Who 0wnz the Internet? Ian Brown Oxford Internet Institute

advertisement
Who 0wnz the Internet?
Ian Brown
Oxford Internet Institute
The lawless frontier?
 “The Internet interprets censorship as damage and
routes around it” -John Gilmore
 “Governments of the Industrial World, you weary
giants of flesh and steel, I come from Cyberspace,
the new home of Mind. On behalf of the future, I
ask you of the past to leave us alone. You are not
welcome among us. You have no sovereignty
where we gather.” -John Perry Barlow
Government attempts at control





Cryptographic software
Illegal content
Digital copyright
Counterterrorism
Cybercrime
Encryption
 Diffie, RSA - controls on research and
publication
 PGP, munitions - controls on software
export
 Key escrow - controls on software
functionality
 EU export controls on cryptanalytic tools
Crypto use controls
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Source: Bert-Jaap Koops (2007) Crypto Law Survey
RIPA decryption powers
 S.49 notices from senior police, Customs etc.
impose “disclosure requirements” that may
usually be met by production of plaintext
 Keys may be demanded in special circumstances
by chiefs of police, Customs commissioners, etc.
 Notices may prohibit “tipping-off”
 2 and 5-year prison terms
US censorship efforts
 Federal laws (CDA, COPA) repeatedly ruled
unconstitutional in late 90s; particular problems with
“community standards”, 1st amendment and proportionality
 Pennsylvania law struck down in 2004 due to lack of
proportionality (400 blocked sites caused over 1 million
other sites to be blocked), easy circumvention and out-ofstate effect; no evidence Act “has reduced child
exploitation or abuse”.
 2005 Utah law challenged by coalition of businesses, ISPs
and their customers on similar 1st Amendment and
Commerce clause grounds
Problems with Internet
censorship
 How do you restrict access to content
hosted in other countries? Filter based on IP
addresses, redirect DNS queries, use proxies
with blocking lists and/or keyword filters
 How do you decide which content should be
blocked?
 How do you block access to non-WWW
content?
BT’s CleanFeed system
 Blocks customer access to sites that have been secretly
listed as containing child pornography by self-regulatory
body the Internet Watch Foundation
 UK government has threatened to legislate if other ISPs do
not follow suit
 Ministers already discussing adding violent pornography to
the list
 Cambridge researcher showed that BT system could be
used to search out child pornography
The Great Firewall of China
 Just about most
restrictive on planet –
uses all mechanisms
previously described
and more
 Little transparency to
users
Source: Ben Edelman
The different faces of Google
Filesharing vs album sales
Source: Stan Liebowitz (2007) How Reliable is the Oberholzer-Gee
and Strumpf paper on File-Sharing? p.19
EUCD Article 6
 6.1: “Member States shall provide adequate legal protection
against the circumvention of any effective technological
measures”
 6.2: bans “manufacture, import, distribution, sale, rental,
advertisement for sale or rental, or possession for commercial
purposes of devices, products or components or the provision
of services”
 Purpose is irrelevant
 Finland, France, UK 2 years prison; Portugal 3 years; France
150,000€ fine
 Only Germany, Denmark, Finland and UK have research
exemptions
Fundamental technical problems
 The analogue “hole” – watermarking
 Break Once Play Anywhere
 File-sharing won’t stop
Terrorist use of Internet





