Professional Documents
Culture Documents
Page 1 of 17
Page 2 of 17
Illustration 1: The Customs symbol seen at inspection points when entering countries and territories
Page 3 of 17
Page 4 of 17
Illustration 2: Visualization of a portion of the Internet (Network Map) by the Opte Project
Page 5 of 17
Page 6 of 17
Photograph 3: Customers of Comcast Corporation protesting in the United States against the artificial throttling of internet traffic
Page 7 of 17
Page 8 of 17
Diagram 4: The Chain of Trust a client web browser or application takes in verifying the authenticity of a server
Diagram 5: The Man-in-the-middle attack, a classic and very effective interception technique, where the eavesdropper employs IP-spoofing or similar technologies to trick the client into thinking it is talking to the expected destination
Page 9 of 17
Page 10 of 17
Map 6: B.B.C. Map of regions of the world that censor and filter Internet content before delivering it to the public
Page 11 of 17
Page 12 of 17
Diagram 7: A diagram of the peer-to-peer tunnelling networking enabled by the 'suitcase technology', compared to conventional Internet connections
Page 13 of 17
Page 14 of 17
Bright, Peter. Ars Technica. How the Comodo certificate fraud calls CA trust into question. Mar. 24, 2011. Web. May 23, 2011. <http://arstechnica.com/security/news/2011/03/how-thecomodo-certificate-fraud-calls-ca-trust-into-question.ars/>. The incidence of Comodo, a major issuer of SSL/TLS certificates accidentally allowing a highpaying customer to issue illegitimate certificates is reported, the consequences of it, and the revelations of the greater picture of global certificate signing and automatic trust system is well described. Ars Technica is very reputable and popular technology and science blog-style news media organization, the authors of its articles consists of university graduates and industry field experts, their content is reviewed before publication, and is generally considered to be well researched and easy to understand. Their is no motive or reason for their bias in reporting on the faults of a present technology that is being actively developed, the author did not necessarily criticize Comodo for their frightening oversight. Ernesto. TorrentFreak. Rogers BitTorrent Throttling Experiment Goes Horribly Wrong. Dec. 13, 2010. Web. May 23, 2011. <http://torrentfreak.com/rogers-bittorrent-throttling-experiment-goes-horribly-wrong-101213/>. In a post, Ernesto, the creator and main author of the site writes of the bit-torrent and related services signal and transmissions degradation, retelling the events of how Rogers has initially attempted to prevent media and public attention on its practice, and the eventual implications on customers. TorrentFreak is a fairly reputable source, a leading voice in the reporting on grievances of users over I.S.P. and Government interference on the internet, it has been featured on C.N.N., the B.B.C., the Wall Street Journal, the Guardian, and the New York Times, asserting to its reliability and truthfulness of information. Free Press. Network Neutrality. n.d. Web. Jun. 7, 2011. <http://www.freepress.net/policy/internet/net_neutrality>. Article contains a brief overview of the fundamental philosophies and principles argued by it supporters, in addition to a number of useful examples of foul play and lack of accountability to and control by the public Free Press is a recognized media lobbying group in the United States for media reform and universal access to communication that is non-profit and non-partisan, with over 500, 000 members, it is the largest of its kind in that nation. The content of Free Press has been featured in numerous other media, and the nature of its publications assumes that it presents truthful neutral information that causes uneasiness. The organization has had run-ins with the American right-wing, who have taken to saying that it has socialistic/communistic Marxist ideals, but this of course expected of that people, it in no way affects the credibility of this source. Glanz, James and John Markoff. New York Times. U.S. Underwrites Internet Detour Around Censors. Jun. 12, 2011. Web. Jun. 13, 2011. <http://www.nytimes.com/2011/06/12/world/12internet.html>. The source is a four-page online article on direct U.S. Government efforts to set up and maintain reliable internet and mobile phone networks that are secondary to and completely independent of stateoperated ones, to bypass censorship and service interruptions when there is unrest. It is meant to allow
Page 15 of 17
the citizens of media-oppressive nations to speak their minds, hopefully without drawing to the hypocrisy of the U.S. at the same time. The New York Times is an American newspaper, and is therefore subject to regulatory and quality-of-publication regulations, the source is trustworthy, and its content is verifiable by its extensive resources. Office of the Privacy Commissioner of Canada. What is Deep Packet Inspection?. n.d. Web. May 23, 2011. <http://dpi.priv.gc.ca/index.php/what-is-deep-packet-inspection/>. Resource gives an overview of the implications of Deep Packet Inspection, presently permitted to be employed by Internet Service Providers by the Canadian Radio-television Telecommunications Commission. The Office of the Privacy Commissioner of Canada is an agency of the government of Canada and is well-maintained, thereby making it instantly reputable. The dates indicated within the articles are fairly recent, reflecting current perspectives and consistent updates. In addition, the article is an introduction to an open public invitation to telecommunications, law, philosophy, civil liberties and computer science representatives to submit multi-stance essays, it is therefore neutral of opinion and bias, and only presents the facts. Wagner, Ben. Global Voices Advocacy. Deep Packet Inspection and Internet Censorship: International Convergence on an Integrated Technology of Control. Jun. 25, 2009. Web. Jun. 12, 2011. <http://advocacy.globalvoicesonline.org/2009/06/25/study-deep-packet-inspectionand-internet-censorship/>. A connection between D.P.I. And its uses in internet censorship is made in the paper published by Global Voices Online (the parent organization). Global Voices Online is a network of journalists and bloggers, it was started by the Berkman Center for Internet and Society of Harvard University, amongst other things, it translates international content across the world into many languages, in order to link together places and cultures. The information provided is published and was presented before academic and industry representatives, it is an unbiased and realistic view of the use of technology against freespeech.
Network Neutrality and Internet Security Works Cited Images and Diagrams Ars Technica. Diagram 4: Chain of Trust. Mar. 24, 2011. Web. Jun. 13, 2011. <http://static.arstechnica.com/03-23-2011/ca-2.png>. Ars Technica. Diagram 5: Man-In-The-Middle Attack. Mar. 24, 2011. Web. Jun. 13, 2011. <http://static.arstechnica.com/security/ca-3-cropped.png>.
Page 16 of 17
CyberNetNews. Photograph 3: Comcast Protestors. n.d. Web. Jun. 5, 2011. <http://cybernetnews.com/wp-content/uploads/2007/10/comcast-throttling-downloads.jpg>. Illustration 1: Customs Symbol. n.d. Web. Jun. 6, 2011. <http://www.moveoneinc.com/blog/wp-content/uploads/2009/12/customs.jpg>. Opte Project. Illustration 2: Internet Map. Jan. 7, 2007. Web. Jun. 5, 2011. <http://upload.wikimedia.org/wikipedia/commons/d/d2/Internet_map_1024.jpg>. The Guardian. Map 6: Internet Censorship World Map. Jul 1, 2009. Web. Jun. 5, 2011. <http://static.guim.co.uk/sys-images/Guardian/Pix/pictures /2009/7/1/1246446743162/internet_censor_map.png>. The New York Times. Diagram 7: Creating a Stealth Internet. Jun. 12, 2011. Web. Jun. 13, 2011. <http://graphics8.nytimes.com/images/2011/06/12/world/12internet_graphic2 /12internet_graphic2-popup.jpg>.
Page 17 of 17