Wiretapping Net Neutrality

Came across an interesting article the other day on NPR. The article talked about the difficulty in implementing a wiretapping law in the age of the communication capabilities of the Internet. The audio is embedded below.

Tapping Neutral Networks

In the old days of wired telephony, communication happened when a fixed wire carried voice from the speaker to the listener. Wiretapping during this era was literally tapping a wire. The fact that communication took a pre-determined route between the participants made wire-tapping technically simple.

It was this pre-determined route for communications that, during cold-war, led to the development of the Internet. Ironically, the original requirement for the internet (having no fixed path, and therefore no single failure point) makes intercepting communications that much more difficult.

Communication on the Internet is a vague concept. Anything can be, and is, communication. Sending email, downloading files, instant messaging, viewing websites, watching video or having conversations via Skype - it is all a form of communication. Not to mention the continuous chatter of all the devices on the network, constantly talking to each other. Hence any law that deals with eavesdropping is challenged by a target that is designed to withstand the very thing that is required of it. The NPR article does a great job of identifying the problems of any intercept solution - loss of security, misuse, and the loss of privacy.

Network Neutrality

I think there is another aspect, that links back to the idea of network neutrality. The nature of network neutrality means that anyone can build a tool that can use the Internet to communicate. With the widespread availability of communication and encryption libraries, means that building a small tool that can only communicate with copies of itself is trivial. The only way to prevent this would be to prevent the user of the Internet by applications that are not explicitly authorized.

In other words, a neutral network, makes successful eavesdropping extremely difficult, if not impossible. The only way to have an "Intercept Solution" that works is to have a network that is directly involved in what is flowing across it. Forget corporate greed stratifying the Internet. In the long run, it might still be the need to eavesdrop that might trump the case for network neutrality.

February 27, 2011

0 comments:

Popular Posts

Subscribe / Share


Subscribe via email:

 Subscribe in a reader

 Follow me on Twitter

Blog Labels

2.0 (8) 4chan (1) 5800 (12) accounting (1) activities (1) advertising (1) airlines (2) anarchius.org (5) android (16) animation (2) app (1) apple (4) april fools (1) article (13) astronomy (1) athiesm (1) atom (2) awesome (2) battery (2) BBC (1) beta (2) biology (1) blender (1) blog (29) books (2) brain (1) BSG (1) business (7) camera (1) catb (2) chemistry (1) china (1) cloud (1) coca-cola (1) code (2) communication (8) cool (9) cosmology (1) creative (4) cricket (1) crowd sourced (2) currency (1) data (2) democracy (1) DIY (2) DMCA (1) DRM (1) easter egg (1) ebooks (1) economics (3) education (1) emergence (3) english (3) evolution (1) exercise (1) facebook (1) fail (1) fair use (1) fcc (2) feedburner (3) fffuuu (5) fiction (1) fifa (1) finance (1) firmware (7) fitbit (1) fitness (1) flash (1) flight (2) football (1) foss (6) free (2) freedom (2) funny (13) futuristic (1) gadgets (31) Galaxy SII (4) games (9) GDesk (2) gif (1) gimp (5) gmail (3) google (18) groupon (2) guitar (2) hack (2) history (5) hobbies (4) how-to (4) humor (1) iaudio (1) ice cream sandwich (3) ICS (3) ideas (13) IKEA (1) India (1) infographic (9) information (5) informative (3) inkscape (1) input (1) interesting (8) internet (5) iphone (1) japan (1) jellybean (1) kindle (3) knowledge (4) language (3) leet (1) lightning (1) links (13) Linux (5) log (1) LOST (2) LOTR (1) luddite (1) metal (1) microsoft (4) milestone (1) milwaukee (1) MIT (1) mobile (16) money (1) moot (1) morality (2) movies (5) MPAA (1) music (15) NASA (1) net neutrality (3) netflix (1) Netgear 3500L (6) networking (1) news (18) nexus one (3) nokia (13) NPR (9) nuclear (1) operating systems (1) opinion (29) p2p (3) philosophy (19) photography (6) physics (3) physiology (1) pipes (3) piracy (1) prank (1) presentation (1) privacy (3) programming (3) psychology (8) puzzles (1) quiz (1) rage comic (5) ramblings (21) rants (14) review (11) RIAA (1) robots (1) rock (1) root (1) RPG (1) rss (3) RTS (1) Samsung (2) sceptic (1) school (1) science (10) search (3) security (6) short story (1) shorts (1) simplicity (1) slashdot (2) SMB (1) snow (1) social (6) society (9) spam (1) spelling (1) spirituality (2) startup (1) statistics (1) storage (1) strategy (1) string theory (1) sustainability (1) swing (1) swype (2) symbol (1) syndication (1) tablet (4) technology (19) TED (10) television (1) template (1) time travel (2) tips and tricks (3) TomatoUSB (4) tools (6) toshiba thrive (6) travel (3) travelogue (1) triz (1) troll (1) troubleshooting (4) tutorial (5) TV (2) ugly (1) update (2) upgrade (8) useful (2) user interface (13) vacation (1) verizon (1) video (6) visualization (1) volunteering (1) VPN (1) wave (2) webcomics (9) webseries (1) website (1) wifi (2) wii (2) wiki (1) windows (1) wolfram alpha (2) world-cup (1) worldcup (1) www (1) x5 (1) xobni (1) yahoo (2) youtube (1) yro (3) ze frank (1)


Miscellaneous

 

Bloggers' Rights at EFF

 

Support CC

 

No Connection, Unpaid, My Own Opinions