8. Tracking cloud devices

Tracking cloud devices
------------------------------
Currently devices have been coming from many Internet service providers such as

-          Wireline Internet Service Provider (ISP) via cable, traditional copper wire, fiber optical lines, etc.

-          Wireless operators (WO) offering smart phones and tablets Internet access.

The cloud based services have been designed in such a way that users didn’t know where their data have been stored. The servers could be in a country or each service in a country, e.g. google+ server could be in USA, Gmail server could be in Europe, or google plus servers could be divided in smaller chunks as server for Canada was in Toronto, but US server was in California.

Some “IP address” organization (IPO) also offers users to use their servers in a foreign country as a proxy, i.e. user’s IP has been changed to another country other than the country offering user’s Internet services.

Is this hard to track down a hacker or malicious users using the cloud service?

It’s not hard to track those down based on a few things available in TCP/IP protocols. If those were not there, law enforcement could require service providers to comply, because law enforcement must be able to monitor Internet communications for junks and terrorists.

By looking at a TCP/IP packet quickly, we can tell that each packet contains

-          Originating IP address, which should be the ISP, IPO, or WO

-          Destination IP address was the target for outgoing TCP/IP packets.

-          Subnet address should be the internal or dynamic IP address of a user within the ISP, IPO, or WO. They could encode the subnet IP address into an internal ID associated with the user, thus ISP/IPO/WO would decode the ID and relay the returned Internet messages back to users correctly instead of using subnet IP address.

Law enforcement could require the ISP, IPO, and WO to comply with rules by providing messages and ID of a user based on the subnet address or an internal ID. The originating TCP/IP address must be correct or be the identity of the sender.

By breaking the IP address down, the cloud based services were not that complicated. We knew which IP address belongs to a company.

Speaking of tracking cloud database servers, we could tap in the “dispatcher” node of a company. The dispatching node, which receives user’s Internet request, redirects messages to correct servers. We don’t really care where the server was. Of course, if law enforcement wanted to seize a server, they could call that company and ask.

Don’t try to play with words for handing in the information of users of your system or networks upon requests. The requirement was clear that “law enforcement must be able to track down junks and terrorists”. If your networks used power lines instead of Internet lines, your users were more interesting for everyone. So, if you’re not an ISP, WO, or IPO you would also be required to cooperate, shut down, or shot down. It’s your choice.

No comments:

Post a Comment