Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy Your Rights Online

Is Comcast Intercepting Packets? 403

nihilist_1137 writes: "According this page, comcast is intercepting your packets to gain knowledge of your whereabouts and then reselling it to marketers." According to the linked message, "This allows them to not only log all http requests, but to also log the response. Maybe they want to profile their customer browsing history for subsidiaries or resale to marketers. Maybe they want to do their part in The War on Freedom. Maybe they just want passwords to porn sites. Apparently they aren't using it to maximize bandwidth, because it's not configured to serve cached data."
This discussion has been archived. No new comments can be posted.

Is Comcast Intercepting Packets?

Comments Filter:
  • by alfredw ( 318652 ) <alf@[ ]ealf.com ['fre' in gap]> on Monday February 11, 2002 @11:50PM (#2992189) Homepage
    ... quoted in the article...

    I wonder if it prevents, say, an ISP from blocking porn sites (because that would require monitoring traffic). Perhaps it would include shutting out rival IMs or even whole parts of your network...

    Consider Joe Blow AOL Luser, who configures a gateway to AOL so that anyone can access their content. Now... if AOL is a "wire service provider" can they shut down his account? If so, how would they know without monitoring?

    Just a thought...
  • by Spamuel ( 246002 ) on Monday February 11, 2002 @11:52PM (#2992199)
    I can't believe Slashdot would link to a unsubstantiated Usenet posting written by a "J Edgar Hoover", and put this as front page news. These are pretty serious allegations to be throwing around without any proof.
  • by beee ( 98582 ) on Monday February 11, 2002 @11:52PM (#2992201) Homepage
    The page says nothing about reselling it to marketers, simply that they are monitoring it. Let's not jump the gun.
  • by bourne ( 539955 ) on Monday February 11, 2002 @11:55PM (#2992215)

    Isn't tapping internet connections the same, legally, as a phone tap?

    Probably, but this probably isn't "tapping internet connections." I'll bet you dollars to donuts that when Comcast gets called on this, they'll explain how they're only "capturing and keeping limited information" with "aggregate identification only" so that they can "optimize their network configuration" or something like that. The phone company doesn't tap converstations, but they sure as hell have a database of which line called which number, when, and for how long.

    They might even be telling the truth. Not that we care - who wants to be the first to write an app that makes random requests to random domains constantly so as to screw up their database?

  • by Calrathan ( 114381 ) on Tuesday February 12, 2002 @12:00AM (#2992244) Homepage
    Now wait a second. Before we all flip out and start bashing ComCast, lets realize a couple things.

    Number one, this guy just got transitioned. A lot of people all over the country have been going through the same thing, and not everyone is seeing the same thing as him. As 'hostman' from the MESH (Michigan Engineering Software and Hardware http://misc.eecs.umich.edu/) discussion email list wrote:

    "This whole thread got me a bit peeved, so I went home and ran a few tests. I was unable to find any evidence of the packet modification described. It is possible the described issue is not an issue here in A^2, as we 'transitioned' from MediaOne's service, not @Home..."

    Secondly, your ISP has the right to monitor traffic to ensure quality of service. Just because the caching part of the server is not currently running, it does not mean that they aren't phasing it into the system. At this point it's just speculation. They might even have more rights to monitor what you're doing, depending on your service agreement. Read it.

    Lets get some REAL evidence of what's going on other than this hear-say. Someone show us some modified packet headers, and someone else reproduce those results, and MAYBE I'll believe it then.
  • by tomstdenis ( 446163 ) <tomstdenis@gma[ ]com ['il.' in gap]> on Tuesday February 12, 2002 @12:09AM (#2992286) Homepage
    Depends. The only reason tapping phones is illegal [at least in most countries] is because of the explicit right and expectation of privacy.

    If you shouted in public something you can hardly feel violated when others learn about it.

    The internet is inherently non-private. If you want a private connection use crypto. Otherwise, work under the assumption that everyone else knows everything you do on the net.

    Tom
  • Caching proxy (Score:1, Insightful)

    by Anonymous Coward on Tuesday February 12, 2002 @12:33AM (#2992377)
    Isn't this just a caching proxy? Track the requests to cache the popular sites. Others requesting the page don't need to go off the network to access it. Makes an attempt to make their network appear fast (even if it isn't)
  • by raju1kabir ( 251972 ) on Tuesday February 12, 2002 @12:54AM (#2992456) Homepage
    The only reason tapping phones is illegal [at least in most countries] is because of the explicit right and expectation of privacy. If you shouted in public something you can hardly feel violated when others learn about it. The internet is inherently non-private.

    This is absurd. Internet traffic is no more "non-private" than a telephone call. The fact that means exist for people along the traffic path to intercept communications doesn't mean that they're allowed to. If that were the case, all laws governing phone tapping would be moot since the tapping would not be technically possible.

  • More (Score:1, Insightful)

    by zorch ( 136055 ) on Tuesday February 12, 2002 @12:57AM (#2992468)
    I wrote the initial post, and I stand by it.

    Read the whole thread before flaming;

    http://www.securityfocus.com/archive/82

  • Crypto. (Score:4, Insightful)

    by mindstrm ( 20013 ) on Tuesday February 12, 2002 @01:26AM (#2992546)
    Folks.. it shouldn't even have to be repeated, but it does.

    When you send plaintext over the net, like HTTP reuqests..

    YOU ARE SENDING PLAIN READABLE TEXT OVER A PUBLIC NETWORK.

    Where is your expectation of privacy? That's right.. you don't really have one.

    Passwords? HTTPS.. that's what the 'secure'part means you know.

