In addition to using DPI for the security of their own networks, governments in North America, Europe, and Asia use DPI for various purposes such as
surveillance and
censorship. Many of these programs are classified.
China The Chinese government uses deep packet inspection to monitor and censor network traffic and content that it claims is harmful to Chinese citizens or state interests. This material includes pornography, information on religion, and political dissent. Chinese network ISPs use DPI to see if there is any sensitive keyword going through their network. If so, the connection will be cut. People within China often find themselves blocked while accessing Web sites containing content related to
Taiwanese and
Tibetan independence,
Falun Gong, the
Dalai Lama, the
Tiananmen Square protests and massacre of 1989, political parties that oppose that of the ruling Communist party, or a variety of anti-Communist movements as those materials were signed as DPI sensitive keywords already. China previously blocked all VoIP traffic in and out of their country but many available VoIP applications now function in China. Voice traffic in
Skype is unaffected, although text messages are subject to filtering, and messages containing sensitive material, such as curse-words, are simply not delivered, with no notification provided to either participant in the conversation. China also blocks visual media sites such as YouTube.com and various photography and blogging sites.
Egypt Since 2015, Egypt reportedly started to join the list which was constantly being denied by the Egyptian National Telecom Regulatory Authority (NTRA) officials. However, it came to news when the country decided to block the encrypted messaging app
Signal as announced by the application's developer. In April 2017, all
VoIP applications including
FaceTime, Facebook
Messenger,
Viber,
WhatsApp calls and Skype have been all blocked in the country. As of 2022,
FaceTime, Facebook
Messenger are unblocked.
India The Indian ISP
Jio, which is also the largest network operator in India has been known to employ sophisticated DPI techniques like
SNI-based filtering to enforce censorship.
Indonesia The Indonesian government via Telkom Indonesia, supported by Cisco Meraki DPI technology, perform country-wide surveillance by the way of deep packet inspection, and map it into SSN/NIK (Nomor Induk Kependudukan) of its citizens that registered to the state-owned ISP. The purpose of deep packet inspection including filtering porn, hate speech, and reducing tension in West Papua. Indonesian Government planned to scale up the surveillance to next level until 2030.
Iran The Iranian government purchased a system, reportedly for deep packet inspection, in 2008 from Nokia Siemens Networks (NSN) (a joint venture
Siemens AG, the German conglomerate, and
Nokia Corp., the Finnish cell telephone company), now NSN is Nokia Solutions and Networks, according to a report in the
Wall Street Journal in June, 2009, quoting NSN spokesperson Ben Roome. According to unnamed experts cited in the article, the system "enables authorities to not only block communication but to monitor it to gather information about individuals, as well as alter it for disinformation purposes". The system was purchased by the Telecommunication Infrastructure Co., part of the Iranian government's telecom monopoly. According to the
Journal, NSN "provided equipment to Iran last year under the internationally recognized concept of 'lawful intercept,' said Mr. Roome. That relates to intercepting data for the purposes of combating terrorism, child pornography, drug trafficking, and other criminal activities carried out online, a capability that most if not all telecom companies have, he said.... The monitoring center that Nokia Siemens Networks sold to Iran was described in a company brochure as allowing 'the monitoring and interception of all types of voice and
data communication on all networks.' The joint venture exited the business that included the monitoring equipment, what it called 'intelligence solution,' at the end of March, by selling it to Perusa Partners Fund 1 LP, a
Munich-based investment firm, Mr. Roome said. He said the company determined it was no longer part of its core business. The NSN system followed on purchases by Iran from
Secure Computing Corp. earlier in the decade. Questions have been raised about the reporting reliability of the
Journal report by David Isenberg, an independent
Washington, D.C.–based analyst and
Cato Institute Adjunct Scholar, specifically saying that Mr. Roome is denying the quotes attributed to him and that he, Isenberg, also had similar complaints with one of the same
Journal reporters in an earlier story. NSN has issued the following denial: NSN "has not provided any deep packet inspection, web censorship or Internet filtering capability to Iran". A concurrent article in
The New York Times stated the NSN sale had been covered in a "spate of news reports in April [2009], including
The Washington Times," and reviewed censorship of the Internet and other media in the country, but did not mention DPI. According to Walid Al-Saqaf, the developer of the internet censorship circumventor
Alkasir, Iran was using deep packet inspection in February 2012, bringing internet speeds in the entire country to a near standstill. This briefly eliminated access to tools such as
Tor and Alkasir.
