Deep Packet Inspection

advertisement
Matthew Carson
CSC 540
Individual Research Project
April 15, 2014
Deep Packet Inspection
As more and more information is sent over the internet every day, many people
are worried about the security of their information. According to Rick Burgess of
TechSpot.com, “In just 60 seconds, nearly 640 terabytes of IP data is transferred across
the globe” (Burgess). According to these figures, in an average day on the internet,
nearly 900 petabytes are transferred. Burgess goes on to say, “in an Internet minute,
Amazon rakes in around $83,000 in sales.” These figures are staggering to say the
least, however, they definitely help shine light on the need for security measures on the
internet today. The question then becomes, how should we secure the transfer of this
enormous amount of information?
In order to address the problems associated with information that is transmitted
across the internet, many technologies have been developed which can monitor and, in
some cases, intercept malicious data and software. These technologies are meant to
protect personal information, both traversing the internet and on a user’s personal
machine, by filtering out dangerous sources which may be attached to information
which is being transmitted. However, in order to do this effectively, such software must
have access to the very information, including personal and sensitive information, it was
designed to protect. Deep Packet Inspection (DPI) is one such technology.
Deep Packet Inspection works through the structure of how information is passed
along the internet. When a user wants to transmit information through the internet, that
information is broken up into several smaller pieces, or packets, of information. These
packets are then numbered, and labeled corresponding to where they need to go while
travelling across multiple networks, as well as how they should be reassembled once
they arrive at their destination. This system can be thought of analogously to the current
postal system. In a normal system, letters, packets, are sent through different post
offices on the way to their destination. At each post office, the address of the recipient,
packet header, is read, and then the letter is forwarded to the next post office on its
journey. In contrast, a system involving DPI would be analogous to each post office
opening the letters, reading the contents, and then sending them on to the next post
office. This analogy is obviously very troubling, however, it stands to illustrate the
fundamental flaw of Deep Packet Inspection. When the technology is used as per its
original purpose (i.e. filtration of malicious content) there is no problem, however, where
does security transcend into the realm of eavesdropping?
Have you ever searched for a new topic online, and then, either that day or a few
days from that moment, you begin to see ads for that exact thing everywhere you look
online? Many internet users experience this phenomenon every day. When a person
buys a new car, or learns some new random fact, several people claim to begin seeing
many occurrences of that object every day. This phenomenon is known as the BaaderMeinhof Phenomenon (“There’s a Name for That”), and it can give the illusion that
someone or something is keeping tabs on what you do. This same phenomenon
happens repeatedly on the internet. The difference between the two occurrences is that
on the internet, one really is being watched constantly.
Facebook, the social media giant, is notorious for targeting advertisements to
users based on their likes and previous posts. However, many users may notice ads
which pertain directly to web sites they have visited previously, in some cases, even
sites they visited for the first time on that day. Facebook uses persistent cookies placed
in a browser, even when the site is just simply visited (Whitlock). Even when users
simply disable browsing cookies, their information is still sent to Facebook. While this is
not directly a result of Deep Packet Inspection (DPI technology) the underlying premise
is still the same. In essence, users’ history is tracked and “sold” for advertising
purposes, which many view as a violation of their personal privacy, which it very well
may be. However, this very same principle of advertising is used by several advertising
companies on the internet today in order to target advertising based on users’ history.
Many companies today use DPI technology to ensure their customer’s
information is secure. For example, Dell currently employs the use of a DPI technology
known as Reassembly-Free Deep Packet Inspection (RFDPI) in order to protect their
consumers from unwanted viruses, malware and attacks from a myriad of malicious
sources (“Deep Packet Inspection”). On the opposite end of this spectrum, DPI
technology is currently being used in China in order to monitor the populace’s
movements on the internet, in an attempt to control the flow of information (Wawro).
While these uses can be interpreted as benevolent actions in the attempt to protect
consumers at large, there are many companies which use DPI technology for much
more ethically nefarious purposes, one of these companies is NebuAd.
In 2007, an internet service provider (ISP), known as Embarq, entered into an
agreement with NebuAd, an online behavioral tracking start-up company in California.
