Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty!



Similar documents
The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Data Privacy Transparency of Canadian Internet Service Providers

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below.

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Statement on ischool responses to the challenges of NSA mass state surveillance

Global Information Society Watch 2014

Economic Impact of PRISM on Cloud Services & Safe Harbor

Keeping Internet Users in the Know or in the Dark A Report on the Data Privacy Transparency of Canadian Internet Carriers

Position Paper: Berlin, 31 March Legislative intentions to increase IT Security

Legislative Language

Index All entries in the index reference page numbers.

Privacy Law in Canada

It s stated goal is to give people the power to share and make the world more open and connected.

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Keynote Presentation to. Simon Fraser University Vancouver, BC November 8, Elizabeth Denham Information and Privacy Commissioner for B.C.

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE

Insights and Commentary from Dentons

Thank you for the opportunity to join you here today.

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology

OPEN ACCESS, PRIVACY AND HACKER CULTURE

Case 1:13-cv RJL Document Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

details, and numerous other data points. Enough information is often collected that even 2

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

NETWORKS AND THE INTERNET

The cloud thing: Privacy and cloud computing

COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November /06 DATAPROTECT 45 EDPS 3

CSA Survey Results Government Access to Information July 2013

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

Brief on Did GCHQ Spy on You Illegally?

Distributel Communications Limited. c/o Privacy Officer 177 Nepean St. Suite 300, Ottawa, ON, K2P 0B4. January 20, 2014

Protecting Saskatchewan data the USA Patriot Act

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

Introduction. We hope you find this transparency report useful and informative. Enjoy.

Networks and the Internet A Primer for Prosecutors and Investigators

Is There Such a Thing as Internet Privacy?

HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT. Jeffrey L. Vagle * INTRODUCTION

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Atlanta Insomnia & Behavioral Health Services, P.C. 315 West Ponce de Leon Ave Suite 1051 Decatur, GA

Passenger Protect Program Transport Canada

Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act

Online Research and Investigation

Before the FEDERAL COMMUNICATIONS COMMISSION. Washington, DC 20006

PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION

CASL Compliance: A Primer on Canada's Anti-Spam Legislation. Whitepaper by David O. Klein, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, My name is Richard Allan, and I am the Director of Public Policy

COURT ORDERS FOR TELEPHONE RECORDS

NSA Surveillance, National Security and Privacy

Guilford Medical Associates, P.A.

Before the AmCham EU Transatlantic Conference (Mar. 3, 2011), available at

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology

Privacy Law in Canada

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU

HIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY

Mega Transparency Report. March Requests for Removal of Content and for User Information

Data Privacy: Where Should I House My Data?

Patriot Act Impact on Canadian Organizations Using Cloud Services

Personal Information Protection Act. Information Sheet 12: 1. Service Providers Outside Canada: Notification, Policies and Practices

Polk Medical Center Notice of Privacy Practices

CYBER LIABILITY CLAIMS

As Required by the Privacy Regulations Created as a Result of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Acceptable Use of Information Technology

National Security Agency

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No

Strategies for occupational therapists to address elder abuse/mistreatment

Just Net Coalition statement on Internet governance

It is the policy of the National Conference of State Legislatures to advance and defend a

7 August I. Introduction

Microsoft Cloud Computing Research Centre

Health Insurance Portability and Accountability Act (HIPAA)

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

As the US debates privacy a Berlin start up surges with...

Internet Governance Forum Baku 2012

How To Ensure Health Information Is Protected

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Bush Lets U.S. Spy on Callers Without Courts

5C-315. Presentation To. United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Promoting Cross Border Data Flows Priorities for the Business Community

PRIVACY POLICY. Consent

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Gmail Security - Concerns About Privacy

Freedom of Information Act Request and Request for Expedited Processing

T.38 fax transmission over Internet Security FAQ

FEB 0 S The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C

F ACEBOOK ACCOUNT SEARCH WARRNT AFFIDAVIT. at l2/criminal/ccips/online/library.htm under "Guides from ISPs."

