|An Analysis of the DPI Systems in Place with our National Government
|This document explores the Deep Packet Inspection systems set in place by the United States government’s National Security Agency. Along with |
|an analysis of how the system works, the capabilities of said system will be discussed, along with its legality and future potential for data |
|harvesting. |
With so much happening in the world, and so much going wrong for the United States, the National Security Agency’s chief task is in gathering huge amounts of information and making it immediately useful to prevent terror and cyber warfare threats from damaging United States interests. The NSA’s most challenging task at this point is not in gathering huge amounts of information, but in making it useful. They have the facilities to monitor most telephone calls and email communication that happens in the United States, and with the new Utah Data Center which is currently under construction, they should be able to monitor almost all of it and be able to store it effectively. Ironically, the biggest disadvantage to having a huge amount of data at your disposal is that you have a huge amount of data that you have to sift through in order to get anything useful. This is why the NSA depends so heavily on a technology called Deep Packet Inspection (DPI) which helps the Agency to decrypt and organize internet traffic. Without this emerging technology, the Agency would have to rely on simple searches and manual filtering to find information that is relevant to national security, a very expensive process in terms of both time and money which would ultimately waste the