The Kremlin’s new Internet surveillance plan went live yesterday

By Andrei Soldatov and Irina Borogan



 




Russian communications minister Nikolai Nikiforov meets with president Vladimir Putin. Photo: Kremlin.ru


 


On the surface, it’s all about protecting Russian kids from internet pedophiles. In reality, the Kremlin’s new “Single Register” of banned websites, which goes into effect today, will wind up blocking all kinds of online political speech. And, thanks to the spread of new internet-monitoring technologies, the Register could well become a tool for spying on millions of Russians.


Signed into law by Vladimir Putin on July 28, the internet-filtering measure contains a single, innocuous-sounding paragraph that allows those compiling the Register to draw on court decisions relating to the banning of websites. The problem is, the courts have ruled to block more than child pornographers’ sites. The judges have also agreed to online bans on political extremists and opponents of the Putin regime.


The new system allows ISPs not only to filter traffic, but to monitor it on a nationwide scale.

The principle of internet censorship is not a new one to the Russian authorities. For five years, regional prosecutors have been busy implementing regional court decisions requiring providers to block access to banned sites. To date this has not been done systematically: Sites blocked in one region remained accessible in others. The Register removes this problem.


The new system is modeled on the one that is used to block extremist and terrorist bank accounts. The Roskomnadzor (the Agency for the Supervision of Information Technology, Communications and Mass Media) gathers not only court decisions to outlaw sites or pages, but also data submitted by three government agencies: the Interior Ministry, the Federal Antidrug Agency and the Federal Service for the Supervision of Consumer Rights and Public Welfare. The Agency is in charge of compiling and updating the Register, and also of instructing the host providers to remove the URLs. If no action by the provider follows, the internet service providers (ISPs) should block access to the site in 24 hours. The host providers must also ensure they are not in breach of current law by checking their content against the database of outlawed sites and URLs published in a special password-protected online version of the Register open only to webhosters and ISPs.


Most importantly, however, the new Roskomnadzor system introduces DPI (deep packet inspection) on a nationwide scale. Although DPI is not mentioned in the law, the Ministry of Communications — along with the biggest internet corporations active in Russia — concluded in August that the only way to implement the law was through deep packet inspection.


“At the end of August, under the chairmanship of Communications minister Nikolai Nikiforov, a working group was held, drawing representatives of Google, SUP Media (the owner of the Livejournal social network), and of all the other big hitters. They discussed how to ensure that the [filtering] mechanism — they used the concrete example of YouTube — how to block a specific video, without blocking YouTube as a whole. And they reached the conclusion that pleased them all,” Ilya Ponomarev, a member of the State Duma and an ardent supporter of the law, told us.


Are we are talking about DPI technology? we asked.


“Yes, precisely.”


Most digital inspection tools only look at the “headers” on a packet of data –- where it’s going, and where it came from. DPI allows network providers to peer into the digital packets composing a message or transmission over a network. “You open the envelope, not just read the address on a letter,” said an engineer dealing with DPI. It allows ISPs not only to monitor the traffic, but to filter it, suppressing particular services or content. DPI has also elicited concern from leading privacy groups over how this highly intrusive technology will be used by governments.


“No Western democracy has yet implemented a dragnet black-box DPI surveillance system due to the crushing effect it would have on free speech and privacy,” said Eric King, head of research at Privacy International. “DPI allows the state to peer into everyone’s internet traffic and read, copy or even modify e-mails and webpages: We now know that such techniques were deployed in pre-revolutionary Tunisia. It can also compromise critical circumvention tools, tools that help citizens evade authoritarian internet controls in countries like Iran and China.”


“There are basically two functions in DPI — filtering and SORM,” added IBM East Europe Business Development Director Boris Poddubny, referring to the Russian government surveillance system for monitoring both internet traffic and phone calls. “There may be devices to copy traffic. DPI helps analyze it. And there will be a detailed log: what is downloaded by whom, and who looked for what on the internet.”


 


 



The Moscow headquarters of Russia’s Federal Security Service, the successor to the KGB. Photo: Andrei Soldatov


Off-Guard


September of 2012 saw several prosecutors request that access to the “Innocence of Muslims” video be blocked in various different Russian regions. On Sept. 27, the three largest mobile and internet service providers — MTS, VimpelCom and Megafon — restricted access to the inflammatory movie trailer. VimpelCom blocked access to websites that posted the video, which made YouTube as a whole inaccessible in Chechnya, Dagestan, Kabardino-Balkaria, Ingushetia, Karachay-Cherkessia, North Ossetia and the Stavropol Region. But MTS and Megafon succeeded in blocking access just to the video itself thanks to DPI.