UNIVERSITY OF ST ANDREWS. POLICY November 2005

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Transcription:

JonathanA.Obar,AndrewClement InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$Track Citation Obar,J.A.&Clement,A.(2013).InternetSurveillanceandBoomerangRouting:ACallforCanadianNetwork Sovereignty.InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$ Track$ $Annual$Conference$of$the$Canadian$Communication$Association$(Victoria,$June$5$ $7,$2013),URL: http://www.tem.fl.ulaval.ca/fr/victoriap2013/

InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty 1 Author JonathanA.Obar FacultyofInformation,UniversityofToronto DepartmentofTelecommuncation,InformationStudiesandMedia,MichiganStateUniversity jonathan.obar@utoronto.ca AndrewClement FacultyofInformation,UniversityofToronto andrew.clement@utoronto.ca Abstract Analysisofmorethan25,000internettraceroutesrevealsaphenomenonwecall boomerang routing,wherebycanadianptopcanadianinternettransmissionsareroutinelyroutedthrough theunitedstates.canadianoriginatedtransmissionsthattraveltoacanadiandestinationvia au.s.switchingcentreorcarrieraresubjecttou.s.lawpincludingtheusapatriotactand FISAA.Asaresult,thesetransmissionsexposeCanadianstopotentialU.S.surveillance activities,includingthosehighlightedbythesnowdenallegations aviolationofcanadian networksovereignty. InthefaceofthisunregulatedsurveillanceofCanadians,theFederalgovernmentand internetserviceprovidersshouldrepassertournationalnetworksovereigntyandbetter protectcanadiancivilliberties.inwhatfollows,wepresentboomerangroutefindingsand discussnsatrackingconcerns.wethenofferaplanforstrengtheningcanadiannetwork sovereigntyandprovidetwostrategiesforprotectingcanadianinternettransmissionsfrom Americansurveillance:1)strengthenandenforceCanadianprivacylaw(e.g.PIPEDA),and2) repatriatecanadianinternettrafficbybuildingmoreinternetexchangepoints. Keywords Surveillance;NSA;Telecommunications;Privacy;BigData;NetworkSovereignty 1 This research has received funding from Canada s Social Sciences and Humanities Research Council and the Office of the Privacy Commissioner of Canada. The IXmaps project is the work of a research team that currently includes Colin McCann and Antonio Gamba. David Phillips, Steve Harvey, GabbyResch,ErikStewart,NancyPaterson,MishaSnyderandLaurenDiMonte havemadeinvaluablecontributionsatearlierstagesoftheproject.wearealso gratefultothoseindividuals,largelyanonymous,whohavecontributedtothe databasebyinstallingandrunningtrgen,orhaveprovidedfeedbackthathas helpedimprovetheapplication. 1

1. Introduction Nationalsovereigntyisthreatenedwhenanotherwiseinternationally independent state has its rights and powers of internal regulation and controlviolatedbytheencroachmentofaforeignbody(barr,2002).asa sovereignwillcanbeimposedinanyareawherethereisarelationship betweenthepoliticalentityknownasthestateanditscitizens,thereare a multitude of sites for potential violation. One such site is network sovereignty P the authoritative quality or process whereby an entity (such as the state) or set of entities distinguishes the boundaries of a network and then exercises a sovereign will or control within those boundaries.anycontrollingentity,fromafeudalmonarchtoanelected government, exercises a form of network sovereignty when they construct or regulate any number of network systems ranging from transportation (e.g. roads, railroads, highways), utilities (e.g. water, electric) to communication (e.g. mail routes, telecommunication) in whichthestatehasavitalinterest.assovereigns,theycandecidewhere thesenetworksgo,theirstructuraldesignanddevelopment,theextent to which they operate, in whole or in part, and at what speed and capacity,aswellaswhoorwhatcantravelonthem,andatwhatprice.it follows that a threat to national network sovereignty constitutes encroachmentupontherightsandpowersofthestatetoregulateand controlanyofthesenetworkaspects. Canada s telecommunication system, as a critical infrastructure for nation building and sociopeconomic wellpbeing, is one site where the state has, over many years, attempted to exercise national network sovereignty. Following from a long history of protectionist policy, the Telecommunications Act of 1993 notes that Canadian telecommunications perform an essential role in the maintenance of Canada s identity and sovereignty (Telecommunications Act, 1993). Exercisingasovereignwill,theCanadiangovernmentalsodetermineda connectionbetweenitstelecommunicationsystemandtheprotectionof civil liberties. For example, the Act notes that Canadian telecommunicationsshould contributetotheprotectionoftheprivacy ofpersons (Ibid).TheseprivacyprotectionsarereinforcedbySection8 of the Canadian$ Charter$ of$ Rights$ and$ Freedoms that protects against unlawfulsearchandseizure,andbythepersonal$information$protection$ and$electronic$documents$act(pipeda),whichsafeguardsdataprivacyin theprivatesector.asaresult,shouldaforeignbodyencroachuponthe controlofacanadiantelecommunicationnetworkanditsoperation,that actionwouldconstituteaviolationofcanadiannetworksovereignty,and potentiallythreatencanadiancivilliberties. This paper presents findings from the IXmaps (for internet exchange mapping)projectattheuniversityoftoronto 2 aresearchinitiativethat maps and analyzes the routes Canadian data packets take across the internetbackbone.whilecanadiansaccessingamericanserversthrough 2 www.ixmaps.ca 2