Communications
Media impact
Research
Belonging
Alternative reality
Signals intelligence
Everybody’s at it:
• Echelon
• Frenchelon
• Multinationals
“We steal secrets with
espionage, with
communications, with
reconnaissance satellites” –
James Woolsey
Source: Duncan Campbell (1999) Development of surveillance technology
Menwith Hill
Officially RAF base; unofficially is run by NSA
Radio interception
High frequency radio interception antenna
(AN/FLR9) - Duncan Campbell (1999) Development
of surveillance technology
Microwave interception
• Microwave links carry signals
between cities, but spill out into
space
• CANYON and CHALET US
satellites collect signals from
Soviet Union, Middle East
Source: Duncan Campbell (1999)
Development of surveillance technology
Submarine interception
• Underwater cable
interception in
Okhotsk Sea (1971)
and Barents Sea
(1979)
• USS Jimmy Carter
specially designed
for underwater
divers (2005)
Communications exchange interception 1995
Internet site
Location
Operator
Designation
FIX East
College Park, MD
US government
FIX
FIX West
Mountain View
US government
FIX
MAE East
Washington, DC
MCI
MAN
New York NAP
Pennsauken, NJ
Sprintlink
NAP
SWAB
Washington, DC
PSInet / Bell
Atlantic
SMDS
Washington Area
Bypass
Chicago NAP
Chicago
Ameritech /
Bellcorp
NAP
San Francisco
NAP
San Francisco
Pacific Bell
NAP
MAE West
San Jose
MCI
MAN
CIX
Santa Clara
CIX
CIX
Source: Wayne Madsen (1995) Puzzle palace conducting Internet surveillance
Narus ST-6400
Installed by AT&T in San Francisco, Seattle, San Jose,
Los Angeles and San Diego trunk facilities (EFF)
UK content surveillance
 Comms intercepts authorised by Secretaries
of State under RIPA
 Agencies
 1466 in 2002; 6 per day for Blunkett
 Blanket overseas warrant for GCHQ from
Foreign Secretary
Regulation of Investigatory
Powers Act 2000
 “Communications data” obtained by selfauthorised demand from police, Customs
etc.
 Content requires warrant from government
minister
Comms data access purposes
 in the interests of national security;
 for the purpose of preventing or detecting crime or of
preventing disorder;
 in the interests of the economic well-being of the United
Kingdom;
 in the interests of public safety;
 for the purpose of protecting public health;
 for the purpose of assessing or collecting any tax, duty,
levy or other imposition, contribution or charge payable to
a government department;
 for the purpose, in an emergency, of preventing death or
injury or any damage to a person’s physical or mental
health, or of mitigating any injury or damage to a person’s
physical or mental health.
“Snooper’s charter”
•
•
•
•
•
•
•
•
•
•
•
•
The Department for Environment, Food and
Rural Affairs.
The Department of Health.
The Home Office.
The Department of Trade and Industry.
The Department for Transport, Local
Government and the Regions.
The Department for Work and Pensions.
The Department of Enterprise, Trade and
Investment for Northern Ireland.
Any local authority within the meaning of
section 1 of the Local Government Act 1999.
Any fire authority as defined in the Local
Government (Best Value) Performance
Indicators Order 2000
The Scottish Drug Enforcement Agency.
The Scottish Environment Protection
Agency.
The United Kingdom Atomic Energy
Authority Constabulary.
•
•
•
•
•
•
•
•
•
•
•
•
A Universal Service Provider
within the meaning of the Postal
Services Act 2000
A council constituted under
section 2 of the Local Government
etc. (Scotland) Act 1994.
A district council within the
meaning of the Local Government
Act (Northern Ireland) 1972.
The Common Services Agency of
the Scottish Health Service.
The Northern Ireland Central
Services Agency for the Health
and Social Services.
The Environment Agency.
The Financial Services Authority.
The Food Standards Agency.
The Health and Safety Executive.
The Information Commissioner.
The Office of Fair Trading.
The Postal Services Commission.
European Union
 EU Data Retention Directive 2006
 Comms data to be retained 6 months – 2
years
Data to be retained






The Internet Protocol (IP) address,
whether dynamic or static,
allocated by the Internet access
provider to a communication;
The User ID of the source of a
communication;
The Connection Label or
telephone number allocated to any
communication entering the public
telephone network;
Name and address of the
subscriber or registered user to
whom the IP address, Connection
Label or User ID was allocated at
the time of the communication.
Data necessary to trace and
identify the destination of a
communication:
The Connection Label or User ID
of the intended recipient(s) of a
communication;





Name(s) and address(es) of the
subscriber(s) or registered user(s)
who are the intended recipient(s)
of the communication.
The date and time of the log-in
and log-off of the Internet sessions
based on a certain time zone.
The calling telephone number for
dial-up access;
The digital subscriber line (DSL)
or other end point identifier of the
originator of the communication;
The media access control (MAC)
address or other machine identifier
of the originator of the
communication.
Enright (2007) Storm Live and Active Peers
The blue live peer count
line is the most accurate
estimate of the size of the
network for a point in time
that Stormdrain can give.
Source: Brandon Enright,
Exposing Stormworm,
ToorCon, San Diego, Oct
2007
House of Lords Personal Internet
Security report (2007)
 Liability must be assigned to financial
institutions, ISPs and software vendors
 Open source software should benefit from a
“Good Samaritan” exemption
Conclusions
 Government attempts to control Internet activity
often hasty, ineffectual and driven by narrow
sectoral interests (anti-circumvention laws)
 Often attempt to deal with new problems using old
familiar solutions (arms control, CleanFeed)
 Often unrealistic (crypto, CleanFeed)
 Often disproportionate and breach human rights
(surveillance, censorship)
Download