Download and 2 Mbps of Upload

Total Page:16

File Type:pdf, Size:1020Kb

Download and 2 Mbps of Upload American University Washington, D.C. 20016 © COPYRIGHT by Fernanda R. Rosa 2019 ALL RIGHTS RESERVED To Dona Flor. GLOBAL INTERNET INTERCONNECTION INFRASTRUCTURE: MATERIALITY, CONCEALMENT, AND SURVEILLANCE IN CONTEMPORARY COMMUNICATION BY Fernanda R. Rosa ABSTRACT This dissertation addresses the inherent social and political impacts engendered by the materiality of the internet and the societal dynamics of infrastructure. With a focus on the information circulation infrastructure of the internet, this is a study of internet governance and design. Specifically, this dissertation makes a first effort in internet governance scholarship to examine governance by internet exchange points (IXPs). It aims to illuminate sociotechnical aspects of IXPs, and reveal the controversies behind them and the social, political, and public values at stake. For that, the research focuses on the significance of IXPs in terms of three pathways: the rights’ vectors of interconnection deployment, the infrastructural interdependencies between the global North and global South, and the search for bodies in the making of surveillance through internet infrastructure. Guided by science and technology studies (STS) and actor network theory (ANT) as methods to unveil power relations in loco, and decolonial and feminist studies to build on epistemologies of the South, this dissertation uses qualitative methods, such as ethnography of infrastructure and code ethnography, to investigate primary data, along with quantitative methods to analyze secondary data. The methods involve the analysis of 1) the merging of four IXPs datasets; 2) Border Gateway Protocol (BGP) data of the largest IXP in the global South, ii IX.br São Paulo; and in the global North, DE-CIX Frankfurt; and 3) ethnographic data collected in Brazil, Germany and Mexico. The contributions are made along six chapters. In Chapter 1, previous works on IXPs in network engineering are examined, and the dissertation’s theoretical framework, methodology and methods are presented. Chapter 2 shows how Tseltal and Zapoteco communities, in Oaxaca and Chiapas, Mexico, are infrastructuring their wireless networks to reach the larger internet, and how the very moment of network interconnection becomes key to understanding the role of internet infrastructure to challenge and co-produce societal values. Chapter 3 examines the development of the first IXP in Mexico City and reveals how the narrative of potential social benefits from an IXP are not realized in a market of low telecommunications and internet competition. Consequently, it exposes the resultant disparity and lost link between an IXP embedded in commercial values and the need for internet access by indigenous communities, distant, not only territorially, from that IXP. In Chapters 4 and 5, the global North and the global South are analyzed symmetrically in the IXP ecosystem, in order to make visible both the consistent concealment of the South in the study of internet infrastructure and how illuminating its role leverages our public understanding of internet interconnection politics. Specifically, these chapters rebut the paradigm of “free flow” of information revealing that, instead, the internet is marked by a one-way flow in which giant IXPs in the North benefit from both their common interests with big content delivery networks and the lack of infrastructural resources in the South. Finally, Chapter 6 explores how an IXP becomes an instrument of state surveillance by showing the dynamics of the German state to collect data through DE-CIX, exploiting the design affordances of this giant IXP. By unveiling a case that makes explicit the manufacturing of the iii “turn to infrastructure to control information” involving public and private actors, the chapter problematizes the extraterritorial effects of a global North country jurisdiction. It also reframes data packets to be conceptually understood as potential information and the virtualization of our bodies that traverse the information circulation infrastructure of the internet attracting the interest of opportunistic actors. The conclusions make recommendations and suggestions for future studies. This dissertation moves IXPs to a different “mode of existence,” beyond the ones sustained by network engineering scholarship. It touches on key and urgent contemporaneous communication issues, and seek to bring theoretical, empirical and methodological contributions to internet governance policy and scholarship. iv ACKNOWLEDGMENTS There are many, both human and non-human, to whom I am grateful during this Ph.D. journey. This dissertation would not be conceived as it is without the inspiring