IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites
نویسنده
چکیده
The National Security Agency’s ‘warrantless wiretapping program’ is arguably one of the largest domestic surveillance operations in history. It also represents among the most serious contemporary challenges to democratic governance and civil liberties. This paper reports on the development of the IXmaps interactive mapping application designed to show internet users how their personal traffic may be intercepted by the NSA. Using crowdsourced data collection of thousands of individually generated traceroutes, IXmaps displays on a map of North America the path taken by user-initiated data packets in relation to the sites where the NSA has most likely established surveillance operations. We also discuss the potential for this mapping technique to serve as a tool for achieving better public understanding of surveillance in the internet core. Keywords-—NSA warrantless wiretapping; countersurveillance; internet surveillance; crowdsourced veillance
منابع مشابه
Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance
Recent controversies about the National Security Agency’s warrantless wiretapping of international calls have overshadowed equally disturbing allegations that the government has acquired access to a huge database of domestic call traffic data, revealing information about times, dates, and numbers called. Although communication content traditionally has been the primary focus of concern about ov...
متن کاملDiscount Eye Tracking: The Enhanced Restricted Focus Viewer
This paper discusses the design and implementation of a unique software tool, the enhanced restricted focus viewer (ERFV), for tracking the visual attention of users in hyperlinked environments such as web sites. The software collects data such as mouse clicks along with the path of the user’s visual attention as they browse a site. Unlike traditional eye-tracking procedures, the ERFV requires ...
متن کاملWiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP
Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words...
متن کاملKeep your eyes on the prize.
Dave went on to explain that any goal worth achieving, worth stretching yourself to reach, worth sacrificing for, will require significant change. Change in your behavior, in your attitude, even in your character. To have what you have never had, you have to be willing to do what you have never done. This is true of success in business, and it’s no less true in our JP+ Virtual Franchise. "For t...
متن کاملOnline privacy and your teen.
Facebook is the most popular social media site among teens; it is important thatparentsunderstandrecentchangesto itsprivacyrules that affect teens.Manyparents knowFacebook allows users to create an online profile that includes personal information.Most social media allow users to choose how much information they want to share publicly with theWorldWideWeb through privacy settings. Privacysettin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013