SlideShare a Scribd company logo
1 of 32
Download to read offline
Introduction Information Sources Legality and Ethics Early Results Questions




                        Fine-Grained Censorship Mapping -
                      Information Sources, Legality and Ethics

                                                         Joss Wright
                                                   joss.wright@oii.ox.ac.uk


                                                   Oxford Internet Institute
                                                    University of Oxford




                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 1/32
Introduction Information Sources Legality and Ethics Early Results Questions




      1       Introduction
      2       Information Sources
      3       Legality and Ethics
      4       Early Results
      5       Questions




                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 2/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Censorship
              Almost every country engages in some
              form of Internet ļ¬ltering.
              Chinaā€™s ā€œGolden Shieldā€ is the classic
              example.
                      Saudi Arabia presents perhaps the
                      most extreme ļ¬ltering regime.
                      (OpenNet Initiative)
              Many different technologies; many
              different ļ¬ltering targets; many different
              rationales and justiļ¬cations.


                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Censorship Technologies
              We can classify ļ¬ltering according to
              their focus:
                      DNS Poisoning
                      IP Header Filtering (address or
                      protocol)
                      IP Content Filtering (keyword or
                      protocol)
                      Proxy Filtering
              We can consider takedown, social
              pressure, legislation as ļ¬ltering, but will
              focus on technology.


                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Limitations
              A tradeoff between subtlety and
              computational requirements.
                      Sophisticated methods require greater
                      computational resources.
                      At national scale, these can be severe.
              Centralization can cause problems, as
              seen with CleanFeed.
              Central management also raises
              administrative and organizational
              burdens.


                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Localized Filtering
              We can observe localized ļ¬ltering in
              response to local events.
              We therefore see ļ¬ltering differ across a
              state, rather than homogeneity.
                      We also expect ļ¬ltering to vary over
                      time.
                      We may expect organizations to have
                      one ļ¬ltering regime, even across a
                      state.
              This can reveal ļ¬ltering tactics, methods,
              reasoning, limitations.

                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 6/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Existing Work
              HERDICT: crowdsources ļ¬ltering
              information from volunteer web users.
              OpenNet Initiative: use volunteers and
              direct means to examine ļ¬ltering around
              the world.
              Both consider national-level ļ¬ltering as
              homogeneous.
              Both also make judgements as to the
              nature of ļ¬ltering.
                      Political, religious, social


                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 7/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Existing Approaches
              HERDICT relies on users for information.
              Visitors to the website report sites that
              appear blocked.
              The website actively presents potentially
              blocked content, allowing users to verify
              if it is blocked.
              OpenNet Initiativeā€™s methods vary, but
              include direct investigation and liason
              with volunteers in blocked regions.


                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 8/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Fine-Grained Sources
              For ļ¬ne-grained mapping we wish to
              combine data gathered at various
              locations with GeoIP data at the city
              level.
              GeoIP databases are increasingly cheap
              and accurate.
              The problem is to get readings from a
              wide geographical distribution.
              Ideally, not just blocking status but type of
              blocking.

                                                                                         .       .        .        .        .       .

Joss Wright                                                  Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 9/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Limitations
              Crowdsourcing or using
              volunteers can be effective
              if the tool is sufļ¬ciently
              usable, but is limited:
                      Undirected, inconsistent
                      coverage.
              Direct investigation is
              expensive.
              Ideally we desire direct
              access to ļ¬ltered internet
              connections.

                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 10/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Direct Action
              Direct access to other connections is
              possible in some limited cases.
                      Tor exit nodes, and similar services
                      such as psiphon.
                      VPN services or remote shells.
                      Creatively-used public services ā€“
                      webservers, IRC, bittorrent...
              Access to DNS is very simple, and
              directly addresses one major type of
              ļ¬ltering.


                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 11/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Direct Action Problems
              Direct services are rare, especially in
              countries with interesting ļ¬ltering
              regimes.
                      No-one wants to run Tor-like services
                      in ļ¬ltered areas!
              VPN services are also rare. Remote
              shells are even more so.
                      These services are typically offered to
                      get past ļ¬ltering, not get in.
              Creative misuse of open services seems
              the most fruitful option.

                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 12/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Direct Action Mechanisms
              DNS is simple and effective for
              detecting DNS ļ¬ltering, but is not
              very useful beyond that.
              Tor and Tor-like services are rare,
              but wonderful.
              BitTorrent seems a likely
              candidate, and we have been
              investigating it, but consent is a
              serious issue.
              If only we could... botnets.