It seems the Russian authorities have been busy testing the ground in applying the most advanced internet-censorship technologies, an idea that has obsessed the Kremlin for the last two years.


After the Arab Spring, the Kremlin gave serious thought to developing facilities for averting “enemy activity” on the Russian internet. The problem had, at various levels, been a hot topic since summer 2011. The Collective Security Treaty Organization (the Moscow-led regional defence alliance consisted of Russia, Belarus, Armenia, Kazakhstan, Kyrgyzstan and Tajikistan), member states’ heads of state, prosecutors general and the security services all addressed it. The growth of political activism in their countries and the role of social networking sites in mobilizing protesters only increased the paranoia.


Russia’s security services started developing a strategy for the blogosphere and social networking sites, but had not managed to develop anything concrete before the December 2011 protests that were prompted by Vladimir Putin’s campaign to return to the presidency. The services were used to dealing with threats of a more traditional nature, and were confused when faced with a protest organization with no center — but that instead worked through social networking sites.


‘This allows the state to peer into everyone’s internet traffic and read, copy or even modify e-mails and webpages.’

According to our sources in the secret services, on a technical level they were powerless to deal with social networks, especially any that were based outside of the country, such as Facebook and Twitter (“What can we do if [the pro-Chechen] Kavkazcenter opens a page on Facebook?” was their most desperate question).


Not surprisingly, the best the St. Petersburg Federal Security Service (FSB) department could do on the eve of the major protest rally in Bolotnaya Square on Dec. 10 was to send a fax to Pavel Durov, the creator of the St. Petersburg-based VKontakte social network, requiring him to close down protest groups. Durov refused. The next day, he was summoned to the St. Petersburg prosecutor’s office to explain himself. Durov did not attend, the story came out, and that was the end of the matter.


On March 27, 2012, this failure was indirectly recognized by the First Deputy Director of the FSB, Sergei Smirnov. At a meeting of the Regional Anti-Terrorist Structure within the Shanghai Cooperation Organization — an international group founded in 2001 by China, Russia and Central Asian states — Smirnov said: “New technologies are used by Western secret services to create and maintain a level of continual tension in society with serious intentions extending even to regime change…. Our elections, especially the presidential election and the situation in the preceding period, revealed the potential of the blogosphere.” Smirnov stated that it was essential to develop ways of reacting adequately to the use of such technologies and confessed openly that “this has not yet happened.”


The solution appears to have been found in the summer, when the State Duma approved the amendments, effectively raising the internet-filtering system to a nationwide level, thanks to DPI technologies.


Maybe because government officials had, for so many years, claimed that Russia could not adopt the Chinese and Central Asian approach to internet censorship, the solution took the national media, the expert community and the opposition completely by surprise.


In fact, the ground had been carefully prepared over a period of years, since DPI technology had first entered Russia in the mid-2000s for purely commercial reasons.


 



(R to L): Duma member Ilya Ponomarev, IBM’s Boris Poddubny, RGRCom CEO Roman Ferster, and Inline Telecom Solutions’ Alexander Shkalikov are all intimately involved in expanding Russia’s deep packet inspection efforts.


Suppression


“We got our first client in 2004, it was Transtelecom. But it was its security department, so DPI was intended for its internal network,” said Roman Ferster, CEO of RGRCom company, the main distributor of Allot DPI technologies in Russia.


Ferster — short, stocky and energetic, with a slight Israeli accent — founded RGRcom in 2003 to sell telecom technologies made by Israeli corporations in Russia. Allot, which focuses exclusively on manufacturing DPI solutions, suited his business perfectly. His small team of just over 20 people is Allot’s exclusive partner in Russia. They helped install Allot devices in the Tatarstan region, in the Far East, in VimpelCom’s ISP network in Moscow, in the Ural regional operator’s network, and so on.


Ferster’s company also offers Russia technology that can solve the technical problem of blocking a single video clip instead of YouTube as a whole.


