Internet surveillance - The Main Advantages



Similar documents
Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Just Net Coalition statement on Internet governance

NSA Surveillance, National Security and Privacy

The threats which were perceivable 20 years ago differ greatly from our ever increasing

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Brief on Did GCHQ Spy on You Illegally?

Can we maintain Human Rights in Our Cyber Empire?

Securing our information we have the technology; we just have to have the will to do it

Revealed: how US and UK spy agencies defeat internet privacy and security

Security and Internet Censorship

OPEN ACCESS, PRIVACY AND HACKER CULTURE

Patriot Act Impact on Canadian Organizations Using Cloud Services

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

The Impact of the NSA on Hosting Decision Makers in the UK and Canada. Survey Findings prepared by March Communications January 2014

details, and numerous other data points. Enough information is often collected that even 2

The Future of Associating is Mobile Webinar Series. Embracing the Mobile Opportunity: Reinventing Your Association's Value for The Third Screen

As the US debates privacy a Berlin start up surges with...

SNOOPWALL FLASHLIGHT APPS THREAT ASSESSMENT REPORT

Cloud storage buyer s guide

Hope for the best, prepare for the worst:

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Case 1:13-cv RJL Document Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

submit your problem and we will be more than happy to cooperate with you to find the most effective solution.

The Big Data Paradigm Shift. Insight Through Automation

Hope for the best, prepare for the worst:

In 2015, just under half (43%) the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

Premium Advertising Sweden UK France Germany

Behind the great firewall

Data privacy and security in the post-snowden era

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

Risk Analysis in Skype Software Security

CERT's role in national Cyber Security: policy suggestions

Cyber Defense & Breach Response Privacy Issues

The Internet and Network Technologies

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

CSA Survey Results Government Access to Information July 2013

Security Benefits of Cloud Computing

Internet, Smartphone & Social Media Usage Statistics

How-To Guide: Cyber Security. Content Provided by

Big Data Big Security Problems? Ivan Damgård, Aarhus University

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, My name is Richard Allan, and I am the Director of Public Policy

SecureCom Mobile s mission is to help people keep their private communication private.

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

SUNDAY, JUNE 16, MARINA Internet metadata

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Is Skype Safe for Judges?

Online Freedom of Speech: The Battle Continues


DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy

Smart Policing Initiative Website and Social Media

VWC. Your gateway to a safe, secure and private Internet. Jeff Bermant, Co-Founder & Chief Executive Officer Jeff@vworldc.com

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

High-Speed Internet Quick Start Guide

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty!

Cloud Storage and Sharing Platforms - The Fear of risk

BBBT Podcast Transcript

Masters of Science in Information Technology

MOBILE MALWARE REPORT

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

What s Hot and What s Not in the World of Cyber Security and Cyber Crime

Malware & Botnets. Botnets

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

Outbound and Data Loss Prevention in Today s Enterprise, 2010

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Understanding and Circumventing The Great Firewall of China

Detecting Cyber Attacks in a Mobile and BYOD Organization

Excellence in Engineering Since 1946

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Internet threats: steps to security for your small business

THE NATIONAL JUDICIAL COLLEGE

Rebooting Business, Capitalism and Work - and what technology has to do with it

Personal Safety Tips For Public Information Technology

STOP. THINK. CONNECT. Online Safety Quiz

A Match Made in Heaven: Marrying Information & Computation

10 Steps to a Multichannel Strategy and an Exceptional Customer Experience

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Internet Marketing Rules!

Internet Security for Remote Users

A Parents Guide to ConnectSafely.org

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

Iran - Researched and compiled by the Refugee Documentation Centre of Ireland on 5 August 2011

POLICY BRIEF Why Trade Agreements are not Setting Information Free

Google Apps for Education in Sapienza: a service for students. Francesco Barcellona Centro InfoSapienza

CIS3210 Computer Networks. Ethics in Networking

SafeCall Secure Communication System

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research

Compulogics, USA Hdqs: 675 Trout Lake Dr. Sanger, CA Sales: (559)

SentinelOne Labs. Advanced Threat Intelligence Report Predictions

Mobile multifactor security

Unlocking & Locking Big Data: Defending the DataLake

Proactive controls to mitigate IT security risk

Home WiFi & Networking: Best Practices

Transcription:

INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013

So!. Is the Internet technology! Internet has opened a new dimension of communications giving us more control! Facilitated out lives! Yet, it has become a tool of control! OR! governments and corporations continue to control flow, content, use, and infrastructure taking us under control?

