Issues

Where data travels across the internet, as well as who routes it and has access along the way, raises important privacy and other issues. Below you can learn more about these concerns and how IXmaps can help you understand them better. Highlighted phrases link to the corresponding item in the FAQ, Glossary, and Resources pages.

Where on earth does
your personal data travel?

Whenever you visit a website, send an email, use a social media app, etc., your data moves across the internet in a series of "hops," starting from your device and then passed from one router to the next until it reaches its destination. The routers along the way belong to a variety of carriers and are housed in internet exchanges. This sequence of routers and hops is called a traceroute. We map these traceroutes as lines (hops) joining successive dots (routers), based on our estimate of the physical location of these routers. You may be surprised by how far your data travels before arriving at its destination, and who gets to access it along the way.

How to Use Ixmaps to map data travel

Go to the Map, where you will see recent traceroutes from nearest your location. You can click on the dots and lines to learn more about the route and who carries your data.

To see other routes from near you:

  1. Click in the From box, to show the menu choices
  2. Select your ISP, City or Country, or a combination of these, entering the relevant information.
  3. Click Search.

You will see mapped the most recent route that meets these conditions. On the right is the number of routes found and brief details about them. You can map these other routes by clicking on their TR ID number. Below the traceroute information, is the Carriers table with summary information about the various ISPs or carriers that handle the mapped route(s).

You can refine your selection using From, Via and To.

To see routes from your own personal device, you must first generate them yourself. Go to the Contribute page for instructions on how to do this.

For more details on how to select routes to display, see the Help button on the upper right of the Map page.

See FAQs:

Where can the NSA intercept your data en route?

The revelations of Edward Snowden show that the U.S. National Security Agency (NSA) and its signals intelligence agency partners in the Five Eyes countries are intercepting, analysing and storing internet communications from individuals around the world. Their stated ambition is to “collect it all”. Through various Upstream surveillance programs these agencies intercept data “on the fly”, as it travels across the internet. This enables the capture of all forms of internet communications and generates massive quantities of associated metadata.

The NSA takes the lead in this spying and has installed interception facilities at major internet switching sites within the U.S. as well as globally. Locating interception facilities in as few as 18 cities is sufficient to capture nearly 100% of internet communications originating within or passing through the U.S.

How to Use Ixmaps to map NSA interception

The Map shows 18 U.S. cities where reported and suspected NSA interception facilities are located.

To see the locations of other suspected NSA surveillance operations conducted worldwide with the cooperation of AT&T (program code-named Fairview) and Verizon (Stormbrew), click on the Layers button in the upper right and select their respective entries.

Do you know where your data goes?

This video shows a 3D Google Earth animation of data traveling from the Ontario Science Centre to the San Francisco Art Institute's website, passing through the NSA surveillance site inside AT&T's San Francisco internet switching facility at 611 Folsom Street. All traffic passing through this site is intercepted by NSA computers for inspection and storage.

See FAQs:
  1. What is NSA mass surveillance?
  2. How does IXmaps know where the NSA can intercept my data?
  3. What can the NSA do with my data?
  4. What's wrong with mass state surveillance?
  5. What can I do to keep my personal information from being captured by the NSA and other foreign state security and intelligence agencies?
  6. What about Canadian state security and intelligence agencies, such as CSE? Aren't they as much of a problem?
  7. What can I do to help make Canadian security agencies more democratically accountable?

What is boomerang routing, and what does it mean for Canadian network sovereignty?

A surprising amount of domestic communications between Canadians and internet sites within Canada travels via the U.S. We call this type of internet traffic "boomerang routing." Over 25% of the intra-Canadian routes in the IXmaps database follow a boomerang path, subjecting them to NSA surveillance. This can happen with internet traffic of other countries too. These communications lose legal and constitutional protection when they leave their home country. At the same time, they are exposed to foreign surveillance and jurisdiction. This common occurrence challenges privacy and threatens "network sovereignty," understood as national sovereignty in the internet context. Sometimes termed cyber-sovereignty, this term refers to the ability of a nation-state, or other geographically defined political governance entity, to exercise effective control over critical internet infrastructure within its jurisdictional region. Pursued within a human rights framework, network sovereignty can help protect privacy, as well as achieve routing efficiencies and economic benefits.

How to Use Ixmaps to map boomerang routing

To see examples of boomerang routing:

  1. In the From box, select your country
  2. In the To box, select your country again
  3. In the Via box, select U.S. or another third country
  4. Click Search
IXmaps: See where your data travels (Open Media)

This Open Media video explains the concept of boomerang routing and its significance for Canadians. See also this Canadian Internet Boomerang Routing video produced by the IXmaps team and this Monitoring Data video produced by Montreal-based Options Consommateurs in their Moment of Privacy series.

See FAQs

Which ISPs can access your data and how privacy transparent are they?

The internet service providers (ISP) we pay to obtain internet access are not the only telecommunications carriers that transport our data to its destination. Operating largely behind the scenes, it is not uncommon for four or more carriers to be involved, each passing our data onto the next until it arrives at its destination. Each of these carriers has access to your personal information, not just who you contacted, when, where, etc. but also the content of your communications. This means they have legal responsibilities for protecting your privacy. The better ones will go beyond the minimum legal privacy requirements and want to tell you how. But who precisely are these carriers, and how transparent are they protecting personal privacy?

To answer this, we assessed the privacy transparency of the leading 43 ISPs serving Canadians.based on 10 criteria. While a few scored well, with the highest receiving 6 stars out of 10 possible, most performed poorly. You can read our results in the "Keeping Internet Users in the Know or in the Dark."

How to Use Ixmaps to map ISP data access

On the right of the Map, take a look at the Carrier table. It lists the ISPs or carriers that handle the data in the currently mapped traceroutes. The Routers column indicates the total number of routers for each carrier. The Transparency column shows the total number of stars we awarded them on our 10 criteria. Click on the carriers with star scores to learn more details or read our Transparency reports covering all the carriers we rated.

See FAQs: