IP address URL packet header and body geolocation anonymity proxy server the dictators dilemma graphical versus commandline user interface This work is licensed under a Creative Commons AttributionNoncommercialShare Alike 30 License ID: 735931
Download Presentation The PPT/PDF document "S kills : none Concepts : log," is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
S
kills: noneConcepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, the “dictator’s dilemma,” graphical versus command-line user interface
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Internet surveillance – who and where are you?Slide2
Where does this topic fit?Internet conceptsApplicationsTechnologyImplicationsInternet skills
Application developmentContent creationUser skillsSlide3
Data packets
10011
11101
10101
00110
Client
Server
155.135.1.1
11.144.1.14Slide4
1101010010101101010010101000101010001010110101010101001010101101010010101010100101010010101001111000110101011001100101011001010100110010101010101001010101010011010101010100101011101010100101101001011010010101010111001010000101010101010100
To: <IP address>
From: <IP address>
Header:
Body:
T
wo parts of an Internet protocol (IP) data packet
Why did I show the contents of the body as 1s and 0s?Slide5
IP address
Stop and find your IP addressSlide6
IP address
Date FinishedLinked From
155.135.55.229
1/27/201 14:10
http://cis275assignments.blogspot.com/2010/08/background-survey.html
155.135.55.229
1/31/2011 15:05
http://cis275assignments.blogspot.com/2010/08/background-survey.html
96.39.242.153
1/27/2011 2:40
http://cis275assignments.blogspot.com/2010/08/background-survey.html
155.135.55.229
1/27/2011 13:30http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.2291/25/2011 13:55
http://cis275assignments.blogspot.com/2010/08/background-survey.html75.3.224.651/31/2011 20:15http://cis275assignments.blogspot.com/2010/08/background-survey.html
76.234.226.1551/31/2011 15:10
http://cis275assignments.blogspot.com/2010/08/background-survey.html
155.135.55.2291/27/2011 14:20http://cis275assignments.blogspot.com/2010/08/background-survey.html155.135.55.229
1/25/2011 14:10http://cis275assignments.blogspot.com/2010/08/background-survey.htmlClass survey – supplied without your knowledge
Why are all the “linked from” URLs the same?
Why do so many IP addresses begin with 155.135?Slide7
Where are you?
Stop and find your current location.
From ip2location.comApproximate location of 155.135.1.1:Slide8
Who are you?
IP address + time and date + ISP log →
Internet account holder
Who can get access to this information?Slide9
The U. S. Constitution says you need a warrant
But, what did Eric Snowden reveal?Slide10
Or a job with the NSA or an NSA contractorSlide11
Anonymity – public computerSlide12
Anonymity: proxy
server
Through a
proxy
Normal connection
Proxy
serverSlide13
Glasnost which undermined the USSR and other socialist countries consisted in handing over the mass media, one by one, to the enemies of socialism.Raúl CastroOctober, 1997One telex can cost twelve dollars [whereas] the same message costs 75 cents in the form of a fax and 3 cents via the Internet ... in spite of our blockaded circumstances, we are in a relatively good position [to face the challenges of such scientific and technological changes], due to the educational and scientific work developed by the revolution.
Carlos LageOctober, 1997
The dictator’s dilemmaSlide14
Ten year prison sentencesSlide15
SummarySlide16
Self-study questionsCriminals use proxy servers to hide their activity. Should we make it a crime to operate a proxy server or are there times when anonymity is desirable? Do you mind servers like the one at SurveyGizmo.com gathering data on you?
Can you think of reasons you might want data to be gathered on you?How do questions of privacy differ between cultures and political systems?What is the IP address of your computer? (You will probably have to get some help answering that question).Proxy servers allow user anonymity if surveillance is a problem, but they also enable a form of privacy – explain the way the latter works.Slide17
ResourcesA geo-location service:http://www.ip2location.com/
Yahoo identifies dissidents to the Chinese government:http://boingboing.net/2007/04/19/yahoo-aided-china-in.htmlStudent background survey that captured IP addresses:http://cis275assignments.blogspot.com/2010/08/background-survey.htmlThe dictator’s dilemma in Cuba:http://laredcubana.blogspot.com/2011/02/dictators-dilemma.html