Allot initially targeted corporate networks and small regional ISPs, not the big long-distance providers and mobile operators. DPI did not really arrive in Russia until the end of the 2000s, and now many of the biggest DPI technology vendors have a presence in Russia: Canada’s Sandvine, Israel’s Allot, America’s Cisco and Procera, and China’s Huawei. By the summer of 2012, all three national mobile operators in Russia already had DPI at their disposal: Procera was installed in VimpelCom, while Huawei’s DPI solutions are in use in Megafon, and MTS bought CISCO DPI technology.


“The first bell rang in Russia when we got torrents. Because the torrents occupy all available bandwidth,” Ferster’s chief engineer Vasya Naumenko recalled. “When it began, operators came to think how to solve it. And it turned out that there is no other option except DPI. No switch, no router, not even Cisco, can solve the problem. This is the level of applications, and in any case it’s necessary to open the packets and see what’s inside.”


“Mobile operators faced with that when they presented the mobile internet. As soon as they began to distribute USB-modems, it became a problem,” confirmed IBM’s Poddubny.


Poddubny shared his thoughts in a Starbucks at the center of the most fashionable part of Moscow City, at the foot of the tower “City of Capitals” on the Moscow river bank, next to the IBM headquarters. It’s a striking contrast to RGRcom’s offices: a few rooms on the seventh floor in a modest business center in the outskirts of Moscow. “We saw that customers started being interested in DPI two-three years ago. This interest arose for one simple reason: peer-to-peer protocols. There are a lot of people who download audio and video files in large quantities. According to some studies, this accounts for over 80% of traffic.”


‘There will be a detailed log: what is downloaded by whom, and who looked for what on the internet.’

It appears that the only decision the mobile operators found was traffic shaping. This euphemism means that, thanks to DPI technology, mobile operators acquired a tool they could use to suppress particular services — in most cases torrents, peer-to-peer protocols and Skype, which poses a threat to the VoIP solutions made by the mobile operators themselves.


The ISPs turned out to be more hesitant in adopting DPI technologies. All the engineers we have interviewed, who deal with DPI in Russia, told us that most ISPs do not understand why they need to install this technology.


“The key difference in approaches is the tariff system. Mobile operators have lots of tariffs while ISPs enjoy a very strange position: it’s not clear how they intend to make money because they have turned themselves into the pipeline,” said Alexander Shkalikov, a Systems Engineer at Inline Telecom Solutions, the company that started to sell Sandvine in Russia in 2007 and is its main partner in the country. Inline Telecom has just installed DPI devices on the network of the national long distance operator Rostelecom in the Far East Region. “As a result, every region from Kamchatka to Yakutia got the Sandvine DPI,” said Shkalikov.


The introduction of the law requiring DPI to be in place has done nothing to change the internet service providers’ attitude, Shkalikov said. “Right now the ISPs want to shift the problem of the traffic control to someone else’s doorstep. They don’t want to buy DPI themselves, because it costs over $100,000 and small operators simply cannot afford it.”


That said, small ISPs seem to have already found a cheap solution, Shkalikov explained. “There is a big market of used CISCO DPI solutions, you can buy them for truly laughable sums. Something like $2,000 (in the US — in Russia the real figure is $7,000, bearing in mind that a new device costs over $100,000). And software can be stolen. CISCO is less functional than Sandvine, but it might at least satisfy the state regulator.”


The governments in many countries with questionable democracy and human rights records are fully aware of how to turn commercial advantages of DPI into the tool of suppressing dissent activity online. The secret services in Uzbekistan, for example, compel local providers to use DPI to change the URLs of discussion groups in social networks.


Technically, it poses no problem, Alexander Shkalikov of Inline Telecom confirmed. DPI allows for identification of those trying to access a site or page even if it’s blocked. “It’s possible to identify not only the IP, but logins, and that’s easier for the internet service provider. We advise our clients to configure DPI to work with logins. As a result they can have statistics about who is who. For example, some ISPs are interested in identifying who the spammers in their network are.”


In September 2012 it became clear, that DPI’s identification capabilities could be combined neatly with the Russian nationwide system of legal interception, the foundations of which were laid in Soviet times.


 



Moscow’s Central Telegraph Building, which houses the Ministry of Communications. Photo: Wikimedia


Crossed Lines


In the mid 1980s a KGB research institute developed the technical foundations of what was later to be known as SORM — a nationwide of automated and remote legal interception on all kinds of communications.


