• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

ISPs have the tools to control the Internet; your privacy at risk

a_majoor

Army.ca Legend
Inactive
Reaction score
33
Points
560
While I don't imagine that Bell or the other ISPs are actually data mining using the sophisticated technology described, it isn't hard to imagine that rouge agencies like the CHRC would be all over this to read emails and IM's "on the fly" or otherwise snoop in on our business. Of course there are others who would also be interested in this sort of technology, including people interested in industrial espionage or the good old fashioned kind of spying.

Just the fact that this is possible is worth knowing, and of course users will need to understand how this works in order to institute countermeasures. Snailmail almost sounds good at this point.

http://arstechnica.com/news.ars/post/20080512-deep-packet-inspection-under-assault-from-canadian-critics.html

Deep packet inspection under assault over privacy concerns
By Nate Anderson | Published: May 12, 2008 - 12:03PM CT

Add the Canadian Internet Policy and Public Interest Clinic (CIPPIC) to the list of groups concerned about the privacy implications of widespread deep packet inspection (DPI) by ISPs. CIPPIC has filed an official complaint with Canada's Privacy Commissioner, Jennifer Stoddart, asking her office to investigate Bell Canada's use of DPI (and we're flattered to be quoted as an expert source in the complaint). In addition, the group would welcome a wider investigation into possible DPI use at cable operators Rogers and Shaw, as well.

In writing up this morning's announcement of a massive new 80Gbps DPI appliance from Procera Networks, I noted that privacy concerns were one of the storm clouds in DPI's bright blue skies. Because DPI can drill down into packet headers and then further into the actual content being pumped through the tubes, it raises all sorts of questions from privacy advocates concerned about the easy collection of private personal information. Current gear is so sophisticated that it can reconstitute e-mails and IM conversations out of asymmetric traffic flows and it can essentially peek "under the hood" of any non-encrypted packet to take a look at what it contains.

Bell Canada's use of DPI gear has now ensnared the company in a pair of government actions over net neutrality concerns and privacy. Bell, apparently sensitive to such concerns, has made clear in its own responses to the network neutrality proceeding that its DPI gear looks at packet headers and traffic flows as a means of identifying various applications and protocols. Bell does not use DPI to actually peer at packet contents, however. "The content itself is not actually reviewed, analyzed or stored," Bell says.

But that's not good enough for CIPPIC, a group based at the University of Ottawa. Canada, like many European countries, has fairly strict rules about collecting and using personal data, and CIPPIC points out that "data packets gathered by ISPs through the use of DPI are (or can be) associated with identifiable subscribers via the IP addresses attached to those data packets."

CIPPIC seems to be making the case that IP addresses can be personal information (especially when linked a list of visited websites or to particular searches that can be gleaned from search engines with a subpoena). This fits with a recent recommendation from the top data privacy working group in the EU, which said that IP addresses should be considered personal information for precisely these reasons.

But even if what Bell is doing now passes muster, CIPPIC is worried about the widespread installation of gear that can so easily be used for other things. "The evidence is clear that DPI technologies permit the collection and use of personal data about internet subscribers," says the complaint. "If Bell is somehow able to limit the data it inspects via DPI to non-personal data, we remain concerned about the longer term viability of any such limitation, and the pressure on Bell (and other ISPs) to use DPI to distinguish among traffic in ways that necessarily involve the collection and use of personal data."

How else could Bell control traffic on its network? CIPPIC has some ideas, first among them "invest in more infrastructure to accommodate the additional demand generated by P2P traffic." But if that's not feasible, the group suggests other ways to control traffic that don't rely on widespread collection of personal information or on discriminatory throttling:

Set limits on the amount of data per second that any user can transmit on the network
Set dynamic data limits that relax when congestion is low and increase when congestion is high
Cache popular files (in a non-discriminatory fashion)
Work with protocol/application developers to develop application and network level congestion mechanisms
Institute per-user bandwidth caps and/or metered pricing (which it is now doing)
Develop business models to encourage heavy bandwidth usage during off-peak hours
Stoddart has previously shown a willingness to stand up for consumers on technical issues when she went public with her concerns about intrusive DRM. CIPPIC's complaint gives her office another chance to delve into the privacy issues surrounding new technology.

Here in the US, the same privacy concerns have been raised about DPI. Texas disaster recovery and managed services company Data Foundry objects to network operators doing this deep level of inspection, and in an FCC filing last year (PDF), the company charged that "broadband providers' AUP/TOS/Privacy Policies, in combination with Deep Packet Inspection, allow intrusive monitoring of the content and information customers transmit or receive. This contractual and technical capability interferes with and may well eliminate all sorts of privileges presently recognized under law... Broadband service providers have no justifiable reason to capture this information."

The issues go beyond just IP addresses, encompassing attorney/client privilege, trade secrets, and other protected communications, but DPI vendors have assured Ars that they have little interest in examining content; most traffic information can be gleaned from packet headers, destination IP addresses, flow patterns, handshakes, and the like. Given the sheer capabilities of these devices, though, it seems at least worthwhile to have a detailed discussion about the potential privacy implications.
 
Down in the USA there is one major ISP, I think it's COX, which is using DPI and then placing ad's based on that information.

