How Improved Surveillance Tech Could Affect Your Privacy In The Future

How Improved Surveillance Tech Could Affect Your Privacy In The Future

Technology improves. It’s something we know instinctively, but we typically don’t give much thought to how much and how quickly security and surveillance tech is advancing. Ars Technica has a deep look at just that, and its disconcerting implications on the real world.

The most advanced surveillance technology is made possible by deep packet inspection (DPI), which can gather data about specific users’ online activities. It does this by closely monitoring or capturing the data that passes through a given network, at times by the petabyte.

How does this affect you? Some time soon, you won’t be able to escape the deep data scrapes. “There’s no question that within the next three to five years, not having a copy of your network data will be as strange as not having a firewall,” the CEO of Bivio Networks, a leading firm working with DPI technology, told Ars Technica.

DPI is used for everything from marketing to piracy detection — although US provider Comcast was shut down by authorities over the issue. Here’s a specific example of how it works in real life:

One frequent activity that Splunk has helped the University automate is processing Digital Millennium Copyright Act takedown notices after a student is discovered hosting pirated content on sites hosted from their own computers or over BitTorrent streams. “We needed an automated, instant way of locking those down,” Maszeroski said. Data brought into Splunk can be used to perform a search for BitTorrent traffic and allows it to be identified by MAC address; the University’s information security office has built a Java application that uses Splunk’s Web API to find the offending MAC address and then “cut the person off at a switch or wireless level.”

If you’re interested in how your online day-to-days will be monitored going forward, and just how breathtaking in scope it can be, you should definitely check out the full piece over at Ars. [Ars Technica]

Image: Tischenko Irina/Shutterstock