1 / 17

S kills : none

Internet surveillance – who and where are you?. S kills : none Concepts : log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma”. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. .

draco
Télécharger la présentation

S kills : none

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet surveillance – who and where are you? Skills: none Concepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma” This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.

  2. Where does this topic fit? • Internet concepts • Applications • Technology • Implications • Internet skills • Application development • Content creation • User skills

  3. Supplied without your knowledge Why are all the “linked from” the same? Why do so many IP addresses begin with 155.135?

  4. Data packets 10011 00110 11101 10101 Server Client 11.144.1.14 155.135.1.1

  5. Two parts of an Internet protocol (IP) data packet To: <IP address> From: <IP address> Header: Body: 1101010010101101010010101000101010001010110101010101001010101101010010101010100101010010101001111000110101011001100101011001010100110010101010101001010101010011010101010100101011101010100101101001011010010101010111001010000101010101010100 Why did I show the contents of the body as 1s and 0s?

  6. IP address Stop and find our IP address

  7. Geo-location 155.135.1.1

  8. Who are you? IP address + time and date + ISP log → Internet account holder Who can get access to this information?

  9. The U. S. Constitution says you need a warrant But, what did Eric Snowden reveal?

  10. Or a job with the NSA or an NSA contractor

  11. Anonymity

  12. Proxy server Normal connection Through a proxy Proxy server

  13. The dictator’s dilemma Glasnost which undermined the USSR and other socialist countries consisted in handing over the mass media, one by one, to the enemies of socialism. Raúl CastroOctober, 1997 One telex can cost twelve dollars [whereas] the same message costs 75 cents in the form of a fax and 3 cents via the Internet ... in spite of our blockaded circumstances, we are in a relatively good position [to face the challenges of such scientific and technological changes], due to the educational and scientific work developed by the revolution.Carlos LageOctober, 1997

  14. Ten year prison sentences

  15. Summary

  16. Self-study questions Criminals use proxy servers to hide their activity. Should we make it a crime to operate a proxy server or are there times when anonymity is desirable? Do you mind servers like the one at SurveyGizmo.com gathering data on you? Can you think of reasons you might want data to be gathered on you? How do questions of privacy differ between cultures and political systems? What is the IP address of your computer? (You will probably have to get some help answering that question).

  17. Resources A geo-location service: http://www.ip2location.com/ Yahoo identifies dissidents to the Chinese government: http://boingboing.net/2007/04/19/yahoo-aided-china-in.html Student background survey that captured IP addresses: http://cis275assignments.blogspot.com/2010/08/background-survey.html The dictator’s dilemma in Cuba: http://laredcubana.blogspot.com/2011/02/dictators-dilemma.html

More Related