Up here, they are using it more for bandwidth control, although I don't see why, if they advertise 7mbit/1mbit and 100gb of transfer, then you should get 7mbit/1mbit 24/7 until you have used up 100gb, then I can see paying an overage fee (which Rogers does have now).

Rogers and Bell Canada are using this DPI to control bandwidth, they are blaming network problems on Bit Torrent and other P2P technology, which is a lot of bunk because it has been shown that streaming multimedia like Network TV Streams (NBC, ABC, CNN, CTV, Comedy Network), and community video sites like YouTube, MetaCafe, Google Videos, as well as HiFi internet radio stations is what is taking up most of the bandwidth nowadays. This kind of traffic isn't as easy to restrict, at least with Torrents there is information in the TCP/IP headers (unless encrypted).

Don't get me wrong, Torrents and P2P are bandwidth intensive, but if the Canadian ISP's wouldn't have stagnated on infrastructure, this wouldn't be a problem, and they wouldn't have to over sell their product, although they might be doing this on purpose anyways (like Airlines do). They could easily start running fiber, if they haven't already, it just seems to me that they don't want to, they are happy in their somewhat of a duopoly (at least in Ontario).
 
Bell Canada was recently told to "Prove it" by the CRTC, with regards to their claim that they need to throttle internet traffic because they are overloaded with bandwidth. Guess what? The 20-40 GB you pay for from Bell (Any DSL is probably going through the Nexxia gateway, which is Bell owned) has been no doubt sold to about 5 different people, since most users don't use it all. Bell is making money hand over fist in regards to reselling bandwidth, and they probably hate any multimedia on the Internet, which cuts their bottom line.
 
Yeah, I heard about that, but this court case, or where ever they have to show the evidence, isn't going to happen until the fall.
 
First of with all this data mining aside, you have to look at the internet as a big "party line" as in the days of old when phone lines were mostly public and anyone could listen in on everyone Else's conversations. Oh my God Martha is gossiping about Bertha again"

If you don't want your information to be collected . "Stay of the internet" Some people think they can remain anonymous, don't kid yourself, with the sophistcation of the software used today to data mine and track IP traffic, your anonymity is null and void when you connect to the "world wide party line". Someone out there in cyber land already has your info.

More here on the power of DPI: http://arstechnica.com/news.ars/post/20080512-throttle-5m-p2p-users-in-real-time-with-800000-dpi-monster.html

Set limits on the amount of data per second that any user can transmit on the network

Ha, Have fun with that one!! With the already so called bandwidth shortage, you may as well dust of that old dial up modem and start using again, it would probably be faster.

 
Overselling has been a fixture of the ISP business from day one.  Back in the days of modems the advice was to look for a ISP which provided a user to modem ratio of at least 10:1.  If you could get one at 8:1 you were considered very lucky.  Even then many ISPs had a policy of the maximum length of time you could be connected and then you'd be automatically disconnected to let others have a shot at the modem pool.  But I don't really think traffic shaping is a bandwidth issue except for public justification of why it is they are doing it.  The major players have more than enough bandwidth to go around in spades, except at possibly the very lowest levels where implementing this technology would be very cumbersome considering the number of locations it would need to be installed in, it is one of profit.  Someone has to pay for the traffic and if they can limit the amount of traffic during peak times, chances are that load isn't going to be moved to another time of day.

Privacy has always been and will continue to be an issue.  People are always concerned about the lastest "fad threat", which today happens to be DPI, late last year it was the misnamed "rootkits", before that it was spybots... The reality is people and agencies have been able to intercept and analyze your traffic for as long as the Internet has been up and this has never been confined to the well known super agency suspects, the tools have been available and free to use since the start.  The only upside the super agencies have is they have always been able to afford the bandwidth and processing power to sift through the massive amounts of data combined with the ability to access the main network nodes.  Of course, for an individual to specifically target another individual is pretty hard to do but if you just want to grab stuff on random individuals, it is possible.

As I've said before, the single, simplest, step anyone can take to increase their level of privacy is via encrypting their email with the free, open source tools that are available.  If you aren't doing this, or at least actively lobbying your email contacts to get on board with their emails to and from you, stop complaining.
 
Does both the Singapore RAHS and former American TIA surveillance programs use this technology?  Its been inferred but havent read it specifically stated.
 
You could spam them by generating e-mails with key words in it, if enough people did it or enough people setup computers to do it, the volume would slowly overwhelem them.
 
retiredgrunt45 said:
Law enforcement agencies don't usually divulge what software tools they use to track criminal activity, but I would hazard a guess that DPI would be one of those tools.

Here are a few others or similar powerfull tools, that they may have in their toolbox: http://www.h11-digital-forensics.com/accessdata-forensic-software.php

Which one would you say is the best commercially available system?
 
Colin P said:
You could spam them by generating emails with key words in it, if enough people did it or enough people setup computers to do it, the volume would slowly overwhelm them.

There already is too much information to sift through communications for starting evidence from nothing. More likely it's used for research purposes once leads are generated from other sources. To connect a group of people together for example once one is caught or exhibits suspicious activity.  So for example person X blows themself up on the subway. Going through who they emailed, phoned, websites they visited can generate other persons to check. This means if you do end up tangentially connected to a real plot having a bunch of bogus emails will mean more attention. 
 
Back
Top