intendedcommunicationwithamericansandamericaninternetservices shouldexpecttosendpacketsacrosstheborder,onemightassumethat CanadianPtoPCanadian communication remains within national jurisdiction. Contrary to this assumption, the IXmaps research makes visibleawidespreadphenomenonwecall boomerangrouting whereby CanadianPtoPCanadian internet transmissions are routinely routed throughtheunitedstates 3.Canadianoriginatedtransmissionsthattravel toacanadiandestination,butviaau.s.switchingcentreoru.s.carrier, aresubjecttou.s.lawpincludingtheusapatriotactandfisaa 4.Asa result, CanadianPtoPCanadian internet transmissions that boomerang exposecanadiancommunicationstopotentialu.s.surveillanceactivities a violation of Canadian network sovereignty. These concerns are particularly acute in the wake of Edward Snowden s revelations about the National Security Agency s (NSA) internet surveillance programs (Clement,2014). Inthefaceofthisunregulated surveillance of Canadians, the Federal governmentandinternetserviceprovidersshouldrepassertournational networksovereigntyandbetterprotectcanadiancivilliberties.inwhat follows, we present IXmaps boomerang route findings, and discuss related concerns about NSA tracking. We then offer a plan for strengtheningcanadiannetworksovereigntyandprovidetwostrategies for protecting Canadian internet transmissions from American surveillance: 1) strengthen and enforce Canadian privacy law (e.g. PIPEDA), and 2) repatriate Canadian internet traffic by building more internetexchangepoints. 2. MappingCanadianBoomerangTrafficThroughtheU.S. Whenusersinteractwithinternetapplications(email,web,p2p,etc.) they send data packets over the internet. As each packet takes its individual path, it travels through data traffic routers that pass the packet closer to the destination. Anyone who has tracked a couriered mailpackageknowsthatmaildoesnottravelinastraightlinefrompoint A directly to point B, there are stops (or hops ) in different locations alongtheway thesameistruefordatapacketrouting. IXmapssoftwaremapsdatapacketroutes( traceroutes )usinggoogle EarthandGoogleMapstotracetheroutespacketstakefromtheuser s machine,throughthedifferenttrafficrouters( hops )alongthewayto the final destination. As shown in Figure 1, the software provides locationdata(i.e.latitudeandlongitude)foreachhopalongtheroute. Since2009,theIXmapsteamhasengagedinacrowdsourcingeffortto generateandaccumulatetraceroutes.morethan200contributorshave installedandruncustomizedtracegenerationsoftware(trgen),adding 3 While not recognized publically, it is wellpknown in the internet routing communitythatsignificantportionsofintrapcanadiantraffictransitstheus. 4 Notably Section 215 of the USA Patriot Act, and Section 702 of the Foreign SurveillanceIntelligenceAmendmentsAct(FISAA). 3

Obar & Clement Internet Surveillance and Boomerang Routing to a database currently containing well over 25,000 traceroutes from over 200 distinct originating addresses, terminating in more than 2,500 distinctdestinations. Figure'1' 'Toronto.New'York.Chicago.Toronto'Boomerang'Traceroute'Details' Figure1presentsthetraceroutedatafora boomerangroute,apath thatoriginatesandterminatesinthesamecountry,buttransitsanother. As depicted in Figure 2, this traceroute begins and ends in Canada, but crossesintotheu.s.alongtheway. Figure'2' 'Toronto.New'York.Chicago.Toronto'Boomerang'Route$ From the database of 25,000 traceroutes, 5,560 originate and terminate in Canada, of those, 1,280, roughly onepquarter, boomerang through the United States. Some of the online interactions that boomerang through the U.S. include visits to Canadian government websites,includingtheofficeoftheprivacycommissionerofcanada,as wellasanumberofpersonalbankingsitessuchasbankofmontreal,td CanadaTrustandCIBC. 4

