How Our Networks Have Come Under More Surveillance Than Ever

Technology improves. It's something we know instinctively, but we typically don't give much thought to how much and how quickly security and surveillance tech is advancing. Ars Technica has a deep look at just that, and its disconcerting implications on the real world.

The most state of the art surveillance is made possible by deep packet inspection (DPI), which can gather data about specific users' online activities. It does this by closely monitoring or capturing the data that passes through a given network, at times by the petabyte.


How does this affect you? Some time soon, you won't be able to escape the deep data scrapes. "There's no question that within the next three to five years, not having a copy of your network data will be as strange as not having a firewall," the CEO of Bivio Networks, a leading firm working with DPI technology, told Ars Technica.

DPI is used for everything from marketing to piracy detection—though Comcast was shut down by the FCC over the issue. Here's a specific example of how it works in real life:

One frequent activity that Splunk has helped the University automate is processing Digital Millennium Copyright Act takedown notices after a student is discovered hosting pirated content on sites hosted from their own computers or over BitTorrent streams. "We needed an automated, instant way of locking those down," Maszeroski said. Data brought into Splunk can be used to perform a search for BitTorrent traffic and allows it to be identified by MAC address; the University's information security office has built a Java application that uses Splunk's Web API to find the offending MAC address and then "cut the person off at a switch or wireless level."

If you're interested in how your online day-to-days are being and will be monitored going forward, and just how breathtaking in scope it can be, you should definitely check out the full piece over at Ars. [Ars Technica]

Image by Tischenko Irina/Shutterstock


Share This Story