- Autonomous System Number (ASN)
- An Autonomous System Number (ASN) is a uniquely assigned number of an Autonomous System (AS), which is a collection of connected Internet Protocol (IP) routing prefixes under the control of network operator(s) with a common, clearly-defined, internet routing policy. ASNs are important because they uniquely identify each network and hence ISP/carrier on the Internet. For more, see Autonomous System.
- Boomerang Routing
- Boomerang routing refers to internet routing where a data path starts and ends in the same country (e.g. Canada) but passes through another country (e.g. the US) before returning. This is a common occurrence with Canadian internet communication.
- "Collect it all"
- In response to the 9/11 attacks, the NSA and its Five Eyes partners, adopted what NSA Director Gen. Keith Alexander called a "collect it all" approach to foreign and domestic surveillance, often without legal authority. This is reflected in both the Upstream as well as PRISM internet surveillance programs, as well as the bulk collection of personal information routinely produced in many other areas of everyday activity - banking, telephone calling, shopping, travelling,... Video: "Collect It All: America's Surveillance State Lines" Reference: Greenwald, 2013, 2014.
- Five Eyes
- Five Eyes is an alliance for sharing intelligence between Australia, Canada, New Zealand, the United Kingdom and the United States based on the UKUSA multilateral cooperation agreement. For more, see Five Eyes.
- Geoprecision
- IXmaps uses the term geoprecision to describe the level of precision and accuracy in geolocating an IP address, i.e. pinpointing the physical location of its corresponding router. If geoprecision is to 'building level,' we are saying with some confidence that the router is located within a specific building. If geoprecision is to 'city level,' we are only confident that our geolocation is accurate to a city. If geoprecision is 'maxmind,' we are relying on Maxmind's geolocation, which is often not reliable for core internet routers. We encourage users who believe a router is not correctly located to Flag the router and suggest a more accurate location.
- Hop
- A hop represents one portion of the path between a communication source and its destination. As data is transmitted along a path it passes through routers and other devices. Each device passing data to the next constitutes a hop. For more, see Hop.
- Hostname
- An internet hostname is a human-readable nickname that corresponds to the IP address of a device connected to a network (e.g. ixmaps.ca). Hostnames appear as a component in Uniform Resource Locators (URLs) for internet resources such as web sites (e.g.
https://ixmaps.ca
). For more, see Hostname.
- Internet
- The internet is the global system of interconnectedcomputer networks that share common rules or protocols for linking devices worldwide, passing data between networks, and delivering it to the intended destinations. Mainly, the internet physically consists of high capacity fibreoptic cables connected to each other via routers located in internet switching centres or exchanges. For more, see Internet.
- Internet Service Provider (ISP) or Carrier
- An internet service provider (ISP) or carrier, is a telecommunication company that offers various internet communications services, including access to the internet. ISPs, by necessity, have access to all the personal information they handle, and under Canadian law have privacy responsibilities. They are also subject to requests for access to this information from intelligence and law enforcement agencies, as well as other third parties such as copyright holders. For more, see Internet Service Provider.
- Internet Exchange or Switching Site
- An internet exchange or switching site is physical infrastructure through which ISPs or carriers exchange internet traffic between their networks. Typically located in large buildings in the centre of major cities, they are connected with other exchanges by high-speed fibre optic cables. They also provide connections for local internet services and subscribers. For more, see Internet Exchange Point.
- IP Address
- An Internet Protocol address (IP address) is a numerical label assigned to each device communicating on a computer network. IP addresses are used for interface identification and location addressing. They are often displayed as a series of numbers separated by a “.” or “:” (e.g. the IP address for ixmaps.ca site is 128.100.72.189. For more, see IP address.
- Latency
- In networks, latency refers to the length of time or delay, usually measured in milliseconds (ms), it takes for data to travel between two points in a network (including the internet). A low latency connection features short delay times, while a high latency connection suffers from long delays. Operating systems have software programs that measure latency, including ping and traceroute. Tracerouting programs often send multiple packets to the same IP address in an attempt to correct for random variations. Minimum latency refers to the length of time that the fastest packet took to reach a node and return. For more, see Network Latency.