3. CanadianBoomerangTrafficandNSASurveillance In2006,MarkKlein,aretiredAT&Ttechnician,revealedthattheU.S. NationalSecurityAgency(NSA)hadinstalledsurveillanceequipmentat AT&T smainsanfranciscointernetexchangepoint(ixp)at611folsom St. (Klein, 2009). By installing splitters that directed exact copies of all traffic passing through the IXP to secret computers, the NSA s surveillance system is capable of monitoring the process of communication (i.e. sender and receiver), but also the contents of messages as well. Much of the intercepted traffic is saved for later analysis. The NSA s secret data center or spy facility currently being builtinutah,willsoonbecapableofhandlingseveraldecadesworthof internet traffic (Bamford, 15 Mar 2012). 5 Recent revelations by whistlebloweredwardsnowdenreinforcetheseallegations,pointingto widespread NSA interception of domestic U.S. internet traffic (Greenwald,7Jun2013;Greenwaldetal,2013) Based on conversations and meetings with other AT&T staff, Klein (2009) reports that surveillance installations, like that in San Francisco, existinfiveotherlocations:atlanta,losangeles,sandiego,sanjoseand Seattle. Clement (2013) identifies 18 cities in the U.S. that likely have similarsurveillancesites.furthermore,ofthe1,319u.s.ponlytraceroutes heldintheixmapsdatabase,99percenttravelthroughatleastoneof these cities, suggesting that the NSA has almost complete surveillance capabilitiesforallu.s.internettraffic(ibid). TheextentofU.S.surveillanceofCanadiandatapacketsislessclear. Table 1 lists the topp10 U.S. cities suspected of having installed NSA splitteroperations(clement,2013).thetablealsonotesthepercentage of the 1,280 CanadianPUSPCanada boomerang routes housed in the IXmaps database that pass through these cities, potentially subject to U.S.surveillanceefforts.Currentfindingsrevealthatcitiesclosesttothe CanadianborderaremorelikelytorouteCanadiandata.Approximately 50 percent of IXmaps boomerang routes pass through New York and Chicago,thetoptwocitiessuspectedofhavingNSAsplitters,andabout 25percenttravelthroughSeattle. 6 5 The size of big data and the speed of its exponential growth are difficult to grasp.ibmreportsthatattheturnofthemillennium,800,000petabytes(10 15 bytes)werestoredintheworld(zikopoulos,eaton,deroos,deutsch,&lapis, 2012).In2020,itisprojectedthatthisnumberwillreach35zettabytes(10 21 bytes).theamountofdatathensawillreportedlybecapableofstoringisin therangeofyottabytes(10 24 bytes). 6 ThesefiguresareapproximateasthegeoPlocationofroutersisnotprecise. 5