  • by Sivar ( 316343 ) <charlesnburns[@]gmail...com> on Tuesday February 12, 2002 @01:32AM (#2992569)
    I just wanted to note that the headline says, "Is Comcast Intercepting Packets?"
    It would be quite different if "Comcast" and "is" were switched around.
    Still, your point is valid. I am sure many of us have wondered about the people who decide what is and is not posted to the front page...
  • by Kagato ( 116051 ) on Tuesday February 12, 2002 @02:06AM (#2992669)
    I've worked at a national ISP that did a trail of this hardware. The goal is to take the heat off upsteam link. It's fairly useful in a small market were your upstream has to cross a LATA incurring long distance charges.

    The logs generated for this device is not anonymous. It's pretty much reads like an Apache log. Source and destination IPs for every request. I remeber wanting to get some sample data to see if we needed to take the Cache log into account for looking at out admin server traffic reports. Small town USA pretty much surfs over 50% porn.

    At any rate. It's doubtful they use the cache box to collect internet traffic stats. Why? Well, basically, it's a money issue. Once you have the data great...except it's a freak'n huge sh*tload of data. If you want useful reporting you need to keep data for a year. Your're looking putting almost 500K into disk, CPU, and software. It's not worth it because you'd never recoup the money.

    This does NOT mean your ISP doesn't sell your data. An ISP can make some serious cash by selling your data. ISP's can and DO enter into agreements with companies that collect data. However, the ISP wash their hands of the actual process. They let a 3rd party drop a Switch or a Bridge into a POP that directs traffic to a machine that will totally transparently collect data and start collecting checks.

    Point is, the Cache is exactly what it appears. A Cache. It does collect data, but I've never heard of a National ISP use that data. They let a 3rd party company do all the work and collect the checks.
  • Re:Crypto. (Score:5, Insightful)

    by Corgha ( 60478 ) on Tuesday February 12, 2002 @03:14AM (#2992838)
    IANAL, but I'd say you have just about as much expectation of privacy as you do sending unencrypted voice over the public telephone network, which is to say a substantial expectation.

    Data on a switched network between two large ISPs is no easier to intercept than voice going between two large phone companies. In fact, I daresay it would be easier for me to tap my neighbor's phone than his cable modem (I could do it with a pair of pliers and some wire); it would, however, be illegal and IMO wrong for me to do so.

    Bottom line: even though it may be *possible* for nefarious people to tap your phone, put bugs in your living room, or even implant a chip in your brain, you can still have an expectation of privacy. Not wrapping your house in tinfoil does not mean you're giving up your right to privacy, because your home is not a public forum. The wires between you and a web server do not constitute a public forum by any stretch of the imagination (even if the server happens to be hosting a public forum). Not using HTTPS does not consitute an abdication of privacy.

    If you run a packet sniffer and look at other people's data, good luck convincing a judge that you weren't doing something bad under Section 2511 because the data wasn't encrypted.

    "Hey, his front door wasn't locked, so I didn't really steal his TV..."
    "Hey, the guy didn't use The Club, so this really isn't Grand Theft Auto..."
    "Hey, she was wearing that short skirt; she deserved it..."
  • by harlows_monkeys ( 106428 ) on Tuesday February 12, 2002 @04:50AM (#2992980) Homepage
    The Federal law that the original article cites to support the claim that Comcast is doing something illegal says, in one of the sections he did not cite, that it is not illegal under that law to intercept a communication when the person doing the interception is either one of the parties, or has the permission of one of the parties.

    It's a pretty safe bet that there's something in the Comcast service agreement authorizing them to do this.

  • Re:Tangent (Score:3, Insightful)

    by kubrick ( 27291 ) on Tuesday February 12, 2002 @05:23AM (#2993028)
    Hollywood knows fuckall about facts

    Or, more to the point, facts don't make for exciting cinema.
  • FUD? (Score:3, Insightful)

    by dreamchaser ( 49529 ) on Tuesday February 12, 2002 @08:08AM (#2993316) Homepage Journal
    I don't doubt that this could happen, but I would hardly worry about a post on a message board or mailing list. Yes, we need to be vigilant, but let us get some independant verification from a trusted source. Better yet, why doesn't one of you who has Comcast as a service provider write them a letter and ask? CC the FCC and the Better Business Bureau if you feel it necessary.

    Something about this just smells like FUD to me.
  • by Kamel Jockey ( 409856 ) on Tuesday February 12, 2002 @10:59AM (#2993956) Homepage

    I will terminate not only my Comcast@home subscription, but my cable television subscription as well

    Unfortunately, Comcast is so big that they most likely won't care that one person drops their services. There are plenty of others, like myself, who would *love* to get Comcast@Home (or whatever they call it now) if Comcast bothered to make it available to me. Unless everyone were to drop their service at once, this would not be an effective means of protest.

    and some sites which I visit are, by their nature, *CLASSIFIED* in content

    If something is classified, why would be online in any form? Theoretically, every ISP probably is doing the same thing as Comcast here (if the allegations that they are indeed mining their cached content are true), so either way, this "classified" information is going to end up in someone else's hands.

  • by Anonymous Coward on Tuesday February 12, 2002 @11:36AM (#2994138)
    This doesn't really make sense. There has to be trillions of packets created on the @home network. There are several problems because of this.
    1. When you run a network capture, the log file is going to grow to 100s of gigs in minutes.
    2. Sorting through 100s of gigs of log files is going to take massive processing power.

    The only logical thing I could see them doing is being able to screen for keywords like "news" in real time.

It is easier to write an incorrect program than understand a correct one.

Working...