discussions focused on media, technology and democracy that professors, students and colleagues engendered at American University’s School of Communication (SOC) classes and workshops, and the Internet Governance Lab events. At AU, I am especially grateful to Patricia Aufderheide and Kathryn Montgomery for their wisdom and mentorship; to Ericka Menchen-Trevino, Filippo Trevisan and Malini Ranganathan for helping me to envision the future; to Derrick Jefferson and the AU library system—incredible fellows, to Jean McGee for knowing everything, and to Teal Wrocklage for being always attentive to our needs at SOC. Ideas are just ideas if they are not cultivated. I would not conduct this research without the support and guidance of Laura DeNardis. Beyond her scholarship, her motivating feedback and her respect for my background, choices and passion was the fuel that I needed along the process. In-person and remote meetings, e-mails soon after my voice messages, and letters of recommendations always delivered on time, no matter what, were indications that I was never alone and that I should “keep going,” as she used to say. I am also grateful to Aram Sinnreich, with whom I worked as research assistant, teaching assistant, shared panels, and from whom I learned a lot. Nanette S. Levinson and Virgilio Almeida gave me the privilege to work with them and were inspirations during the whole path. Ethnography research is not only exciting, but it is dependent on numerous resources and supporters. I am grateful for the American University Doctoral Student Research Award in 2017, the Google Policy Fellowship in 2017, and Columbia University’s School of International and Public Affairs and Carnegie Corporation of New York Research Award in 2016 and 2017. Also, v during my field research, I had the privilege to get to know many fantastic people infrastructuring the internet. For their invaluable support, I thank especially Alvaro Arroyo, Francisco Badaró, Hans Ludwing Reyes Chávez, Tiago Gonçalves, Humberto Morales, Felipe de Jesús Santos Salazar and Acaxao Tecnología’s team, and Julio Sirota and for their time, patience and interest in person as well as through continuous conversations on WhatsApp, which facilitated greatly this research work. In the field, I cannot say thanks enough to Thiago Bomfim and PoP-BA’s team, Carlos Casasús and IX.mx’s team, Hartmut Richard Glaser and NIC.br’s team, Mariano Gómez and Colectivo Ik'taK'op’s team, Osvaldo Martínez, Joaquin Yescas Martínez, Dennis Jair Mendonza and Antonio Moreiras and IX.br’s team. Thanks also to Klaus Landefeld and Thomas King from DE-CIX and team for pivotal conversations, and Jon Hjembo, from Telegeography, Arnold Nipper from PeeringDB and Bill Woodcock and PCH’s team for timely support. For sharing their knowledge and also introducing me to key people, I thank Alexandre Barbosa, Peter Bloom and Rizhomatica’s team, Loreto Bravo (Maca), Jane Coffin, Néyder Darín, Vagner Diniz, Luiz Fernando García and R3D’s team, Erick Huerta, Francesca Musiani, Alejandra Carrillo Olano (Janis) and Hugo Zylberberg. Thanks also to Gato Viejo and all the participants of the worskhop “Charlas con el Diablo” at Rancho Electrónico for the learning and motivation. For contributing with their expertise, professionalism and generosity, I thank Carolina Israel, Daniel Ribeiro and Carol, Diego De la Selva, and Patricia Harriman. Diego was responsible for making the German language more accessible to me beyond Google Translate, and Patricia was the first to read this dissertation and make sure it was as clear and accessible as possible, keeping the influences of my Portuguese native language under control. vi A special thanks to Zuleika Arashiro, Gustavo Azenha, Marcela Bauer, Juliana Coelho, Emiliano, Carlos Freire and Gabi, Luísa Abbott Galvão, María Elena González, Marcia Heigasi, Olga Khrustaleva, Dennis and Leta Kopp, Eliza Kwon, Fabio Lyra, María Luisa Morales, Laura Moutinho and Paulo, Paula Orlando, Patricia Pavanelli and Marcel, Thais Piffer, Juliana Moraes Pinheiro, Fernanda Prado, Maria Teresa Rocco, Leonardo Rocha, Caroline Sampaio, Agneris Sampieri, Ada Siqueira, Glaucia Peres da Silva, Laura Tresca, Mauren Turcatel and Rodrigo, and Diego Vicentin, Lili and Tomás for their incredible support during this journey. Friends from the Rede de Pesquisa em Governança da Internet and the Brazilians for Democracy and Social Justice were true sources of inspiration during the whole time. Thanks also to Mauricio Acuña, Ana Cristina Baldrez and Moacir, Fatima Batista, Ully Busoni, Carlos Carvalho, Marcia Cavallari, Daniella Diniz, eLNebu, Mauricio Garcia, Malu Giani, María Alvarez Malvido, Andrea Melloni, Telmila Moura, Vera Ligia Toledo and Gildardo Juárez Vega. I could not forget how grateful I am to all my public-school teachers and university professors who taught me the most fundamental things