Full implementation of the project only happened in 1992, when the Ministry of Communications signed-off on the first SORM-related document, forcing telecom operators to allow the secret services to intercept phone conversations and mail. The public first became aware of SORM in 1998 when the FSB, Ministry of Communications, and supervisory agencies developed new regulations for installing interception devices on servers run by ISPs. In the first decade of the millennium, SORM equipment was installed by all ISPs and operators of mobile and landline networks.


If you know an opposition leader is a customer of a known operator, you can copy all of his traffic.’

Meanwhile, there is a principal difference between SORM and today’s DPI push. The SORM devices are manned by the agents of the secret services, while DPI technology is at the disposal of the ISPs and mobile operators. However, the line might be crossed very soon — which would suit the companies and the Ministry of Communications just fine.


On September 27, Russia’s largest information security conference featured a panel on “SORM in the Environment of Convergence.” The talk was intended for professionals, and the room in the international exhibition center Krokus Expo in the north of Moscow was filled with the chiefs of SORM departments at mobile operators and the Moscow city phone network, as well as representatives from surveillance equipment manufacturers. The most honored guest was Alexander Pershov, deputy director of the Department of State Policy at the Ministry of Communications.


DPI quickly emerged as one of the hottest topics of the discussion. Many in the room seemed certain that the only way to guarantee legal interception in the new era of cloud computing and communications is DPI technology. It was a conclusion that the representative of Huawei in Russia was only happy to support.


The idea of connecting SORM with operators’ DPI seemed not to bother anybody in the room. Alexander Pershov, long-serving official with the Ministry of Communications, outlined the Ministry’s general way of thinking: “The requirements for building networks need to be coordinated with the FSB to ensure that everything is done properly in terms of SORM.”


Technically it poses no problem, we were told by engineers dealing with DPI.


“Allot is perfectly compatible with SORM, and we know it,” Roman Ferster confirmed. “There is a very simple solution,” Alexander Shkalikov said. “We did it. [With] DPI, [we] can simply mirror traffic, not redirect it. This is very convenient because DPI [helps] you copy not all traffic but only a certain protocol or traffic of certain customers. For example, if you know that [Alexei] Navalny, one of the most famous opposition leaders, is a customer of a known operator, you may get all Navalny traffic to be copied through the DPI to the external system. It’s real. And it even shows you which sites he has been to.”


The surveillance technology that works for tracking Navalny can work for millions of Russians. And the switch gets flipped on today.


A joint investigation by Agentura.Ru, CitizenLab and Privacy International.


Andrei Soldatov and Irina Borogan are Russian investigative journalists, co-founders of Agentura.Ru and the authors of "The New Nobility.The Restoration of the Russia's Security State and the Enduring Legacy of the KGB."


I assure you this is not for good. It is not because he cares about kids.


There is nothing to really say because in 2 / 4 years tops, everyone reading this or leaving comments is going to see what has happened.


This is only to get control of the internet in Russia and make is run Russia with a iron first. I believe now that he does not see America giving him a massive market again. he has played dumb and has not tried to rule Russia like he is really starting to do in the last 2 years. We are seeing the real Putin now and he is starting to get things moving in running that country.


In the last 1.6 years he has taken big steps. This is the start and he would love to the boys the KGB again..


I mean as of 1.6 years ago, now we are about to see massive changes that even the EU is going to take steps in calling Russia a non democracy but back to a communist state. Putin is going to be labeled a communist & ruler.


All this was forecast back in July when Danger Room presented an article about Eugene Kaspersky.


In that article was the following quote from Kaspersky:


"...Kaspersky’s vision for the future of Internet security—which by Western
standards can seem extreme. It includes requiring strictly monitored
digital passports for some online activities and enabling government
regulation of social networks to thwart protest movements. “It’s too
much freedom there,” Kaspersky says, referring to sites like Facebook."


Notice especially how Kaspersky wanted the GOVERNMENT to regulate "social networks to thwart protest movements."


At the time the article was written, ALL Russian (and 98% of the American) commentators did not have a single thing to say about Kaspersky's "vision."


A little late now to start complaining about Putin's internet censorship to thwart opposition speech against him.


