s kills : none
DESCRIPTION
Internet surveillance – who and where are you?. S kills : none Concepts : log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma”. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. . - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/1.jpg)
Skills: noneConcepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma,” graphical versus command-line user interface
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Internet surveillance – who and where are you?
![Page 2: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/2.jpg)
Where does this topic fit?
• Internet concepts– Applications– Technology– Implications
• Internet skills– Application development– Content creation– User skills
![Page 3: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/3.jpg)
IP address Date Finished Linked From155.135.55.229 1/27/2011 14:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/31/2011 15:05 http://cis275assignments.blogspot.com/2010/08/background-survey.html96.39.242.153 1/27/2011 2:40 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/27/2011 13:30 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/25/2011 13:55 http://cis275assignments.blogspot.com/2010/08/background-survey.html75.3.224.65 1/31/2011 20:15 http://cis275assignments.blogspot.com/2010/08/background-survey.html76.234.226.155 1/31/2011 15:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/27/2011 14:20 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/25/2011 14:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html
Supplied without your knowledge
Why are all the “linked from” URLs the same?
Why do so many IP addresses begin with 155.135?
![Page 4: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/4.jpg)
Data packets
10011
1110110101
00110
Client Server
155.135.1.1 11.144.1.14
![Page 5: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/5.jpg)
1101010010101101010010101000101010001010110101010101001010101101010010101010100101010010101001111000110101011001100101011001010100110010101010101001010101010011010101010100101011101010100101101001011010010101010111001010000101010101010100
To: <IP address>From: <IP address>
Header:
Body:
Two parts of an Internet protocol (IP) data packet
Why did I show the contents of the body as 1s and 0s?
![Page 6: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/6.jpg)
IP address
Stop and find your IP address
![Page 7: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/7.jpg)
Geo-location 155.135.1.1
Stop and find your location.
From ip2location.com
![Page 8: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/8.jpg)
Who are you?
IP address + time and date + ISP log →
Internet account holder
Who can get access to this information?
![Page 9: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/9.jpg)
The U. S. Constitution says you need a warrant
But, what did Eric Snowden reveal?
![Page 10: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/10.jpg)
Or a job with the NSA or an NSA contractor
![Page 11: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/11.jpg)
Anonymity
![Page 12: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/12.jpg)
Proxy server
Through a proxy
Normal connection
Proxy server
![Page 13: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/13.jpg)
Glasnost which undermined the USSR and other socialist countries consisted in handing over the mass media, one by one, to the enemies of socialism.Raúl CastroOctober, 1997
One telex can cost twelve dollars [whereas] the same message costs 75 cents in the form of a fax and 3 cents via the Internet ... in spite of our blockaded circumstances, we are in a relatively good position [to face the challenges of such scientific and technological changes], due to the educational and scientific work developed by the revolution.Carlos LageOctober, 1997
The dictator’s dilemma
![Page 14: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/14.jpg)
Ten year prison sentences
![Page 15: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/15.jpg)
Summary
![Page 16: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/16.jpg)
Self-study questions
1. Criminals use proxy servers to hide their activity. Should we make it a crime to operate a proxy server or are there times when anonymity is desirable?
2. Do you mind servers like the one at SurveyGizmo.com gathering data on you?
3. Can you think of reasons you might want data to be gathered on you?4. How do questions of privacy differ between cultures and political systems?5. What is the IP address of your computer? (You will probably have to get
some help answering that question).6. Proxy servers allow user anonymity if surveillance is a problem, but they
also enable a form of privacy – explain the way the latter works.
![Page 17: S kills : none](https://reader036.vdocuments.net/reader036/viewer/2022062520/56816231550346895dd2642c/html5/thumbnails/17.jpg)
Resources
A geo-location service:http://www.ip2location.com/
Yahoo identifies dissidents to the Chinese government:http://boingboing.net/2007/04/19/yahoo-aided-china-in.html
Student background survey that captured IP addresses:http://cis275assignments.blogspot.com/2010/08/background-survey.html
The dictator’s dilemma in Cuba:http://laredcubana.blogspot.com/2011/02/dictators-dilemma.html