Recommended publications
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Electronic Security Squadron
    6915th ELECTRONIC SECURITY SQUADRON USAFSS turned over Hof Air Station, Germany, to the United States Air Forces in Europe (USAFE) and inactivated the 6915 SS. 1971 6915th Hof , West Germany (Closed 1971) 6915th ESS Bad Aibling, Ger. 1 Aug '79-30 Sept '93 LINEAGE STATIONS Bad Aibling Station, West Germany ASSIGNMENTS COMMANDERS LTC Arthur R. Marshall HONORS Service Streamers Campaign Streamers Armed Forces Expeditionary Streamers Decorations EMBLEM EMBLEM SIGNIFICANCE MOTTO NICKNAME OPERATIONS The 6915th Electronic Security Squadron is located at Bad Aibling Station, West Germany, in the heart of Bavaria, 35 miles southeast of Munich. The 6915th is a tenant unit, as Bad Aibling Station is "owned" by the Department of Defense. All facets of life on station are joint service. The 6915th enjoys a good relationship with the other services, both on the job and in the community. The mission is a challenging one with electronic equipment that is on the leading edge of technology. All work spaces are new or recently renovated and there are several new facility upgrades projected over the next years. In any workplace except the orderly room, a member's supervisor and coworkers could be Army, Navy, Air Force or civilian, making for a unique and interesting work environment. Although Bad Aibling Station is a small community, 6915th members enjoy a wide range of off duty activities. BAS has the full compliment of sports and leisure facilities with skiing, sight seeing, local German fests and many other outdoor activities offered off-station most of the year. In September 1987, the 6915th hosted their first Air Force Dining-Out.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Interconnection
    Interconnection 101 As cloud usage takes off, data production grows exponentially, content pushes closer to the edge, and end users demand data and applications at all hours from all locations, the ability to connect with a wide variety of players becomes ever more important. This report introduces interconnection, its key players and busi- ness models, and trends that could affect interconnection going forward. KEY FINDINGS Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charging for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Competition is increasing, however, and competitors are starting the long process of creating network-dense sites. At the same time, these sites are valuable and are being acquired, so the sector is consolidating. Having facili- ties in multiple markets does seem to provide some competitive advantage, particularly if the facilities are similar in look and feel and customers can monitor them all from a single portal and have them on the same contract. Mobility, the Internet of Things, services such as SaaS and IaaS (cloud), and content delivery all depend on net- work performance. In many cases, a key way to improve network performance is to push content, processing and peering closer to the edge of the Internet. This is likely to drive demand for facilities in smaller markets that offer interconnection options. We also see these trends continuing to drive demand for interconnection facilities in the larger markets as well. © 2015 451 RESEARCH, LLC AND/OR ITS AFFILIATES.
    [Show full text]
  • Société, Information Et Nouvelles Technologies: Le Cas De La Grande
    Société, information et nouvelles technologies : le cas de la Grande-Bretagne Jacqueline Colnel To cite this version: Jacqueline Colnel. Société, information et nouvelles technologies : le cas de la Grande-Bretagne. Sciences de l’information et de la communication. Université de la Sorbonne nouvelle - Paris III, 2009. Français. NNT : 2009PA030015. tel-01356701 HAL Id: tel-01356701 https://tel.archives-ouvertes.fr/tel-01356701 Submitted on 26 Aug 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE SORBONNE NOUVELLE – PARIS 3 UFR du Monde Anglophone THESE DE DOCTORAT Discipline : Etudes du monde anglophone AUTEUR Jacqueline Colnel SOCIETE, INFORMATION ET NOUVELLES TECHNOLOGIES : LE CAS DE LA GRANDE-BRETAGNE Thèse dirigée par Monsieur Jean-Claude SERGEANT Soutenue le 14 février 2009 JURY : Mme Renée Dickason M. Michel Lemosse M. Michaël Palmer 1 REMERCIEMENTS Je remercie vivement Monsieur le Professeur Jean-Claude SERGEANT, mon directeur de thèse, qui a accepté de diriger mes recherches, m’a guidée et m’a prodigué ses précieux conseils avec bienveillance tout au long de ces années avec beaucoup de disponibilité. Mes remerciements vont aussi à ma famille et à mes amis qui m’ont beaucoup soutenue pendant cettre entreprise.