NSA %ofcdnkuskcdntraffic City Boomerangs Likelihood (1280Routes) 1 NewYork,NY 625 49% 2 Chicago,IL 643 50% 3 LosAngeles,CA 6 <1% 4 Atlanta,GA 42 3% 5 Dallas,TX 21 2% 6 SanFrancisco,CA 12 1% 7 Washington,DC 150 11% 8 Seattle,WA 301 24% 9 SanDiego,CA 0 0% 10 Boston,MA 10 1% Table'1' 'Canada.US.Canada'Boomerangs'and'Likelihood'of'NSA'Surveillance' The boomerang routing and threat of NSA surveillance suggests that many of the ISPs routing Canadian internet traffic are jeopardizing the sovereignty and privacy of Canadians mandated by the TelecommunicationsActandPIPEDA. 4. ACallforCanadianNetworkSovereignty Foreign surveillance of Canadian internet transmissions threatens Canadian civil liberties and violates our sovereignty. This call for Canadian network sovereignty urges the Federal government to strengthenoursecuritypoliciesandrelatedenforcementmechanismsto ensure that CanadianPtoPCanadian communication remains within our national boundaries and jurisdiction. Canadian democratic institutions likely cannot affect U.S. surveillance practices, but they can exert pressure to ensure that those operating within the jurisdiction of Canadian law make the protection of Canadian sovereignty and civil libertiesatoppriority.werecommendthatpolicyeffortsstrengthenand enforcecanadianprivacylaws,andworktorepatriatecanadianinternet trafficbybuildingmoreinternetexchangepoints. 4.1. StrengthenCanadianPrivacyLaws(i.e.PIPEDA) Canadiandataroutingandcollectionpracticesneedgreaterprotection by Canadian privacy policy. While the Personal$ Information$ Protection$ and$ Electronic$ Documents$ Act (PIPEDA) demonstrates the Federal government sinterestinprivacyprotections,moreneedstobedoneto ensure results. When PIPEDA went into effect at the turn of the millennium, Facebook, Twitter and smartphones didn t exist. More of ourlivesarebeinglivedonline,witheachactivityproducingstreamsof finepgrainedpersonaldata. Canada s Privacy Commissioners should more vigourously apply existinglaw,andcanadianprivacypoliciesalsoneedtobestrengthened. As federal Commissioner Jennifer Stoddart notes, PIPEDA is outdated andinneedofreform, As organizations find new ways to profit from personal information,therisks to privacy are growing exponentially.[ ]Itisincreasinglyclearthatthelawisnot up to the task of meeting the challenges of today and certainlynotthoseoftomorrow.(opc,23may2013) 6

Furthermore,whiletheOfficeofthePrivacyCommissioner(OPC)has prompted companies to improve their privacy practices, actions are rarely proactive, with minimal reactions more often the result after considerable OPC resources have been spent (Ibid). Stoddart notes, [t]he legislation lacks mechanisms strong enough to ensure organizationsinvestappropriatelyinprivacy (Ibid). TheOPChasreleasedapositionpiece(OPC,2013)callingforPIPEDA reformthatwoulddomoretostrengthennationalnetworksovereignty aswellasprivacy.thesereformsinclude: 1) Strengthening OPC enforcement powers including: a) statutory damages to be administered by Federal Court for violations, b) orderpmakingpowersfortheopcthatwouldforceorganizations toperformorceasecertainactions,andc)monetarypenaltiesto beimposedbytheopc. 2) Breach notification: requiring organizations to report privacy breachestotheopcandtoaffectedusers. 3) Increasedtransparency:transparencyreportswouldberequired, disclosing law enforcement and other government requests for personalinformation,andtheextenttowhichentitiescomply. 4) Promoteaccountability:organizationswouldhavetodemonstrate accountability (proactive privacy protections) upon request. The enforceable agreements concept, the notion that OPC can compel action, would be incorporated into the law, with accountability provisions being subject to review by a Federal Court. Each of these reforms should be implemented with a focus on data collection and management practices, including routing behaviours. While enforcement power will be essential to ensure compliance, greater transparency is also vital to ensure a more democratic assessment of current practices. It is unrealistic to expect a quick and completeshifttonetworksovereignty,andthus,publicunderstandingof the reform is essential. Currently, PIPEDA requires that users submit privacy complaints to carriers. Without greater transparency, this requirementislikelytoaccomplishlittleprotection,asusersareunable todeterminetheextenttowhichtheircivillibertiesarebeingviolated. Greater transparency and enforcement will push back against the development of industry practices that subject Canadians to U.S. surveillanceeffortsandthreatenourprivacyandnationalsovereignty. 4.2. RepatriateInternetTrafficByBuildingMoreCanadian InternetExchangePoints Passinglawsmandatingroutingpatternswillbeproblematicifcarriers are not provided with the tools to ensure that a sovereign Canadian internet network will be able to function. While political economic relationships between carriers contribute to routing patterns, network congestion issues, specifically Canadian IXP bottlenecks, are a realistic concern that can direct routing and as a result, impact network sovereigntyandprivacy. 7

