Keyloggers At Work

advertisement
Keyloggers At Work
Jason Clark
History
• Believed to have been first used by the
government
• Believed that they were used in the early
1990’s
• Software key loggers came before
hardware key logging devices
2
Types of key loggers
2 types of key loggers
• Software
• Hardware
3
Software
• do not require physical access to the
user’s computer.
• can be manually downloaded or secretly
downloaded as spyware
• will upload the logged data to a remote
drive or email
4
Hardware
• connects between the user’s keyboard and
monitor
• easy to hide
• data is stored on a mini hard drive located
within the device
5
Why are they being used?
•
•
•
•
•
•
•
Web browsing
Social networking, such as FaceBook, Twitter
On-line entertainment, such as gaming, YouTube, blogs
Private E-mail correspondence
Instant messaging
Skype
File sharing over P2P networks
6
The problem…
There is potential for invasion of privacy!
• Gain access to any personal emails
• See web searches
• See instant messages
7
Is it legal?
Short answer, yes..
There is currently no federal law that has
been interpreted to prohibit their surreptitious
use.
8
Electronic Communications Privacy Act
The ECPA could potentially prevent
keystroke theft, but thus far the protections it
offers have not been extended to keyloggers.
9
For example…
Rene v. G.F. Fishers, Inc
10
So is it ethical? …not really!
Employers claim…
“computer surveillance and key logging is
to ensure productivity”
Website blockers
Remote desktop access
Time audits
11
Conclusion
Although using key loggers at a place of
employment works and is legal, there are
more ethical ways to ensure productivity
without the risk of invading someone’s
privacy.
12
Resources
•
•
•
•
•
•
•
•
http://www.securelist.com/en/analysis?pubid=204791931
http://searchmidmarketsecurity.techtarget.com/definition/keylogger
http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss
ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso
nal+Information.html
http://usatoday30.usatoday.com/money/workplace/2010-03-17workplaceprivacy15_CV_N.htm
http://www.parxy.com/history-keyloggers.html
http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-actregulation-of-keyloggers-in-the-workplace
http://www.ehow.com/list_7252161_problems-keyloggers.html
http://news.cnet.com/8301-13578_3-10099123-38.html
13
Download