28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Speakers | |
---|---|
Ruben Bloemgarten |
Schedule | |
---|---|
Day | Day 4 - 2011-12-30 |
Room | Saal 2 |
Start time | 14:00 |
Duration | 00:30 |
Info | |
ID | 4760 |
Event type | Lecture |
Track | Hacking |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
ChokePointProject - Quis custodiet ipsos custodes?
Aggregating and Visualizing (lack of) Transparancy Data in near-realtime
The object of the lecture is to present and discuss the chokepointproject. How it (will) attempt(s) to aggregate and visualize near-realtime global internetwork data and augment this visualisation with legislative, commercial(ownership) and circumvention information.
The goals of the project are as follows:
- Provide a global early warning system against governmental or commercial abuse of internetworking systems in regards to civil and human rights.
- Enforce transparency by aggregating commercial ownership information.
- Enforce transparency by aggregating legislative information, including voting histories.
- Enable lobbyist to influence legislators by providing reliable, verifiable data.
- Provide a public database with near real-time network monitoring data for general use.
- Provide up to date circumvention methodologies, their relative legal status and their potential risks.
The chokepointproject currently consists of two elements :
- A frontend and public database,
- An intended globally distributed network monitoring data collection system.
The frontend intends to provide an easily understandable visualisation of aggregated and processed data-sources. The data-sources intend to provide the following information:
A per country detailed description of: 1a. Network ownership (by IP block and route) 1b. Legislative information such as Which relevant laws are currently active. Who has voted for them (supposing voting was a part of the process). Which relevant laws are currently under review or being proposed. Who are proposing/drafting these laws. 1c. What circumvention methods are currently available for specific problems.
Near real-time network status vitalisations such as, but not restricted to 2a. Connectivity of geographic clusters,
2b. Manipulation of connectivity such as: 2b.1. Traffic shaping, 2b.2. Content filtering, 2b.3. Blackouts.
The intended globally distributed network monitoring data collection system would provide an independent and publicly available dataset. I do not intend to discuss this in depth. The focus of this lecture is supposed to be the front-end and the aggregation of already publicly available data sources, and the supposed benefit to improving civil rights everywhere and protecting them in those places where their functional effectiveness is under threat.