Internetexchangepoints(IXPs)havemanybenefitsincludingtheability tohelpreducenetworkcongestionandincreasethelikelihoodoflocal peering(itu,2013).ithasbeensuggestedthatthepresenceaswellas management of IXPs can impact an entire region s Internet economy (Ryan and Gerson, 2012; ITU, 2013). Other related benefits include: reducingthenumberofnetworkhopstoexchangetraffic,optimizingthe useofinternationalconnectivity,improvingnetworkresilienceandlikely qualityofservice,reducingtransmissioncostsandinternationalcapacity costs (potentially millions of dollars per year), and increasing the possibility of greater internet penetration rates (ITU, 2013). Indeed, given the rise of the internet economy and the intensification of the internet s centrality to everyday life, the importance of IXPs is only growing. ToensureCanadiannetworksovereignty,moreIXPsneedtobebuilt. 7 As of June 2012, Canada only had three IXPs. In the last year, two additionalixpshavebeenaddedtothelist.bycomparison,theunited States has 86 IXPs (Packet clearing house, 2013). As Byron Holland, presidentofthecanadianinternetregistrationauthoritynotes, Thereisonewaytoprotectourselves,tosomedegree,fromhavingour data fall under the jurisdiction of a foreign country. We must ensure moreofittravelstoitsdestinationviacanadianroutes.[ ]Itistimefor CanadatorepatriateitsInternettraffictothebestextentpossible[ ]to do this will require more Internet Exchange Points [ ] By building a robustcanadianinternetinfrastructure,includinganationpwidefabricof IXPs, we can ensure more Canadian traffic stays in Canada, and is thereforeonlysubjecttocanadianlaw.(holland,24jun2013) The Canadian government should continue to invest in this vital infrastructure, which is certainlylinkedtoeconomicbenefit,aswellas theprotectionofprivacyandnetworksovereignty. 5. Conclusion When Canadian internet traffic boomerangs through the U.S., the transmissionsbecomesubjecttou.s.lawsincludingthepatriotactand FISAA. With U.S. security agencies engaging in broad domestic surveillance, CanadianPtoPCanadian transmissions may be subject to interception.tosafeguardcanadiannetworksovereignty,thecanadian governmentshoulddomoretoensurethatthecommercialentitiesthat route Canadian internet transmissions are compelled to protect them, andasaresult,userprivacy.networksovereigntybeginswithstronger governmentpolicyandenforcementmechanismsthatcanenhanceisp best practices and spur industry selfpregulation. The building of more Canadian internet exchange points and promotion of their use will removejustificationsforinternationalpeering,andstrengthencanada s interneteconomy. 7 SeetheCIRAreportbyWoodcock&Edelman(2012). 8

These efforts will contribute to state sovereignty, but will not free Canadiansfrombeingsurveilled.Interceptionstrategiessimilartothose being perpetrated by the NSA are also likely taking place in Canada. SimilartothebillionPdollar spycenter beingbuiltinutah(bamford,15 Mar 2012), Communications Security Establishment Canada (CSEC) is currentlybuildingan$880millionintelligencecomplexrightnexttothe Canadian Security Intelligence Service s headquarters (Pugliese, 12 Oct 2009). While CSEC denies any claim of domestic surveillance activity (CTV,10Jun2013)ithasbeensuggestedthatthepurposeofthisnew facilityistoemulatethensa(tencer,8jun2013). National network sovereignty is threatened when an otherwise internationally independent state has its rights and powers of internal network regulation and control violated by the encroachment of a foreign body. Though the multitude of challenges presented by our evolving telecommunications system can seem insurmountable (Obar, 2013),pragmaticandrealisticstrategiesforbolsteringCanadiannetwork sovereigntyareneeded.canadiansshouldadvocatefortougherprivacy policies and enforcement of the law to ensure that civil liberties are protected.weshouldalsochampioninvestmentintelecommunications infrastructure, especially internet exchange points that would, in combination with stronger policies, reduce dependence on foreign routing, strengthen our internet economy and restore faith in the commitmentsofourpublictrustees. 9

