Verified, Tracked, and Visible: a History of The
Total Page:16
File Type:pdf, Size:1020Kb
VERIFIED, TRACKED, AND VISIBLE: A HISTORY OF THE CONFIGURATION OF THE INTERNET USER by CHRISTOPHER J. ST. LOUIS A THESIS Presen ed " #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n an! #e Grad'( e S$#""l "& #e Un)+ers) y "& Oreg"n )n -art)al &'%&)%%*en "& #e re.')remen s &"r #e !egree "& Master "& S$)en$e Sep ember 0123 THESIS APPROVAL PAGE S '!en : C#rist"-#er J. S . L"')s T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#)s #esis #as been ($$ep ed an! (--ro+ed )n -art)al &'%&)%%*en "& #e req')remen s &"r #e Master "& S$)en$e !egree )n #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n by: Peter A%)%'nas C#()rperson B)swaru- Sen Member Tara F)$kle Member an! Sara D. H"!,es In eri* V)$e Pr"+"st an! Dean "& #e Gra!'( e S$#""l Or),)nal (--r"+al s),n( 'res are "n &)%e 5) # #e Un)+ers) y "& Oreg"n Grad'( e S$#""l. Degree (5arded Sep ember 0123. ii 6 0123 C#r)s "-#er J. S . L"')s SO/E RIGHTS RESERVED T#)s 5"r4 )s %)$ense! 'n!er ( Cre( )+e C"**"ns Attribution-ShareAlike 4.0 International License # -s:77$re( )+e$"**"ns."r,7%)$enses7by8s(79.17 iii THESIS ABSTRACT Chr)st"-#er J. S . L"')s Master "& S$)en$e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n Sep ember 0123 T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#e &),'re "& #e 'ser )s "& en "+erlo"ked )n In ernet #)st"r)es, 5#)$# &re.'en ly &"$'s "n %arger reat*en s "& )n&rastru$ 're, ,"+ernan$e, "r *(:"r $"n r)b' )"ns "& spec)&)$ )n!)+)!'als. T#)s #es)s $"nstru$ s a -#)%"so-#)$al an! )!e"%",)$al #)st"ry "& #e In ernet 'ser an! ex(*)nes #"5 #( &),'re #as $#an,ed #"',# #e ev"%' )"n "& #e In ernet. Beg)nn)n, 5) # #e <eb 0.1 -arad),* )n #e early 0111s, a ,ro5)n, st( e an! $"rp"rate )n erest )n #e In ernet -ro!'$e! substan )al $#an,es " #e stru$ 're an! %",)$ "& #e In ernet #( sa5 #e 'ser be)n, -%($ed )n$reas)n,ly ( #e -eri-#ery "& "n%)ne sp($e as #e "bjec "& st( e surveillan$e "r beh(+)"ral ra$4)n,. T#e #ree $ase st'!)es )n #)s #es)s )n+est),( e #e $"*b)n( )"n "& ec#n"%",)$al $"nstra)n s an! !)sc'rsi+e strateg)es 5#)$# #(+e ()!ed )n s#(-)n, #e $"n em-"rary 'ser &ro* ($ )+e ar$#) ec "& #e In ernet ) sel& " -assi+e, )!eal $"nsu*er "& -redeterm)ne! "n%)ne ex-erien$es. iv CURRICULUM VITAE NAME OF AUTHOR: C#rist"-#er J. S . L"')s GRADUATE AND UNDERGRADUATE SCHOOLS ATTENDED: Un)+ersi y "& Ore,"n, E',ene, OR Un)+ersi y "& T"ky", B'nky"84', T"ky", J(-an S"' #ern Oreg"n Un)+ersi y DEGREES A<ARDED: Master "& S$)en$e, Me!)a S '!)es, 0123, Un)+ers) y "& Oreg"n Master "& Arts an! S$)en$es, In&"rm( )"n S '!)es, 0129, Un)+ersi y "& T"ky" B($#el"r "& Arts, En,%)s#, 011=, S"' #ern Ore,"n Un)+ers) y AREAS OF SPECIAL INTEREST: In ernet S '!)es Med)a H)st"ries S$)en$e an! Te$#n"%",y S '!)es PROFESSIONAL EXPERIENCE: D()ly O-erat)"ns /an(,er, In+en 're In$., Jan. 012? " Sep . 012? Con en /an(,er, @A an! Cust"*er Care Lead, F"%)'* Partners In$., O$ . 0121 " A-r. 0120 v ACKNO<LEDG/ENTS I 5"'%! %)4e " #(n4 *y #es)s $"**) ee *e*bers Drs. B)s5(r'- Sen (n! T(r( F)$4%e &"r #e)r $"**en s (n! (!+)$e 5#en I 5(s )n #e -%(nn)n, (n! -r"-"s(% s (,es "& #)s -r":e$ , (n! es-e$)(%%y &"r #e)r !e ()%e! &ee!b($4 "5(r!s &' 're -"ss)b)%) )es &"r #)s 5"r4 ( #e !e&ense. I (* +ery ,r( e&'% " *y (!+)ser (n! $"**) ee $#()r, Dr. Pe er A%)%'n(s, &"r #e%-)n, " s eer *e #r"',# #)s 5#"%e -r":e$ : &"r ser+)n, (s ( s"'n!)n, b"(r! (s I r)e! "' ne5 )!e(s, &"r en$"'r(,)n, *e " s )$4 5) # #e ,""! )!e(s 5#en I #(! se$"n! #"',# s, (n! &"r 4ee-)n, *e "n r($4 5#en #e 5r) )n, -r"$ess #re( ene! " "+er5#e%*. vi T" He( #er (n! H(Ae%, 5#" $"n )n'(%%y re*)n!e! *e 5#y I 5(s !")n, #)s 5#en I #(! r"'b%e re*e*ber)n,. vii TABLE OF CONTENTS Ch(- er Pa,e I. INTRODUCTION: <HENCE THE INTERNET USERB.................................... 2 In ernet H)st"ries........................................................................................ 2 Tra$4)n, #e H)st"ry "& #e User................................................................. 0 Def)n)n, CUser”........................................................................................... ? Case S '!)es................................................................................................ E II. LITERATURE REVIE<................................................................................. = In ro!'$ )"n................................................................................................ = Creat)n, #e User........................................................................................ 21 In #e V)rt'al C"**'n) y........................................................................... 23 Co**"!)&y)n, #e User: <eb 0.1 an! #e Cal)&"rn)an Ideo%",y................. 02 <( $#)n, #e User: S'rvei%lan$e Cap) (%)sm an! #e Post8User In ernet....................................................................................... 