Changes

What is Internet surveillance?

17 bytes added, 10 years ago
=Internet Surveillance=
As discussed in the previous section, we cannot affect the manner in which our content is routed around the Internet and are simply left a choice between the various applications to use for sending and receiving data. On its way to the recipient, our messages passes through multiple servers, routers and any other hardware corporations and governments choose to put into the network. At each of these points on the network, our data is processed as it passes from one server to the next and becomes accessible to whoever controls that particular piece of hardware. In fact, the possibility for surveillance is built into the network and Internet communications can be seen as the 21st century's postal system – where your letter is dropped into a post box, picked up by the mailman, processed at the post facility, shipped to its destination, processed by the post facility over there, given to the mailman and delivered to the recipient. At any one of those steps your message can be read. Our 'postal guarantee' against this intrusion is the sealed envelope. Other methods exist on the Internet and are described in Lesson 2.
Whether you are connecting to the Internet from home, office, Internet cafe or another location, the first point of call for your email on its way to the recipient is the local modem – the one which is connected to the Internet. Whoever has access to this modem will be able to view the network's traffic as it is sent and received from the Internet.
'''Exercise: ''' Install the Wireshark network protocol analyzer (http://www.wireshark.org/) to view traffic on the local network (this exercise is only for those using a cable connection to the modem/router/network).
'''Demonstration: '''
 
{{#ev:youtube|lVutDlIUNOg}}
'''Note: ''' Open wireless networks (those that do not require a password to connect) are just as vulnerable to surveillance by anyone connected to the same wireless router. They present an even greater risk since anyone within range can connect. Wireless networks protected by a password present a much greater challenge, since everyone's connection to the router is encrypted with an individual session key. You should be using a long WPA2 standard password (as opposed to a WEP key) and if your router doesn't have that option – time to upgrade!
==The Internet Service Provider==
Here you can see login and password details being transmitted on the Internet. Every router located between the user's computer and the website being visited has access to this data.
'''Media: ''' A very interesting (if slightly lengthy) DEFCON lecture explaining the implementation of Internet surveillance on commercial and government levels .
{{#ev:youtube|jJDCxzKmROY}}
252
edits