1 / 20

Telephone Call Interception System

Telephone Call Interception System. Kevin Colkitt Politics and Government Terrorist Monitoring. Flowchart. Process. Decryption RFID Gathered Tower Guise Data Intercepted. Processing Device http://photosinbox.com/wp-content/uploads/2012/02/gsm-sim-card.jpg. SIM Card. IMSI Catcher.

belita
Download Presentation

Telephone Call Interception System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Telephone Call Interception System Kevin Colkitt Politics and Government Terrorist Monitoring

  2. Flowchart

  3. Process • Decryption • RFID Gathered • Tower Guise • Data Intercepted

  4. Processing Device http://photosinbox.com/wp-content/uploads/2012/02/gsm-sim-card.jpg SIM Card

  5. IMSI Catcher • Processing Device • http://cdn.arstechnica.net/wp-content/uploads/2013/08/body-worn-imsi-catcher-640x454.jpg

  6. Input Device http://www.motorolasolutions.com/web/Business/Products/Accessories/G%20-%20I/HAF4025/_images/_staticfiles/HAF4025_LG.jpg Antenna

  7. Server • Output Device • http://www.ghacks.net/wp-content/uploads/2009/03/dedicated_server.jpg

  8. Input Device http://www.phoneparts-accessories.com/img/p/767-1720-thickbox.jpg Cellphone Microphone

  9. http://www.download32.com/images/screen/hs_crypto_c_source_library-28541.bmphttp://www.download32.com/images/screen/hs_crypto_c_source_library-28541.bmp Decryption Software

  10. Necessity for Decryption • Creates the possibility of obtaining a mobile phone network’s RFID.

  11. Beneficiary • The Indian Government receives expedited security and monitoring capabilities.

  12. Suffering Stakeholder • The same administration garners disdain and disapproval

  13. Beneficiary • Indian citizens receive enhanced terrorist prevention.

  14. Suffering Stakeholder • The Indian citizens have their privacy reduced

  15. Privacy http://govbooktalk.files.wordpress.com/2013/06/protecting-your-privacy.jpg

  16. Privacy • Undetected Intrusions into confidential information by the government

  17. Security http://www.wufoo.com/images/powered/security.png

  18. Security • The entire purpose the program was created for.

  19. Surveillance http://www.entrepreneur.com/dbimages/article/h1/amid-surveillance-concerns.jpg

  20. Surveillance • Moral crossroads due to the monitoring of lawful civilians. Credits Jha, Prashant. "Balancing vigilance and privacy." Hindu 19 8 2013, n. pag. Web. 12 Sep. 2013. <http://www.thehindu.com/sci-tech/technology/balancing-vigilance-and-privacy/article5037582.ece>.

More Related