Information Technology Nano- Technology Food processing and Agriculture Information Technology Other! Manufacturing Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

Information Processing Cycle IT technology allows us to perform information Data processing cycle Information Technology Nano- Technology Inform. Food processing and Agriculture Manufacturing Information Technology Other! Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

Information Processing Cycle Information Technology Data Inform. Manipulate/Store Nano- Technology Food processing and Agriculture Information Technology Other! Manufacturing Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

IT Impacting All Other Technologies Digitizing the Information Nano- Technology Automotive Others Information Technology DIGITIZING THE DATA Semi-conductor Manufacturing Battery/Wind

IT Impacting All Other Technologies - Utilized by all other technologies Nano- Technology Others Information Technology DIGITIZING THE DATA Manufacturing Automotive Semi-conductor Battery/Wind

Internet & IT Infrastructure!The Internet is the enabling technology Internet

Internet & WWW!The World Wide Web is a technology that can provides many services over the Internet!! Finding Directions!! Shopping!! Chatting!! Music!! News!! File Sharing WWW

Access to the Internet Services - Increasingly via Smartphones Mainframes: Large machines, Limited access PCs: Promising Individual Freedom Laptops: Offering mobility Smart Phones: Anytime, anywhere! (smaller & more powerful) Today about half of Internet users in the U.S. use their smartphones to get online!

Smartphones: Integrated Part of Our Lives! 125 million iphones in 2012 53 million ipads in 2012 748 million Androids in 2013

Smartphones: Anywhere, Anytime! 3.37 Billion worldwide email accounts 40 percent of people with iphones said they'd rather give up brushing their teeth for a week than go without their phone! (Chicago Tribune, 2011 ) Have access to cell phones Text Blindfolded! Percent who said they could only go a few hours without their mobile phone: 34%

I Cannot Get on the Internet!

What Were the Early Expectations of the Internet?

Early Expectations Early 70 s! Internet became the technology of liberation! Techno-utopian dreamers were promising a cybernetic meadow! Fred Turner coined the term Virtual Reality:! A technological paradise where people are linked together! An unconstrained reality free from existing physical, social & political boundaries! The WWW brought the notion of Heavenly City Promising liberation from rules and routines

The Reality of the Internet Fast forward 40 years! The Internet turned out to be an extremely powerful and a mysterious technology! Revolutionized our lives & empowered us in many ways! Education, Commerce, Healthcare, etc.! It has also become an instrument of bureaucratic control! Created a conduit for profiting & monitoring

In ten minutes!

Getting Connected to the Internet 18:87:00:bf:99:0 16.34.23.101 1.! Internet-enabled Device! Each device has a unique hardware address 2.! Internet Service Provider (ISP)! Examples: AT&T, Vertizon, Netzero, etc.! They provide IP (Internet Protocol) address! Also offer services such as email, web page, etc. 3.! Physical Connection! Provided by the phone company or the ISP Email IP: 168.34.23.101 18:87:00:bf:99:0

The Internet In Action Addressing Email IP: 168.34.23.101 f0:f4:79:50:df:b6 HEADER------------- IP: 168.34.23.101 MAC: f0:f4:79:50:df:b6 ISP & Location The Internet

Tracing A Simple Email From YAHOO! HEADER------------- IP: 168.34.23.101 MAC: f0:f4:79:50:df:b6 ISP & Location

The Internet In Action Message Blocking (Firewall) Email IP: 168.34.23.101 flexnet.com f0:f4:79:50:df:b6 The Internet

The Internet In Action Message Content Monitoring Lunch? Server Email IP: 168.34.23.101 Email: Lunch?

The Internet In Action Metadata Monitoring Email IP: 168.34.23.101 To: Joe Metadata NOT Encrypted) Data Content (Payload) Maybe Encrypted From To Data: Let s Have Lunch

Metadata: What Does it Reveal?! Putting subtle pattern out of your data! Are you pregnant?! Are you Sick?! Where are you going to school?! Are you moving out?! Are you traveling soon?! Finding your connections! Whom are you communicating with Metadata is NOT encrypted! Does it mean we can collect them? MIT MEDIA LAB: Immersion Software

Who is Running the Internet? Internet Traffic Drop by 40% When Google Goes down for 2 min.! Server OR

The Big Picture Each Click Generates Revenue! Server!! Bulk data collection!! Out interests!! Purchasing patterns!! Impacting out Actions OR

Smartphones: Becoming More Traceable Digital Trail Reveal Our Connections Reveal Private Information

So!.! Internet has opened a new dimension of communications! Facilitated out lives Internet has changed our lives!! Yet, it has become a tool of control!! governments and corporations continue to control flow, content, use, and infrastructure Yet, It is increasingly becoming a tool to monitor & control!

Internet: Enabling Technology of Control!for very good reasons! Corporate Control of The Internet Government Control of The Internet 1-National Security! Terrorism! Preserve sovereignty 2-National Laws! cyber crime! child porn.,! Gambling,! Intel. property rights,! etc.)

Internet Liberation- A Common Perception Once the Internet reaches a country it is an unstoppable liberating force Color Revolutions of the former Soviet Union, it was mobile phones Saffron Revolution in Burma, it was YouTube Green Movement in Iran, it was Twitter

Internet Liberation An Illusion?!Governments are becoming more powerful & capable to control their domestic Internet!! Sophisticated filtering technology! Subtle removal of Web requests! Tracing emails! Arresting bloggers For States: Internet is not the Problem! The trouble is Uncontrolled Internet Use!

