done with the help of control mechanism. False True

Chapter 1. Chapter 2 NOTES

The story of ADPRO - Vision Systems

CS408 Cryptography & Internet Security

m1 ne pazi mislim ono ljudi koriste sve i svašta onaj uh alno look, I mean really people use all kinds of things er, uh but-

Typical applications:

Comp 410/510. Computer Graphics Spring Introduction to Graphics Systems

Ford AMS Test Bench Operating Instructions

2015 Rate Change FAQs

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Usage of any items from the University of Cumbria s institutional repository Insight must conform to the following fair usage guidelines.

JASON FREEMAN THE LOCUST TREE IN FLOWER AN INTERACTIVE, MULTIMEDIA INSTALLATION BASED ON A TEXT BY WILLIAM CARLOS WILLIAMS

RATE INCREASE FAQs. Can you tell me what one TV station/network costs?

190V3.

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Paper 1 May/June hours 30 minutes

What is TEMPEST Chapter 1

Electronic Roll Feed (ERF) Registration System

Washington Update. Bajo Control? Todo. Is Everything Under Control?

Sublimity Top Calls for Service August 2013

The Matrix As It Is: A Different Point Of View By David E. Robinson

Euro1080 HDTV CHANNELS SATELLITE MODEL

DH400. Digital Phone Hybrid. The most advanced Digital Hybrid with DSP echo canceller and VQR technology.

Data flow architecture for high-speed optical processors

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Digital holographic security system based on multiple biometrics

decodes it along with the normal intensity signal, to determine how to modulate the three colour beams.

RECENT TRENDS AND ISSUES IN IOT

Social Infrastructure Systems

Traditional RF Splitter/Combiner and Directional Coupler User Manual

e'a&- A Fiber Optic Wind Vane: A Conceptual View (U)

CRT Dynamics. A report on the dynamical properties of CRT based visual displays

2 GENERAL DESCRIPTION

Golfiana : A Theft from the National Library of Scotland

How to Categorize Risk in IoT

NEW JERSEY DIVISION OF REVENUE Specifications for the NJ-927 & NJ-927-W Duplexed Version As of July 1, 2006

Security of the Internet of Things

226V3L.

Televizija nekad i sad

Reconfigurable Neural Net Chip with 32K Connections

A Spy On The Bus By Margean Gladysz

Memorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and

SU17 Series Fiber Optic Sensors

Window Application Guide Graphic Solutions For Brand Managers & Business Owners

InterReach Fusion Data Sheet

High-Power Amplifier (HPA) Configuration Selection

Ultra-Wideband Scanning Receiver with Signal Activity Detection, Real-Time Recording, IF Playback & Data Analysis Capabilities

2-/4-Channel Cam Viewer E- series for Automatic License Plate Recognition CV7-LP

Transcription:

Prisluškivanje kao pasivni napad na informacione i sisteme vanredni profesor dr Boško Rodić, dipl. Inž. Društvo za informacionu bezbednost Sbij Srbije

Vrste napada u prenosu informacija Prekidanje Prisluškivanje Modifikacija Fabrikacija Viliam Stallings 2/16

Sun Cu Vu 544-496. pne. 3/16 Dakle, rečeno je da onaj ko poznaje svoga neprijatelja i poznaje samoga sebe, neće biti ugrožen ni u stotinu bitaka. Onaj ko ne poznaje svoga neprijatelja a poznaje sebe, imaće podjednake izglede i za pobedu i za poraz. Onaj ko ne poznaje ni svog neprijatelja ni samoga sebe, biće poražen u svakoj bici. i

Harun Al Rašid 763 809. Bio je veoma biž brižan i pravedan. Ponekad je prerušen išao po ulicama i bazarima Bagd ada osluškujući da li je narod zadovoljan njegovom vladavinom ili ne. 4/16