Malaysia The incumbent Malaysian government, headed by Barisan Nasional, was said to be using DPI against a political opponent during the run-up to the 13th general elections held on 5 May 2013. The purpose of DPI, in this instance, was to block and/or hinder access to selected websites, e.g. Facebook accounts, blogs and news portals.
Pakistan The
Pakistan Telecommunication Authority (PTA) states that the DPI system has been installed to implement the Prevention of Electronic Crimes Act (PECA) 2016, particularly to filter and block blasphemous content and any material that is considered to be against the integrity or security of Pakistan. Canadian firm
Sandvine was contracted to provide and set up the equipment in Pakistan.
Russian Federation DPI is not yet mandated in Russia.
Federal Law No.139 enforces blocking websites on the
Russian Internet blacklist using IP filtering, but does not force ISPs into analyzing the data part of packets. Yet some ISPs still use different DPI solutions to implement blacklisting. For 2019, the governmental agency
Roskomnadzor is planning a nationwide rollout of DPI after the pilot project in one of the country's regions, at an estimated cost of 20 billion
roubles (US$300M). Some human rights activists consider deep packet inspection contrary to Article 23 of the
Constitution of the Russian Federation, though a legal process to prove or refute that has never taken place.
Singapore The city state reportedly employs deep packet inspection of Internet traffic.
Syria The state reportedly employs deep packet inspection of Internet traffic, to analyze and block forbidden transit.
United States FCC adopts Internet
CALEA requirements: The FCC, pursuant to its mandate from the U.S. Congress, and in line with the policies of most countries worldwide, has required that all telecommunication providers, including Internet services, be capable of supporting the execution of a court order to provide real-time communication forensics of specified users. In 2006, the FCC adopted new Title 47, Subpart Z, rules requiring Internet Access Providers to meet these requirements. DPI was one of the platforms essential to meeting this requirement and has been deployed for this purpose throughout the U.S. The
National Security Agency (NSA), with cooperation from
AT&T Inc., has used deep packet inspection to make internet traffic surveillance, sorting, and forwarding more intelligent. The DPI is used to find which packets are carrying e-mail or a
Voice over Internet Protocol (VoIP) telephone call. Traffic associated with AT&T's Common Backbone was "split" between two fibers, dividing the signal so that 50 percent of the signal strength went to each output fiber. One of the output fibers was diverted to a secure room; the other carried communications on to AT&T's switching equipment. The secure room contained
Narus traffic analyzers and logic servers; Narus states that such devices are capable of real-time data collection (recording data for consideration) and capture at 10 gigabits per second. Certain traffic was selected and sent over a dedicated line to a "central location" for analysis. According to an affidavit by expert witness J. Scott Marcus, a former senior advisor for Internet Technology at the US Federal Communications Commission, the diverted traffic "represented all, or substantially all, of AT&T's peering traffic in the San Francisco Bay area", and thus, "the designers of the…configuration made no attempt, in terms of location or position of the fiber split, to exclude data sources primarily of domestic data". Narus's Semantic Traffic Analyzer software, which runs on
IBM or
Dell Linux servers using DPI, sorts through IP traffic at 10 Gbit/s to pick out specific messages based on a targeted e-mail address,
IP address or, in the case of VoIP, telephone number. President
George W. Bush and Attorney General
Alberto R. Gonzales have asserted that they believe the president has the authority to order secret intercepts of telephone and e-mail exchanges between people inside the United States and their contacts abroad without obtaining a
FISA warrant. The
Defense Information Systems Agency has developed a sensor platform that uses deep packet inspection.
Vietnam Vietnam launched its network security center and required ISPs to upgrade their hardware systems to use deep packet inspection to block Internet traffic. ==Net neutrality==