Posts Tagged ‘government’

ISPs and other network providers can use deep packet inspection to monitor all the data transmitted to and from your computer; encryption via a virtual private network keeps your data transfers private.

Imagine a technology that can stop spam and malware, identify and block illegal downloads, and allow ISPs to prioritize the data they transmit by content as well as by type. Sounds pretty good.

Now imagine a technology that gives network managers and governments the ability to monitor everything you do on the Internet, including reading and recording your e-mail and other digital communications, and tracking your every move on the Web.

Of course, it’s the same technology–deep packet inspection by name. That’s how governments around the world are able to spy on their citizens’ online activities and control their access to the Internet.

Bills pending in U.S. Congress, (the UK) and Canadian House of Commons propose making it mandatory for ISPs to retain for 12 months the information the companies collect about their customers and deliver it on demand to law enforcement agencies. This information includes IP addresses, credit-card numbers, and other private data.

ISPs have long been able to record every site you visit and track what you do on those sites. They can and do block access to specific sites.

But only recently has it become practical from a bandwidth and resource perspective for network providers to read all the data in the packets sent from and delivered to their customers’ computers without slowing their networks to a crawl.

North Korea, China, Iran, and other countries routinely use deep packet inspection to block Internet content and keep tabs on their citizens, according to a synopsis on TechCrunch Europe.

(CNET Crave writer Edward Moyer reports on the Tor Project’s attempts to help Iranians overcome that country’s disruption of encrypted data connections.)

The primary sponsor of the Protecting Children from Internet Pornographers Act is House Judiciary chairman Lamar Smith (R-Texas), who also sponsored–and recently pulled–the controversial Stop Online Piracy Act.

While the fate of the proposed legislation is uncertain, many people are rightly concerned about having a record of their Internet activities stored in a huge repository that will likely be the target of data thieves.

The easiest way to cover your Web tracks is to encrypt your data and network connection. The most popular encryption services use a virtual private network.

Free VPN services come with a price

The free HTTPS Everywhere Firefox add-on from the Electronic Frontier Foundation automatically encrypts connections on sites that support the technology. Unfortunately, not all sites support HTTPS, among other limitations.

A more thorough technique for preventing your Web activities from being recorded is to establish a VPN connection. The Tech Support Alert site rates several free VPN services in its guide to anonymous-surfing products.

Topping the list are CyberGhost VPN, ProXPN, and SecurityKiss, the last of which I wrote about in a post from last February.

I tried the free versions of ProXPN and OpenVPN’s Private Tunnel, but the first is too slow (and annoying), and the second gives you only 100MB of data transfers. The paid versions of both products remove these limitations, as you might have guessed.

Quick and simple setup, but painful performance in the free version

It took only a few minutes to install ProXPN and sign up for a free account. Click the red lock icon that appears in the Windows notification area or Mac menu bar to establish an encrypted connection.

Information about the VPN server you’re connecting through is shown when you hover over the green lock icon.

Once your VPN connection is established, hover over the green lock icon to view the IP address and other information about the VPN server you’re linking through.

The free version’s slow 100Kbps maximum transfer speed harkens back to the pre-broadband days of dial-up modems. Also, when you open your browser you have to click through an annoying ProXPN “upgrade now” screen to get to your designated home page.

According to the company’s site, the ProXPN Premium service has “no bandwidth restrictions, all available ports are open, PPTP VPN enabled (in addition to our standard OpenVPN), full access to all proXPN servers world-wide, and port selection.” The premium version costs $10 a month or $50 for six months; the company offers a 7-day free trial.

Not much encryption offered by the free version of OpenVPN’s Private Tunnel

Apart from the 100MB data limit, the open-source Private Tunnel service is a breeze to sign up for and use. But most Internet users will burn through the free version’s data-transfer allotment in a couple of days. As with ProXPN, Private Tunnel places an icon on the desktop that you click to establish an encrypted connection.

Original article

*Update How Long Before VPNs become illegal?

*Free VPN providers should not be trusted outright where a client’s anonymity is concerned. See this article on multi-VPN security also  Which VPN Providers Really Take Anonymity Seriously? (TorrentFreak article)

Read Full Post »

Anti-Forensics is a community dedicated to the research and sharing of methods, tools, and information that can be used to frustrate computer forensic investigations.

Subscribe via RSS or Feedburner RSS (Google tracked) and stay up to date on issues and news of interest for the computer forensics and anti-forensics community.

In a nutshell, anti-computer forensics, in the realm of digital forensics or computer forensics, involves the hiding, destroying, and disguising of data.

A major goal of some anti-forensics software, and the focus of Anti-Forensics.com, is to make the analysis and examination of digital evidence as difficult, confusing, and time consuming as possible.

There are numerous uses of anti-forensic tools and techniques. These methods can be used to protect the privacy and the confidentiality of data. This is especially true with disk encryption and disk and file wiping software. Using software to securely delete or wipe data is a method used by criminals, businesses, government agencies, and many individuals concerned in protecting confidential or private data alike.

The most commonly used anti-forensic methods involve:

  • Data Deletion (Wiping)
  • Network Protocol Encryption
  • Data Encryption
  • Physical Destruction of Digital Media
  • Anonyminity Software and Techniques

Read Full Post »