- Metadata
- Literally 'data about data,' metadata is conventionally presented as 'outside of the envelope' information, such as the from, to, time and location of a communication, but can also effectively include anything that computers can derive from message content. Even in its basic form, metadata can be very revealing of sensitive aspects a person's activities, so is highly valued by surveillance agencies making it controversial for civil liberties advocates. Reference: Clement, Harkness & Raine, 2016. For more, see Metadata.
- National Security Agency (NSA)
- The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare. For more, see National Security Agency.
- NSA interception facilities
- As part of its Upstream programs, the NSA has installed interception facilities in major internet exchanges across the U.S. as well as around the world. Technically, these consist of signal “splitters” spliced into fibre optic cables which replicate all traffic passing through the cable. This mirrored data is sent to deep packet inspection computers that examine the data and selectively route it back to NSA data centres for further analysis and storage. Where access to internet exchanges is not feasible, the NSA can intercept traffic along the cables connecting internet exchanges, even transoceanic submarine cables. Reference: Klein, 2009, p.98; Bamford, 2008. See FAQs: What is NSA mass surveillance? How do we know where the NSA can intercept my data?
- Network sovereignty
- Network sovereignty is the concept of national sovereignty applied to communications and other networks. It draws directly from the longstanding recognition that nation states have the right and duty to exercise superordinate control within their borders over all matters pertaining to the public good and to negotiate with other states on the basis of equality. In the internet context, it refers to the ability of a nation to exercise effective control over its own critical internet infrastructure. While it can serve a wide variety of national aims, when consistent with international human rights law and the integrity of the internet as a unified open global communication medium, network sovereignty can contribute to protecting privacy, promoting more efficient routing and producing economic benefits. Reference: Clement, 2017. For more, see network sovereignty.
- Packet (or Data Packet)
- All internet communication involves packets; every web page you view arrives as a series of packets and every email you send leaves as a series of packets. A data packet is typically forwarded from one router to another in a series of "hops" through the networks that constitute the internet until it reaches its destination. In order to recreate the original message, packets are re-assembled at the destination. For more, see Network Packet.
- PRISM surveillance program
- PRISM is a clandestine surveillance program under which the NSA collects internet communications from at least nine major U.S. internet companies–Microsoft, Yahoo, Google, Facebook, Paltalk, YouTube, Skype, AOL and Apple. For more, see PRISM.
- Router
- A router is a physical device that forwards data packets across and between computer networks. Routers direct traffic" on the internet. Each router belongs to a particular ISP or carrier, which assigns it a unique internet protocol (IP) address and often a hostname that identifies the type of router and its physical location. For more, see Router.
- Traceroute
- A traceroute is a measurement of the path and transit times of data traveling across the internet depicted as a series of hops from one router to the next. Traceroutes can be generated to particular destination internet protocol (IP) addresses or hostnames by software programs. IXmaps uses a modified version of this software to enable the traceroute data generated to be stored in the IXmaps database from where it can be mapped. For more, see Traceroute.
- Upstream surveillance programs
- NSA upstream surveillance programs refer to the clandestine interception of communication traffic from the internet backbone– i.e. major internet switches or exchanges, and cables, while the data is in transit. Part of the NSA's “collect it all' surveillance approach, these programs enable the capture of all forms of internet communications - e.g. emails, text chats, web searches, downloads, voice over IP (VoIP) calls (e.g. Skype), and even video chat sessions. The largest Upstream programs are Fairview (AT&T) and Stormbrew (Verizon). Upstream interception also plays a key role in the NSA's Quantum Insert program, which can automatically implant spyware or other malware into potentially millions of targeted internet devices. Reference: Gallagher & Greenwald, 2014. For more, see Upstream Collection.