Džordž Orvel 1949. Džordž Orvel je u romanu 1984 predskazao budućnost gde individue nemaju očekivanu privatnost jer je država monopolisala tehnologiju za špijuniranje. Vlada posmatra aktivnosti građana od rođenja do smrti. Niko ne može (nije mogao) da se zaštiti jer obaveštajna i kontraobaveštajna tehnologija kontroliše se od strane Vlade 5/16

Renesansna Venecija 14. do 16. vek Jedna od najsavršenijih obaveštajnih (diplomatskih) službi u istoriji. Ubijali znatalije iseljenike da ne iznesu tajne znata 6/16

Norbert Viner 1954. IS treba da bude kao sud iz kog ne može ništa da izađe, a, može da uđe bilo šta 7/16

Echelon 1948. 8/16 Secret agreement in 1948 NSA, GCHQ (UK), CSE (Canada), DSD (Australia), GCSB (New Zealand) Listening stations throughout world Monitor satellite, microwave, cellular and fiber- optic communications traffic Voice recognition and OCR Dictionary of suspicious phrases Echelon Intercept Station, Menwith Hill, England

Echelon 1948. 9/16 Political spying: British Prime Minister Margaret Thatcher used Echelon (Canada) to spy on ministers suspected of disloyalty (1983) Senator Strom Thurmond, Congressman Michael Barnes Target Amnesty International, Greenpeace, etc. Commercial espionage Liaison to Department of Commerce, uses intelligence to help American companies get contracts 1993 Clinton asked CIA to spy on Japanese auto makers designing zero- emissions vehicles, and send information o to GM, Ford and Chrysler

Vim Van Eck 1985. 10/16

Clipper Chip 1987. An encryption chip designed under the auspices of the U.S. government. The government's idea was to enforce use of this chip in all devices that might use encryption, including computers, mode ms, telephones, and televisions. The government would control the encryption algorithm, thereby giving it the ability to decrypt any messages it recovered. 11/16

Carnivore 1997. Jula 2000. godine objavljen je članak o Karnivoru (Carnivore Carnivore) sistemu za policijsko njuškanje na Internetu. Karnivor navodno izdvaja sumnjive poruke iz glavnog toka informacija ij koje protiču kroz servis nekog Internet provajdera... Karnivor predstavlja jednu od inicijativa Klintonove administracije željne da obezbedi obaveštajnim službama pravo na prisluškivanje onlajn sveta... pa administracija želi da očuva sposobnost kontrolisanja kriminalnih aktivnosti i u novim okolnostima. Realizovan je u oktobru 1997, a 2005. zamenjen je komercijalnim softverom NarusInsight. 12/16

Markus Kuhn maj 2002. published a paper (Optical Time-Domain Eavesdroppin g risks of CRT displays) to describe the reconstructio n of a CRT display using the information contained. 13/16 Diffuse reflections of information carrying emissions can be detected Source: CRT Raster Scan display monitor Photo multiplier Computer for signal capturing and processing Power Supply CRO

Ukradene šifre i imejl adrese 250.000 korisnika Tvitera, februar 2013. Društvena internet mreža Tviter saopštila je da su hakeri ukrali 250.000 hiljada lozinki i imejl adresa korisnika te mreže. To je jedan od najvećih hakerskih napada na Tviter, koji ima 200 miliona aktivnih korisnika, čime se povećavaju strahovi o opasnostima takozvanih kiber napada, napominju agencije. 14/16 Stručnjaci upozoravaju da hakeri mogu da dođu u posed vrednih informacija pošto mnogi korisnici pasvorde koje imaju na Tviteru koriste i u druge svrhe, uključujući i bankarske.

Kineski hakeri napali i Volstrit džornal, februar 2013. List Volstrit džornal je drugi američki medij koji je optužio kineske hakere da napadaju njegove kompjutere u navodnom pokušaju da špijuniraju novinare koji prate zbivanja 15/16 u Kini.

Oticanje podataka iz službenih prostorija 24 2 23 26 25 8 4 9 20 17 21 18 22 5 19 18 15 14 10 12 16 12 1 28 5 30 5 27 3 29 7 6 11 13 16/16