Deep packet inspection allows an internet service provider or government agency to access all the unencrypted data that passes through an online network. In the absence of strict rules, it poses a serious threat to your ability to maintain privacy online.
What is it used for?
Deep packet inspection allows the government to review the online communications of a suspect or target of investigation as those communications are moving through the network. Deep packet inspection tools access, scan, and even copy the entire contents of your email, web browsing, posting, and shopping.
How It Works
- Computers transmit all of the information you send and receive online in the form of data clumps called “packets.” Every web page you open and email you send is broken down and sent through the network as a series of packets that are rebuilt at their destination.
- Internet service providers use “shallow” packet inspection to analyze a small part of the packets in order to route internet traffic and protect users. The “labels” on data packets enable internet routing systems to figure out who sent them, who should receive them, and how they should be put back together at their destination. Internet service providers similarly conduct some form of packet “sniffing” to protect users from spammers and other online troublemakers. Usually, this involves reading the “labels” on data packets to determine where the data is coming from.
- “Deep packet inspection,” however, scans and logs the entire contents of data packets. Using this technique, police or intelligence agents investigating a criminal suspect can inspect all of that person’s unencrypted internet traffic. In theory, an agency could simply copy everything that passes through a network.
Civil Liberties Concerns
Private companies and government agencies can use this technique to secretly watch users and restrict their online activities. As PC World notes, “in the absence of strict legal restrictions, your ISP can root through the information you exchange and use it as they see fit. Personal information like your age, location, and shopping habits can be sold in anonymized batches to advertising companies” or passed on to law enforcement. The NSA and the FBI have tapped directly into these data streams. This allows them keep tabs on your activities without asking your ISP. An agency could use the same tools to block certain users or sites altogether. Some foreign governments restrict access to certain websites using packet inspection tools.
How Prevalent Is It?
Government agencies tend to be secretive about their use of advanced surveillance technologies, and we don’t know how many agencies use this technique. Deep packet inspection requires some technical skill and, more importantly, access to the networks of private internet companies. So, few state and local police departments currently engage in it. Probably, only the best-funded national agencies currently use deep packet inspection, though perhaps the police departments of large states or major cities could do so as well.
Examples Of Use
Location: San Francisco, CA
Whistleblower Sheds Light On Telecom’s Cooperation With NSA
In 2009, the Electronic Frontier Foundation announced a lawsuit against AT&T. The group alleged the telecom giant violated customers’ privacy by using deep packet inspection techniques to pass revealing details of the online communications of millions of people to the National Security Agency. Documents leaked in connection with the lawsuit include a declaration from a former AT&T technician stating that, inside the company’s switching center in San Francisco, the NSA installed a large machine that uses devices called “splitters” to tap directly into fiber optic communications lines. According to his statement, the NSA uses the system to tap phones and analyze (perhaps even copy) data traffic.
“The right of the people to privacy is recognized and shall not be infringed. The legislature shall implement this section.”
Article 1, Section 22 of the Alaska Constitution.