    [Show full text]
  • A Vital Part of the Critical National Infrastructure Version
    Telecommunications Networks – a vital part of the Critical National Infrastructure Version 1.0 The Essentials of Telecommunications - an introduction Version 1.0 1 Telecommunications Networks – A Vital Part of the Critical National Infrastructure CONTENTS page no Executive Summary 3 Introduction 4 Chapter 1: The Nature of UK Telecommunications Networks - Describes the nature of the UK telecommunications networks. If you are familiar with telecommunications, you may want to skip straight to Chapter 2. 5 Chapter 2: Types of Telecommunications Companies in the UK - Describes the commercial environment and the wide variety of telecommunications providers in the market, which collectively make up the ‘UK Network’. 14 Chapter 3: Threats to Continuity of Service - Describes the wide range of threats to the continuity of service over the UK networks. 16 Chapter 4: Resilience measures taken by telecommunications companies- Covers the typical measures taken by the network companies to meet the challenges posed by these threats and mentions some of the remaining residual problems. 18 Chapter 5: Statutory provisions concerning telecommunications resilience - Telecommunications is now a competitive private sector activity, there are a range of statutory provisions that touch on the government’s ability to assure the resilience of the UK networks and these are described in Chapter 5. 21 Chapter 6: Roles of Government departments, the regulator and other agencies - Sets out the roles and responsibilities of the various government departments, the regulator (Ofcom) and other agencies, describing how in practice they work together as an extended team in assuring resilience. 27 Chapter 7: Emergency Plans and response measures - Covers the present arrangements in the telecommunications sector which ensure that industry and government work effectively together in emergencies and other times of stress.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • From U.S. Army Installation to Zero Energy Community: the B&O Bad
    © 2014 ASHRAE (www.ashrae.org). Published in ASHRAE Transactions, Volume 120, Part 1. For personal use only. Additional reproduction, distribution, or transmission in either print or digital form is not permitted without ASHRAE's prior written permission. NY-14-016 From U.S. Army Installation to Zero Energy Community: The B&O Bad Aibling Park Looks to the Future Alfred Kerschberger, PhD Ernst Boehm, PhD ABSTRACT personnel and their families lived and worked at the base. Typ- ical for an American base, the park-like site was largely self- The B&O Bad Aibling Park, located in Bavaria, sufficient. An oil-fired district heating station supplied the Germany, occupies a 173-acre (70 ha) facility that originally buildings at the site with 66,536 MBtu/h (19.5 MW) of heat. served as an airbase.Although the site buildings were in good After the end of the Cold War and the shift in eastern/western repair, their thermal quality was poor. The district heating bloc borders, the base lost its importance, and in 2004 it was system was in good condition, but the scale of heat generation returned to the Federal Republic of Germany. In 2006, the was too large. This project described in this paper designed B&O real estate management and construction company a development plan that could be easily replicated and that acquired the grounds for high-quality development. could ultimately become a model for a zero energy city. The B&O Bad Aibling Park project employed a rich diversity of When the Bad Aibling Station was taken over from technologies that may be scaled up for application in larger the American Army, its 52 building complexes contained urban areas.
    [Show full text]
  • 8 March 2018, Dubai Pre-Event: Subsea Middle East Summit & 5 March Welcome Evening Reception
    Middle East 2018 6 - 8 March 2018, Dubai Pre-Event: Subsea Middle East Summit & 5 March Welcome Evening Reception THANK YOU TO THE SPONSORS: HOST SPONSOR DIAMOND SPONSOR PLATINUM SPONSORS tawasul telecom ITW Logo Bold & Bigger GOLD SPONSORS SILVER SPONSORS ASSOCIATE SPONSORS 1587 450 ATTENDEES ORGANISATIONS 52% 80 C-LEVEL, PRESIDENT, VP, COUNTRIES REPRESENTED SVP, EVP, DIRECTOR & HEAD 54 128 INDUSTRY LEADING SPEAKERS NEW COMPANIES COUNTRIES IN ATTENDANCE AFGHANISTAN CZECH REPUBLIC ISRAEL NEPAL SOMALIA ALBANIA DJIBOUTI ITALY NETHERLANDS SOUTH AFRICA ARMENIA EGYPT JAPAN NEW ZEALAND SPAIN AUSTRALIA ESPANA JORDAN NORWAY SRI LANKA AUSTRIA ESTONIA KAZAKHSTAN OMAN SUDAN BAHRAIN FRANCE KENYA PAKISTAN SWEDEN BANGLADESH GERMANY KUWAIT PALESTINE SWITZERLAND BELGIUM GREECE KYRGYZSTAN POLAND TURKEY BERMUDA GUINEA LATVIA PORTUGAL UKRAINE BOSNIA AND HONG KONG LEBANON QATAR UNITED ARAB HERZEGOVINA HUNGARY LITHUANIA ROMANIA EMIRATES BRAZIL INDIA LUXEMBOURG RUSSIA UNITED KINGDOM BULGARIA INDONESIA MALAYSIA SAUDI ARABIA UNITED STATES CAMEROON IRAN MALTA SERBIA USA CANADA IRAQ MAURITIUS SINGAPORE UZBEKISTAN CHINA IRELAND MOROCCO SLOVENIA YEMEN CYPRUS WHAT SOME OF THE ATTENDEES HAD TO SAY “Capacity Middle East is one of the key events in the calendar. The attendance level is always very good in both num- “We are here at Capacity Middle East ber and seniority and it’s a great place as usual to meet our customers - the to be” old ones and the new” Ivan Botta Carl Roberts CEO CCO ENTER SRL EPSILON TELECOMMUNICATIONS “Capacity Middle East offers a great platform to meet with our clients. It’s a great opportuni- ty to meet a lot of new partners and connec- tions and grow the business.