“No Western democracy has yet implemented a dragnet black-box DPI surveillance system due to the crushing effect it would have on free speech and privacy,” said Eric King, head of research at Privacy International. “DPI allows the state to peer into everyone’s internet traffic and read, copy or even modify e-mails and webpages: We now know that such techniques were deployed in pre-revolutionary Tunisia. It can also compromise critical circumvention tools, tools that help citizens evade authoritarian internet controls in countries like Iran and China.”

 


The DOJ and SCOTUS won't allow lawsuits against the NSA for fear of discovering the exact same thing exists here in the States. (Why else is the Utah facility being built?)


indeed, and it's amazing how many people forgot the work sandvine was commercially (and publicly) deploying years ago in p2p channels. as the eccentrics at infowars say, if humans could communicate to one another telepathically, the tin foil hats would be necessary. it's just a shame that we can't have moderation at this level. is regulation possible without big brobro checking in on you?


There is no need to worry about this in the US where we have a single political party with two factions. On the surface they seem to be different, but when you look at their actions their differences are window dressing. Plus, we've nearly eliminated the truth. Remember VP Cheney? He went around talking about how Iraq was behind 9/11 and then someone would point out Iraq had nothing to do with it and Cheney would admit they were right and keep quiet for a few weeks. Then he would be back talking about Iraq and 9/11. Today, people don't even attempt to tell believable lies, they are rarely called on it and when they are they rarely admit it. And they certainly don't take a break from telling the lie. And if something truthful is ever in danger of upsetting the order the messenger is immediately discredited, which for some unknown reason magically discredits the message, by the overwhelming organs of the state assisted by the media "reporting the news." In order to have a protest movement you need an informed citizenry. We've come at the problem from the opposite and far more effective direction. You only need DPI...


"The new system is modeled on the one that is used to block extremist and terrorist bank accounts" the Russians have finally arrived at a society that treats its own citizens as terrorists... welcome to 1984!


Essentially, Stalin, under the old Soviet Union, beat Putin to treating "its own citizens as terrorists" by over 70 years.


It is roughly estimated that 500,000 Soviets were murdered during the most intense of part of the "purges" in 1937-1938. Millions more were sent to labor camps.


Somewhere, Stalin's ghost is smiling down(or up) at his ideological successor Putin.


Putin has a ways to go to match the "master" Stalin but Putin clearly has promise.

...“No Western democracy has yet implemented a dragnet black-box DPI surveillance system due to the crushing effect it would have on free speech and privacy,” said Eric King, head of research at Privacy International.


This is unequivocally false on several levels. In fact, total packet inspection has existed and been deployed for some time now in the west. The only difference here is that enforcement and anonymity-decimating incentives are held by the RIAA/MPAA and not the Russian Federal Security Service. true story, and the sad thing is, Russia is only now catching up to the States in this interest.


Ahahahaha americans are suprised by this spying technology,i mean cia and nsa have largest budgets in history of spying,perhaps they are using money for birdwatching and not for spying their own citizens.I mean there are more uavs over US than over afganistan i wonder why?


Do you know the difference between the new Russian spying program and the U.S.? U.S. has much better technology and has years and years experience spying on it's citizens. The only difference is that we don't publicize it and if anybody brings it up we squash the question with a national security letter or the state secrets option.


Do you REALLY believe that NSA is only targeting communication where one party is outside of U.S. -- PLEASE...


Is anyone surprised by this? Would you be surprised if Obama copied Putin's actions during a second term? Vote for Romney and avoid this crap in the U.S.. If you are unsatisfied with Romney in four years becasue of things like this vote him out of office as well.


How did this topic become about the US? Even IF the US had a similar system(it doesn't but lets pretend it does) how would that make it ok for Putin? Last time I checked the US doesn't violate free speech by filtering content it deems politically unacceptable. Putin is becoming increasingly autocratic and proving false any delusions that Russia is a real democracy.


Everytime an article like this is written these days you have ten morons who pop up immediately to point the finger at the US as if that would be some sort of justification for repression in other countries or as if the writer is acting on behalf of the US government.


The US may not filter content yet but they sure spy on every single piece of traffic that flows throughout the Internet. Just like what they are doing to this response right now.


I wonder what sort of horrible death that button under the desk that Putin is pressing is about to unleash.


Today I see the "treason laws" are being revised, now this, I'm sure more is on the way in this new-age-clamp-down. Putin consolidates his power. What else is new? Our president certainly will need all the "flexibility" he spoke of on the accidentally open mic. The Russian government is getting more RIGID everyday.... Too bad, really.


