Introduction
Introduction
More than 70 percent of the adult online population has accessed the
Internet at work for personal use at least once, according to a September
2000 eMarketer study. Employees are sending personal e-mail, playing
games, viewing pornography, shopping, checking stock price and
gambling online during working hours.
Don't think these cyberslacking activities are going unnoticed. With a
simple software application, your boss can be tapping into your
computer and see what you're doing in real-time. Whether you are guilty
of wasting company time or not, your computer might be under
surveillance. You can be monitored without your knowledge --
employers are not required to notify you that you're being observed.
A Growing Trend: Systematic Surveillance
Packet sniffers
Log files
Desktop monitoring programs
Phones
Closed-circuit cameras
When you connect to the Internet, you are joining a network maintained
by your Internet service provider (ISP). The ISP's network
communicates with networks maintained by other ISPs to form the
foundation of the Internet. A packet sniffer located at one of the servers
of your ISP would potentially be able to monitor all of your online
activities, such as:
What streaming events you use, such as audio, video and Internet
telephony
Three types of Packet sniffing are used. Methods may work in non-
switched networks or in switched networks.
IP-based sniffing
I.P -based sniffing works by putting the network card into promiscuous
mode and sniffing all packets matching the IP address filter and is the
original type of packet sniffing. The IP address filtering isn't switched on
so the sniffing program is able to capture all the packets. This method
will only function in non-switched networks.
MAC-based sniffing
ARP-based sniffing
ARP-based sniffing doesn't put the network card into promiscuous mode
because ARP packets are sent to its administrators. This is because the
ARP protocol is stateless. This means that sniffing can be done on a
switched network.
To use ARP-based sniffing you will need to 'poison' the ARP cache of
the two hosts you intend to investigate, identifying yourself as the other
host in the connection. As soon as the ARP caches are poisoned the
hosts connect but instead of sending the traffic directly to the other host
it gets sent to the administrator who then logs the traffic and forwards it
to the real host on the other side of the connection.
Every time you provide some form of input for your computer, whether
it's typing on the keyboard or opening a new application, a signal is
transmitted. These signals can be intercepted by a desktop monitoring
program, which can be installed on a computer at the operating system
level or the assembly level. The person receiving the intercepted signals
can see each character being typed and can replicate what the user is
seeing on his or her screen.
Desktop monitoring programs can be installed in two ways:
Log Files
Your computer is full of log files that provide evidence of what you've
been doing. Through these log files, a system administrator can
determine what Web sites you've accessed, whom you are sending e-
mails to and receiving e-mails from and what applications are being
used. So, if you are downloading MP3 files, there's more than likely a
log file that holds data about that activity.
In many cases, this information can be located even after you've deleted
what you thought was all the evidence -- but deleting an e-mail, or a file,
doesn't erase the trail. Here are a few places where log files can be
found:
Operating systems
Workplace Eavesdropping
Computer surveillance is by far the primary method of monitoring
employee activity. However, employers are still using traditional
methods such as eavesdropping on phone calls, storing and reviewing
voice mail and video-recording employees on the job, according to the
American Management Association (AMA).
"The lines between one's personal and professional life can blur with
expectations of a 24-seven work week, but employees ought to engage
in some discretion about personal activities carried out during the
official hours of work," Ellen Bayer, AMA's human resources practice
leader, said.
Currently, 78 percent of all companies use some type of surveillance
system. Here is a breakdown of the methods they use:
Simply stated, courts in the United States tend to favor the employer in
workplace-surveillance cases. For that reason, employees should always
use good judgment when logging onto the Internet and sending e-mails.
Choose your words carefully; you never know who might read your
correspondence.
Stored communication
Communication in transit
The U.S. Constitution contains no express right to privacy, but the U.S.
Supreme Court has historically upheld an implied right to privacy.
However, this right does not apply to employees. Courts seem to be
upholding the idea that since the company owns the equipment and the
office space, it has a right to monitor its employees to prevent misuse of
that equipment and space.