Controlling The Internet: Governments Asking to Censor the Internet! In the second half of 2011 the total number of government requests to Google jumped by 103 percent! Google complied with 63 percent of the requests Google Transparency Report Content Removal Request 1,811 (18,070) Time Period Ending 2,285 (24,179)

Controlling The Internet: Governments Censoring The Internet 2011 Examples Spain: requested removal of 270 search results that linked to improper blogs and sites Canada: ordered removal of a YouTube clip disfiguring a public document (a man urinating on his Canadian passport) Thailand: requested blocking local users from viewing more than 100 videos insulting the monarchy Turkey: ordered restricting access to videos insulting the founder of modern Turkey (Ataturk)

Controlling The Internet: Blocking/Filtering! Saudi Arabia: The government filters any topics related to drugs, bombs, alcohol, gambling - authorities receive over 1,200 requests everyday to have web pages blocked! Kuwait: A 20 year old blogger gets 10 years in prison for defaming the Saudi & Bahraini government! Bahrain: Nabeel Rajab, president of the Bahrain Center for Human Rights was sentenced on July 10 to three months in prison for a tweet June 2013: WhatsApp must! Oman: Four young men received 3-6 months in prison for posting on social establish networks a local server that! U.K.: A 17 year allows old was detained officials after to monitor sending a malicious tweet to British Olympic Diver: You let your dad down, I hope you know it user activity!! Israel: "Facebook posts and Twitter feed matter of state security We [the censors] try to operate within the internet only in terms of elements related to us.

Internet In the U.S. New Revelations Early June of 2013 Former National Security Agent Contractor, Edward Snowden Revealed Secret Documents!

Massive Internet Surveillance Edward Snowden Documents! Intelligent agencies including Government Communication Headquarter & NSA working with high-tech companies were snooping on EVERYONE! $250 million/year

Massive Internet Surveillance Edward Snowden Documents (1) 1.! Conducting massive surveillance programs secretly! Bulk data collection on citizens (PRISM, 2007)! Creating taps on transatlantic fiber optic cables (TEMPORA) 2.! Spying on friendly foreign allies! Hacking into foreign targets computers, confiscating data and monitoring communiqué (TAO)

Massive Internet Surveillance Edward Snowden Documents (2) 3.! Defeating encryption programs! Developing counter encryption program (EDGEHILL & BULLRUN) 4.! Collecting and monitoring METADATA! Collecting social connections of U.S. citizens 5.! Compromising cyber security! Hardware backdoor: Encryption chips! Software malwares: BSAFE software,

The Big Leak! Server OR

The Big Leak!

So!.! Internet has opened a new dimension of communications! Facilitated out lives Jay Leno: "I am glad the government is shut down!! Yet, it has become a tool of control!! governments and corporations continue to control flow, content, use, and infrastructure For the first time in years it's safe to talk on the phone and send emails without anybody listening in!"

Defending Internet Freedom or Conducting Internet Spying? Welcoming the whistle blowers from Iran, Cuba, and China NSA has created a massive surveillance system capable of snooping on every individual, company, or foreign government! Internet is American! Gmail is the preferred Internet service provider of terrorists worldwide, Hayden (Ex-NSA/CIA Chief)

Defending Internet Freedom or Conducting Internet Spying? 2008 2013

Internet Surveillance Hurting the Bottomlines! Information Technology and Innovation Foundation (ITIF): US cloud providers stand to lose $22-$35 billion over the next 2008 three years! 2013

Internet Surveillance Hurting the Bottomlines! 2008 2013

$e 62%# Potential Consequences Anyway, I Have Nothing to Hide!! In the modern communications age every thing we do leaves a digital trail!! Some valid questions:! Can we trust NSA Analysts to have so much power? Agents illegally spied on love interests! Does NSA really ensures the security of the gathered data? NSA still does not know the full extend of Snowden documents! Should there be a limit as to NSA s blank surveillance? Sen. Feinstein's NSA 'reform' bill would expand snooping powers

Future of the Internet? You Be the Judge! In a recent hearing Senator Mark Udall asked : Is it the goal of the NSA to collect the phone records of all Americans? In response, NSA director Keith Alexander replied: Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes, The new $1.5 billion NSA data center in Bluffdale, Utah, will be able to, by some estimates, store the equivalent of 250 trillion DVDs worth of data

Final Remarks.. Any technology can only fit within the socio-economic structure of the society Technology in a country with oppressive government will turn into tool of oppressor Become more more aware and demand public monitoring Know what you are disclosing Use privacy tools and filtering Protect your network address Promote Net Neutrality, Public Broadcasting, Internet Freedom Ask the right questions! How is your privacy protected? Who is monitoring? What is being monitored?