0? Con$%'si"n.................................................................................................. 0F III. METHODOLOGY......................................................................................... G1 Rea!)n, In ernet H)st"ries.......................................................................... G1 <eb S"'rces an! Arc#)+al Problems........................................................... G2 D)sc"'rses "& #e User................................................................................. G? viii Ch(- er Pa,e IV. CASE STUDY I: THE USER IS VERIFIED—AUTHENTICATING LEGITIMATE USERS UNDER MICROSOFT <INDO<S XP......................... GF In ro!'$ )"n................................................................................................ GF T#e H)st"ry "& <)n!"5s Pro!'$ A$ )+( )"n............................................... 92 User Rea$ )"ns " Pro!'$ A$ )+( )"n.......................................................... 9F T#e Ban(%) y "& Ver)&)$( )"n........................................................................ ?0 Con$%'si"n.................................................................................................. ?F V. CASE STUDY II: THE USER IS TRACKED—ONLINE ADVERTISING AND ADBLOCK PLUS.................................................................................. E1 In ro!'$ )"n................................................................................................ E1 A Brief H)st"ry "& A!+ert)sin, On%)ne.......................................................... E9 T#e User )s A%5ays Trac4ed........................................................................ EF A!b%"$4)n, an! #e E*-"5ere! User......................................................... 3G T#e B( le "+er A!b%"$4)n,......................................................................... 3E A$$ep able A!s............................................................................................ 3= Ob%),( "ry A!s............................................................................................ F9 Con$%'si"n.................................................................................................. FF VI. CASE STUDY III: THE USER IS VISIBLE—THE KILTON PUBLIC LIBRARY AND THE TOR ANONYMITY NET<ORK.................................... =2 In ro!'$ )"n................................................................................................ =2 A Brief H)st"ry "& T"r.................................................................................. =0 T#e K)% "n Pub%)$ L)brary............................................................................ =E ix Ch(- er Pa,e Cri*)n(%)A)n, An"ny*) y............................................................................ 211 Con$%'si"n.................................................................................................. 213 VII. CONCLUSION............................................................................................ 21= One /"re E;(*-le..................................................................................... 21= Con$%'si"ns................................................................................................. 220 T#e"riA)n, #e User..................................................................................... 22G REFERENCES CITED........................................................................................ 22E x CHAPTER I INTRODUCTION: WHENCE THE INTERNET USER? Internet Histories Histories of the Internet—and of personal o!p"tin# in #eneral—tend to approa h their su$ject fro! one of t&o parti "lar an#les. The first is a fo "s pri!arily on the te hnolo#i al aspects: the proto ols, standards, and ph(si al ad*an es &hi h have enabled the easeless a eleration of information and o!!"ni ations te hnolo#( o*er the past +, (ears. The second an#le is $i$lio#raphi al, sit"atin# the te hnolo#i al &ithin the lifespan and ac o!plish!ents of an i!portant fi#"re in the su ess of the Internet' The $i$lio#raphi al &orks either restate kno&n i!portant ontri$"tions or attempt a sort of reclamation of the histori al re ord $( hitherto "nkno&n fi#"res; in either ase, they take on a ha#io#raphi note &hi h &rites the su$je t larger than life, representin# it as an absolutely indispensable agent &itho"t &ho! o!p"tin# today &o"ld not exist' So!e of the !ost ex ellent histories—Janet A$$ate’s Inventing the Internet and Steven 2ev(1s Hackers: Heroes of the Computer Revolution $ein# t&o examples—are a !i/ of the t&o approaches, $"t *ery rarely do #eneral histories have as their fo "s one of the !ost riti al o!ponents to the su ess of the Internet) perhaps even !ore so than all of the te hnolo#i al ad*an es: the fi#"re of the "ser. Users of the Internet) in the sense of *ario"s