. . US of America, your next.


russia is moving towards china's form of govt.



What is not clear is how DPI could possibly see into encrypted packets. All you could see is the header information. It would seem that broader use of encryption would be the simplest way to defeat DPI.



The only way to beat DPI is through preallocated private keys being used by individuals to send encrypted data.
Traditional encryption methods send multiple pieces of this key to the end point over multiple, separate nodes, where it is combined to form the full key.
This 'end-point' then sends the encrypted data directly back, where it is decrypted by the sending machine. But this encrypted tunnel is only secure if the keys are unknown.
So, because the formation of the keys is sent over the internet, Putins goons can automatically assemble the full key, and decrypt the information on the fly.
The setup is such that an end user never has to see this 'skewed' data.
The safest way is to manually apply the known key to a closed database containing the information.



That's not how a PKI system works (which is the bulk of the encryption mechanism used on the web today). There is a public key which is freely distributed (whole, not in parts) over the web. When I send you my public key, you now have the ability to encrypt a message to me. Decrypting that message can only be done with a private key that is NEVER sent over the internet in any form. They would have to break into my computer (and then know the password protecting my local copy) before they could gain access to my key and then decrypt the message. SSL (all those https links) has a few more steps since the server and client need to exchange keys. But basically the servers sends its public key and the client uses that to encrypt a key the server can use in sending encrypted information back. Now both systems have a key that only they know about that can be used to decrypt the traffic. In no case has a key been transmitted that can be used to decrypt messages in either direction. But I'm not familiar enough with http protocols to know whether a URL...


This right here? Good example of why your country is shrinking.

Comments

 Article photo

Peruvians balance the public debate on internet user rights

Like many countries in Latin America and beyond, Peru is a state whose political representatives lack familiarity with internet issues and technology. Our national policies are still generic guidelines that stifle innovative solutions and smart laws...

via accessnow +1 Tweet Share
  

Article photo

Syria's Digital Proxy War

Iran and the United States are squaring off in a life-or-death battle for information. The aftermath of clashes between Free Syrian Army fighters and forces loyal to Syria's President Bashar al-Assad in the Suliman al-Halbi area of Aleppo on October...

via theatlantic +1 Tweet Share
  
From the Access CommunityArticle photo

Access hosts human rights, spectrum, and telecoms talks at IGF 2012

Next week, the Internet Governance Forum will hold an annual meeting that brings public and private stakeholders, from developed and developing nations, together to discuss public policy issues relating to the internet. This year’s meeting comes...

via accessnow +1 Tweet Share
  

Article photo

Japan: Election Tweeting Forbidden

Even though Japanese is the second most active language in the world on Twitter, for the country's political candidates, tweeting during election campaigns is forbidden. A group of young activists is seeking to change this situation. Written by...

via globalvoicesonline +1 Tweet Share
  

Article photo

Censorship in Mexico: The Case of Ruy Salgado

Most people outside of Mexico may have never heard of Ruy Salgado. But during the most recent electoral contest here, that name not only became known throughout Internet circles in Mexico, but was arguably one of the most influential voices of opposition...

via americasquarterly +1 Tweet Share
  

Article photo

Philippines: Online Shame Campaign Against “Epal” Politicians

With less than a few months before the 2013 national elections, various groups have launched an online shame campaign against the common practice of Filipino politicians to attach their names to government projects that are funded or assisted by...

via globalvoicesonline +1 Tweet Share
  

Article photo

Microsoft opens new windows into your email by quietly changing privacy policy

There have been quiet murmurs about Microsoft’s recent change in privacy rules. If you haven’t heard, Microsoft recently changed their privacy policy in almost exactly the same way Google did on March 1st but didn’t receive quite the same level of...

via accessnow +1 Tweet Share
  

Article photo

The Influence of Technology on Governance (in Africa)

Kenya Tweets, a Kenyan social media research and consultancy firm recently released the first of several reports investigating the use of Twitter by various presidential candidates ahead of the 2013 national elections...

via afrinnovator +1 Tweet Share
  

Article photo

TEDxToronto 2012 Talk - Ronald J. Deibert, Director of the Citizen Lab

Never before have we been surrounded by so much technology. But never before have we not known what lies beneath this technology...

via youtube +1 Tweet Share