The agreement allowed NebuAd to collect information about the web browsing history of
customer’s on Embarq’s networks. This information was then used to facilitate
advertising targeted to individual consumers by NebuAd (Augustino, and Miller). Most
would consider this action illegal, especially considering NebuAd retrieved this
information without the express permission from the customers of Embarq (Austin). This
case, however, is not as clear cut in terms of the law.
The Electronic Communications Privacy Act of 1986 prohibits the interception of
electronic communications unless covered under a legal subpoena, and is the standard
legal argument when it comes to questions regarding privacy and the use of technology
as an electronic medium for communication. Several plaintiffs brought legal action
against Embarq, citing that Embarq violated the terms of the ECPA in allowing NebuAd
to collect information about their customer’s without their express consent. On the
surface, this argument appears solid, however, the courts upheld that Embarq was not
liable for any violation of privacy. This ruling was upheld based upon the blurred line
between the definition of access and acquisition. The ECPA prohibits the “interception”
of electronic messages, which the court upheld as the “acquisition” of the content of the
information in question (Balasubramani). In this respect, Embarq did not “acquire” the
information, as much as they had access to the information, therefore, they did not
directly violate the terms of the ECPA. But what happened to NebuAd.
Most would probably agree that the collection of information about individuals,
barring the existence of a subpoena, without that individual’s consent is at the very least
unethical. This is evident by the actions of many of NebuAd’s affiliated Internet Service
Providers. According to Wikipedia, several of the ISP’s who used NebuAd’s technology
for behavioral advertising ended their dealings with the company well before the
lawsuits began. Many of these companies are cited as withdrawing due to “concerns
regarding privacy issues” (Wikipedia). Despite the multitude of warning markers,
NebuAd continued to assert that it was innocent of any wrong doing and that it
“aggressively notified Internet subscribers about the monitoring and giving them a
chance to opt out” (Austin). These assertions are not quite as “aggressive” as the
statements by NebuAd would lead one to believe.
According to Ars Technica, in order to notify their users about their use of
NebuAd’s technology, Embarq purportedly inserted a two paragraph statement into their
5,000-word privacy policy informing their users about the changes (Anderson). With
such an important change as monitoring the entirety of their user’s web browsing, one
would expect something more direct than an abstract entry into an already exhaustive
privacy policy. Statistics from Ars Technica show just how effective this informative
technique proved to be.
“Out of Embarq's 26,000 Internet customers in the Gardner area, only 15
opted out. That 0.06 percent of the total, which means that 99.94 percent
of subscribers really did love the "enhancement" they got from the
NebuAd service—either that or they had no idea that their ISP data was
being mined to construct anonymous ad categories.” (Anderson)
Even more troubling is the fact that, even should a user choose to “opt-out” of the
NebuAd advertising, their data is still not safe. According to Ryan Singel of Wired.com,
the opt-out program of NebuAd involves the use of an “opt-out cookie” which still will not
stop the technology from logging a user’s data (Singel). Charter Communications, which
was in the preliminary stages of implementing NebuAd’s technology at the time, refused
to say that the opt-out program would keep the user’s information from being tracked,
rather they stated that a user who opts out, “will no longer receive ads that are tailored
to your web preferences, usage patterns and commercial interests” (Singel). Thus,
regardless of whether a user on a network provided by an ISP affiliated with NebuAd
opts out of the service, their data would still be collected. NebuAd subsequently closed
down operations in May of 2009 and has agreed to a settlement of $2.4 million in favor
of the web users who brought suit against it and six ISP’s (Davis).
Despite some of these gray area cases, Deep Packet Inspection is not an evil
technology by any means. DPI can be used for many benevolent purposes without
compromising the information of users. Some of these purposes include network
security, copyright enforcement, as well as the lawful interception of information in aid of
the Communications Assistance for Law Enforcement Act (CALEA). As was stated
above, the ECPA prohibits the interception of electronic messages barring the presence
of a legal subpoena, thus, Deep Packet Inspection is a vital tool to law enforcement
officials in the pursuit of criminals, both online and off. CALEA affirms: “to make clear a
telecommunications carrier's duty to cooperate in the interception of communications for
Law Enforcement purposes, and for other purposes” ("Communications Assistance for
Law Enforcement Act"). In today’s world, where a lot of messaging takes place over
internet traffic (i.e. yahoo messaging, Facebook messaging, etc.) DPI technology is vital
to the assistance of law enforcement agencies in order to monitor potentially criminal
activity.
