Computer Surveillance - Network Surveillance

Network Surveillance

Internet
An Opte Project visualization of routing
paths through a portion of the Internet.
General
  • Access · Censorship · Democracy
  • Digital divide · Digital rights
  • Freedom of information
  • History · Internet phenomenon
  • Network neutrality
  • Pioneers · Privacy
  • Sociology · Usage
Governance
  • Internet Corporation for Assigned
    Names and Numbers (ICANN)
  • Internet Engineering
    Task Force (IETF)
  • Internet Governance
    Forum (IGF)
  • Internet Society (ISOC)
Protocols · Infrastructure
  • Domain Name System (DNS)
  • Hypertext Transfer
    Protocol (HTTP)
  • IP address
  • Internet exchange point
  • Internet Protocol (IP)
  • Internet Protocol Suite (TCP/IP)
  • Internet service provider (ISP)
  • POP3 email protocol
  • Simple Mail Transfer
    Protocol (SMTP)
Services
  • Blogs
  • E-mail · Fax
  • File sharing · File transfer
  • Instant messaging · Gaming
  • Podcasts · Shopping · Television
  • Voice over IP (VoIP)
  • World Wide Web
Guides
  • Outline
Internet portal


The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

Packet capture (also sometimes referred to as “packet sniffing”) is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. Packet Capture Appliance intercepts these packets as they are travelling through the network, in order to examine their contents using other programs. A packet capture is an information gathering tool, but not an analysis tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform traffic analysis and sift through intercepted data looking for important/useful information. Under the Communications Assistance For Law Enforcement Act all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband Internet traffic.

There is far too much data gathered by these packet sniffers for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, and filter out and report to human investigators those bits of information which are "interesting"—such as the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems which intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.

Similar systems are now operated by Iranian secret police to identify and suppress dissidents. All required hardware and software has been allegedly installed by German Siemens AG and Finnish Nokia

Read more about this topic:  Computer Surveillance

Famous quotes containing the word network:

    Of what use, however, is a general certainty that an insect will not walk with his head hindmost, when what you need to know is the play of inward stimulus that sends him hither and thither in a network of possible paths?
    George Eliot [Mary Ann (or Marian)