    [Show full text]
  • Information Awareness Office
    Article Talk Read Edit View history Search Wikipedia Wiki Loves Monuments: Photograph a monument, help Wikipedia and win! Learn more Main page Contents Featured content Information Awareness Office Current events From Wikipedia, the free encyclopedia Random article Donate to Wikipedia The Information Awareness Wikipedia store Office (IAO) was established by the Interaction United States Defense Advanced Help Research Projects Agency About Wikipedia (DARPA) in January 2002 to bring Community portal together several DARPA projects Recent changes focused on applying surveillance Contact page and information technology to track Tools and monitor terrorists and other What links here asymmetric threats to U.S. national Related changes security by achieving "Total Upload file Information Awareness" Special pages (TIA).[4][5][6] Permanent link [1][2] Page information This was achieved by creating Information Awareness Office seal (motto: lat. scientia est potentia – knowledge is Wikidata item enormous computer databases to power[3]) Cite this page gather and store the personal information of everyone in the Print/export Part of a series on United States, including personal e- Create a book Global surveillance Download as PDF mails, social networks, credit card Printable version records, phone calls, medical records, and numerous other sources, without Languages any requirement for a search Català warrant.[7] This information was then Disclosures Deutsch Origins · Pre-2013 · 2013–present · Reactions analyzed to look for suspicious Français Systems activities, connections between Italiano XKeyscore · PRISM · ECHELON · Carnivore · [8] Suomi individuals, and "threats". Dishfire · Stone Ghost · Tempora · Frenchelon Svenska Additionally, the program included · Fairview · MYSTIC · DCSN · Edit links funding for biometric surveillance Boundless Informant · Bullrun · Pinwale · Stingray · SORM · RAMPART-A technologies that could identify and Agencies track individuals using surveillance NSA · BND · CNI · ASIO · DGSE · Five Eyes · [8] cameras, and other methods.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • UK Broadband Speeds, May 2010: Research Report
    UK Broadband Speeds, May 2010: Research report w. UK broadband speeds, May 2010 The performance of fixed-line broadband delivered to UK residential consumers Research Report Publication date: 27 July 2010 UK Broadband Speeds, May 2010: Research report Contents Section Page Using this report 2 1 Executive summary 5 2 Introduction 9 3 Objectives and methodology 15 4 Overview of broadband speeds 19 5 Variation of speeds by geographical location 33 6 Variation of speeds by time of day 40 7 Variation of speeds by access technology 44 8 Variation of speeds by internet service provider (ISP) package 48 9 Other metrics affecting performance 74 10 Conclusion and next steps 84 Annex Page 1 Glossary 86 2 Technical methodology 89 3 Statistical methodology 92 4 Significance testing 102 1 UK Broadband Speeds, May 2010: Research report Using this report Purpose of this report In order to understand the performance of UK fixed-line residential broadband connections, we commissioned research to identify the average actual download throughput speeds that they deliver, along with a number of other metrics, which determine the consumer experience of using broadband services. This report builds on the first round of research conducted between October 2008 and April 2009 and published in reports of January 2009 and July 20091 and sets out our findings for the first month of data collection (May 2010) from this second phase of research. The current research will continue until April 2012, and we expect to publish further reports at roughly six-monthly intervals. The results provide extremely useful insights into the factors that affect and determine broadband performance, but with the following limitations: • The information presented in this report relates to broadband speeds and other performance measures such as upload speeds, latency, jitter, etc.
    [Show full text]