As with many major technologies of today, Deep Packet Inspection occupies an
area of major gray area where the defining line is the intent of the user of such
technology. DPI technology offers a powerful medium of control and security when used
properly, just as it provides a myriad of exploitative functionality. As the future of
technology develops and attacks on personal information and security continue to
become more prevalent as well as increasingly technical in nature, the need for more
advanced forms of monitoring such as Deep Packet Inspection will become ever more
necessary.
References
1. "Communications Assistance for Law Enforcement Act." Wikipedia. Wikipedia,
110 Apr 2014. Web. 14 Apr 2014.
<http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforc
ement_Act>.
2. "Deep Packet Inspection." Dell SonicWALL, Inc.. Open Text Web Solutions.
Web. 13 Apr 2014. <https://www.sonicwall.com/us/en/products/DeepPacket-Inspection.html>
3. "NebuAd." Wikipedia. Wikipedia, 5 Apr 2014. Web. 13 Apr 2014.
<http://en.wikipedia.org/wiki/NebuAd>.
4. "There’s a Name for That: The Baader-Meinhof Phenomenon." Pacific Standard.
Pacific Standard, 22 July 2013. Web. 14 Apr. 2014.
<http://www.psmag.com/culture/theres-a-name-for-that-the-baadermeinhof-phenomenon-59670/>.
5. Anderson, Nate. ".06% opt out: NebuAd hides link in 5,000-word privacy policy."
Ars Technica. Ars Technica, 24 Jul 2008. Web. 13 Apr 2014.
<http://arstechnica.com/uncategorized/2008/07/06-opt-out-nebuad-hideslink-in-5000-word-privacy-policy/>.
6. Augustino, Steve, and Barbara Miller. "Court Rules for ISP in Deep Packet
Inspection Lawsuit." Telecom Law Monitor. Telecom Law Monitor, 7 Jan
2013. Web. 14 Apr 2014.
<http://www.telecomlawmonitor.com/2013/01/articles/litigation/courtrules-for-isp-in-deep-packet-inspection-lawsuit/>.
7. Austin, Scott. "Turning Out The Lights: NebuAd." Venture Capital Dispatch - The
Wall Street Journal. The Wall Street Journal, 19 May 2009. Web. 13 Apr
2014. <http://blogs.wsj.com/venturecapital/2009/05/19/turning-out-thelights-nebuad/>.
8. Balasubramani, Venkat. "Privacy Plaintiffs in Deep Packet Inspection Case Get
No Love From the Tenth Circuit -- Kirch v. Embarq Management."
Technology & Marketing Law Blog. Technology & Marketing Law Blog, 7
Jan 2013. Web. 13 Apr 2014.
<http://blog.ericgoldman.org/archives/2013/01/tenth_circuit_g_1.htm>.
9. Burgess, Rick. "One minute on the Internet: 640TB data transferred, 100k tweets,
204 million e- mails sent." TechSpot. TechSpot, 20 Mar 2013. Web. 13 Apr
2014. <http://www.techspot.com/news/52011-one-minute-on-the-internet640tb-data-transferred-100k-tweets-204-million-e-mails-sent.html>.
10. Davis, Wendy. "NebuAd Settles Lawsuit Over Behavioral Targeting Tests."
MediaPost Publications. MediaPost Publications, 16 Aug 2011. Web. 14
Apr 2014. <http://www.mediapost.com/publications/article/155980/>.
11. Singel, Ryan. "Can Charter Broadband Customers Really Opt-Out of Spying?
Maybe Not." Wired. Wired, 16 May 2008. Web. 14 Apr 2014.
<http://www.wired.com/2008/05/theres-no-optin/>.
12. Wawro, Alex. "What Is Deep Packet Inspection?" PCWorld. PCWorld, 1 Feb
2012. Web. 13 Apr 2014.
<http://www.pcworld.com/article/249137/what_is_deep_packet_inspection
_.html>.
13. Whitlock, Tim. "Is Facebook tracking your web browsing history?." timwhitlock.
N.p., 7 Jan. 2011. Web. 14 Apr. 2014.
<http://timwhitlock.info/blog/2011/01/is-facebook-tracking-your-webbrowsing-history/>.
Download