References Bamford, J. (15 Mar 2012). The NSA is building the country sbiggestspycenter(watchwhatyousay). Wired. Retrieved July 20, 2013 from www.wired.com/threatlevel/2012/03/ff_nsadatac enter/ Barr,B.(2002).Protectingnationalsovereigntyinaneraof international meddling: an increasingly difficult task.harvard$$ journal$of$legislation,$39,299p 324. Clement,A.(2013).IXmaps trackingyourpersonaldata through the NSA s warrantless wiretapping sites. Proceedings$ of$ the$ IEEE$ $ ISTAS$ conference. Toronto.June27P30,2013. Clement, A. (2014, forthcoming) NSA Surveillance: Exploringthegeographiesofinternetinterception, To be presented at the iconference2014, Berlin, March4P7,2014 CTV.(10Jun2013).DataPcollectionprogramnottargeting Canadians: MacKay. Retrieved July 26, 2013 from www.ctvnews.ca/canada/datapcollectionpprogramp notptargetingpcanadianspmackayp1.1319096 Greenwald,G.(7Jun2013).NSAPrismprogramtapsinto user data of Apple, Google and others. The$ Guardian.$ Retrieved July 20, 2013 from www.guardian.co.uk/world/2013/jun/06/usptechp giantspnsapdata Greenwald, G., MacAskill, E. & Poitras, L. (10 Jun 2013). Edward Snowden:the whistleblower behind the NSA surveillance revelations. The$ guardian.$$ Retrieved July 20, 2013 from www.guardian.co.uk/world/2013/jun/09/edwardp snowdenpnsapwhistleblowerpsurveillance Holland,B.(24Jun2013).PRISM,internetexchangepoints and Canada. Public$ domain$ (blog).$ Accessed July 26, 2013 from http://blog.cira.ca/2013/06/prismp internetpexchangeppointspandpcanada/$ InternationalTelecommunicationsUnion.(2013).Internet exchanges points (IXPs). WTPF backgrounder series.retrievedjuly26,2013from http://www.itu.int/en/wtpfp 13/Documents/backgrounderPwtpfP13PixpsPen.pdf Klein,M.(2009).Wiringupthebigbrothermachine and fightingit.charleston,sc:booksurgepublishing. Obar, J.A. (2013). Phantom data sovereigns: Walter Lippmann,bigdataandthefallacyofpersonaldata sovereignty. Working paper. Retrieved July 26, 2013 from http://papers.ssrn.com/sol3/papers.cfm?abstract_ id=2239188 OfficeofthePrivacyCommissionerofCanada.(2013).The$ case$for$$ reforming$ the$ Personal$ Information$ Protection$ and$ Electronic$ Documents$ Act.$ Retrieved July 26, 2013 from http://www.priv.gc.ca/parl/2013/pipeda_r_20130 5_e.asp$ Office of the Privacy Commissioner of Canada. (23 May 2013). New release: new privacy challenges demand stronger protections for Canadians. Retrieved July 26, 2013 from http://www.priv.gc.ca/media/nrpc/2013/nrp c_130523_e.asp Packet clearing house. (2013). Internet exchange point growth. Retrieved July 26, 2013 from https://prefix.pch.net/applications/ixpdir/summ ary/growth/ Pugliese, D. (12 Oct 2009). Canadian spies Camelot : defencehopingot attractworldp class talent with $880M intelligence complex. National$ Post.RetrievedJuly 26, 2013 from http://news.nationalpost.com/2012/10/08/canadi anpspiespcamelotpdefencephopingptopattractpworldp classptalentpwithp880mpintelligencepcomplex/ Ryan, P.S. & Gerson, J. (2012). A primer on internet exchange points for policymakers and nonp engineers. Retrieved July 26, 2013 from http://papers.ssrn.com/sol3/papers.cfm?abstract_ id=2128103 TelecommunicationsAct.(1993,c.38).Retrievedfromthe Government of Canada Justice Laws website: http://lawsplois.justice.gc.ca/eng/acts/tp3.4/ Tencer, D. (8 Jun 2013). NSA spying on Canadians, CSEC capableofsimilarsurveillance:experts.huffington Post. Retrieved July 26, 2013 from http://www.huffingtonpost.ca/2013/06/08/nsap spyingpcanada_n_3408662.html Woodcock,B.&Edelman,B.(2012).Towardefficienciesin Canadianinternettrafficexchange.Areportforthe Canadian Internet Registration Authority. Retrieved December 9, 2013 from http://www.cira.ca/assets/uploads/towardp EfficienciesPinPCanadianPInternetPTrafficP Exchange2.pdf Zikopoulos,P.,Eaton,C.,deRoos,D.Deutsch,T.,&Lapis, G.(2012).Understanding$big$data.NewYork,NY: McGrawPHill. 10