s kills : none

17
Skills: none Concepts: log, IP address, URL, packet header and body, geo- location, anonymity, proxy server, the “dictator’s dilemma,” graphical versus command-line user interface This work is licensed under a Creative Commons Attribution- Noncommercial-Share Alike 3.0 License. rnet surveillance – who and where are

Upload: draco

Post on 22-Feb-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Internet surveillance – who and where are you?. S kills : none Concepts : log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma”. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. . - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: S kills : none

Skills: noneConcepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma,” graphical versus command-line user interface

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.

Internet surveillance – who and where are you?

Page 2: S kills : none

Where does this topic fit?

• Internet concepts– Applications– Technology– Implications

• Internet skills– Application development– Content creation– User skills

Page 3: S kills : none

IP address Date Finished Linked From155.135.55.229 1/27/2011 14:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/31/2011 15:05 http://cis275assignments.blogspot.com/2010/08/background-survey.html96.39.242.153 1/27/2011 2:40 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/27/2011 13:30 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/25/2011 13:55 http://cis275assignments.blogspot.com/2010/08/background-survey.html75.3.224.65 1/31/2011 20:15 http://cis275assignments.blogspot.com/2010/08/background-survey.html76.234.226.155 1/31/2011 15:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/27/2011 14:20 http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229 1/25/2011 14:10 http://cis275assignments.blogspot.com/2010/08/background-survey.html

Supplied without your knowledge

Why are all the “linked from” URLs the same?

Why do so many IP addresses begin with 155.135?

Page 4: S kills : none

Data packets

10011

1110110101

00110

Client Server

155.135.1.1 11.144.1.14

Page 5: S kills : none

1101010010101101010010101000101010001010110101010101001010101101010010101010100101010010101001111000110101011001100101011001010100110010101010101001010101010011010101010100101011101010100101101001011010010101010111001010000101010101010100

To: <IP address>From: <IP address>

Header:

Body:

Two parts of an Internet protocol (IP) data packet

Why did I show the contents of the body as 1s and 0s?

Page 6: S kills : none

IP address

Stop and find your IP address

Page 7: S kills : none

Geo-location 155.135.1.1

Stop and find your location.

From ip2location.com

Page 8: S kills : none

Who are you?

IP address + time and date + ISP log →

Internet account holder

Who can get access to this information?

Page 9: S kills : none

The U. S. Constitution says you need a warrant

But, what did Eric Snowden reveal?

Page 10: S kills : none

Or a job with the NSA or an NSA contractor

Page 11: S kills : none

Anonymity

Page 12: S kills : none

Proxy server

Through a proxy

Normal connection

Proxy server

Page 13: S kills : none

Glasnost which undermined the USSR and other socialist countries consisted in handing over the mass media, one by one, to the enemies of socialism.Raúl CastroOctober, 1997

One telex can cost twelve dollars [whereas] the same message costs 75 cents in the form of a fax and 3 cents via the Internet ... in spite of our blockaded circumstances, we are in a relatively good position [to face the challenges of such scientific and technological changes], due to the educational and scientific work developed by the revolution.Carlos LageOctober, 1997

The dictator’s dilemma

Page 14: S kills : none

Ten year prison sentences

Page 15: S kills : none

Summary

Page 16: S kills : none

Self-study questions

1. Criminals use proxy servers to hide their activity. Should we make it a crime to operate a proxy server or are there times when anonymity is desirable?

2. Do you mind servers like the one at SurveyGizmo.com gathering data on you?

3. Can you think of reasons you might want data to be gathered on you?4. How do questions of privacy differ between cultures and political systems?5. What is the IP address of your computer? (You will probably have to get

some help answering that question).6. Proxy servers allow user anonymity if surveillance is a problem, but they

also enable a form of privacy – explain the way the latter works.