                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 13/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Legality and Ethics
              Is it legal to access blocked
              websites?
              Is it ethical to ask someone else to
              access blocked websites?
                      Consent for automated tools.
              Is it legal to creatively abuse a
              service, with or without malicious
              intent?
                      Is it ethical to open a service
                      operator to repercussions
                      based around such misuse?


                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 14/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Legal Concerns


              HERDICT Legal FAQ: ā€Rules vary by
              country, but we know of no nation where it
              is illegal for you to report information about
              sites you cannot access.ā€




                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 15/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Legal Concerns
              Sites are sometimes blocked for serious
              legal or societal reasons:
                      Pornography, homosexuality, lĆØse
                      majestƩ, insult to religion
              Reporting sites as blocked may well be
              legal, but detection attempts may cause
              legal or social consequences.
              When is the risk too small, and how can
              we judge this against arbitrary cultural
              contexts?


                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 16/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Current Work
              Retrieved a list of 278 DNS servers
              across China from the APNIC WHOIS
              database.
              Selected the top 80 reported blocked
              websites according to HERDICT.
              Performed a DNS query for each site to
              each server.
              We have code to scan China for DNS
              servers, but have not deemed it
              necessary at this point.

                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 17/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Early Observations
      Initial observations:
              Many blocked sites are listed as
              non-existent in the majority of DNS
              servers tested.
              Several servers return no result for most
              blocked sites, but occasionally redirect
              requests to other DNS servers before
              doing so.



                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 18/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Early Observations
              DNS poisoning is rife:
                      wujie.net 161 servers returned a
                      response to wujie.net directed to
                      only 9 separate IPs ā€“ none of which
                      offer services, and are unrelated to
                      wujie.net.
              Many blocked sites do get genuine DNS
              responses.

              In many cases we simply get no result, or
              a timeout.

                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 19/32
Next slide: map of China showing cities for which we have data.




                                             .    .    .     .    .   .
Harbin

                                                                           Changchun


                                                         Chaoyang Shenyang
                         Baotou
                                           Beijing
                                         Hebei Tianjin


Xining                                        Jinan
                                                          Qingdao

                                     Zhengzhou
                    Xian


                                             Hefei    Nanjing
                                                                Shanghai
         Chengdu                      Wuhan
               Chongqing                                        Ningbo

                                  Changsha

               Guiyang
                                                       Fuzhou

                                                      Xiamen
                         GuangzhouHeyuan
                                Dongguan
              Nanning Zhongshan Shenzhen




                                                 .               .           .         .   .   .
Next slide: zoomed map of China showing cities for which we have
data.




                                           .    .    .    .        .   .
Harbin




                                                                                                                          Changchun




                                                                                                               Shenyang
                                                                                                Chaoyang

                                      Baotou

                                                                        Beijing

                                                                            Tianjin
                                                                Hebei




Xining                                                                     Jinan
                                                                                                Qingdao


                                                       Zhengzhou
                               Xian




                                                                                      Nanjing
                                                                             Hefei
                                                                                                    Shanghai
         Chengdu                                         Wuhan
                                                                                                     Ningbo
                   Chongqing


                                                   Changsha



                   Guiyang
                                                                                        Fuzhou



                                                                                      Xiamen

                                           Guangzhou          Heyuan
                                                       Dongguan
                             Nanning
                                           Zhongshan    Shenzhen




                                                                                                     .           .             .        .   .   .
Next slide: Relative likelihood that the DNS server will return ā€˜no
resultā€™ when asked for a censored website. Larger and redder dots are
more likely not to return a result.
Note that if a result is given, it is not necessarily correct. (See next
map.)




                                               .    .     .    .     .     .
Harbin



                                                                                                                       Changchun



                                                                                                            Shenyang
                                                                                             Chaoyang

                                      Baotou
                                                                    Beijing
                                                                         Tianjin
                                                                Hebei




Xining                                                                  Jinan
                                                                                            Qingdao


                                                       Zhengzhou
                               Xian




                                                                         Hefei     Nanjing
                                                                                                 Shanghai
         Chengdu                                          Wuhan
                                                                                                 Ningbo
                   Chongqing


                                                     Changsha


                   Guiyang
                                                                                     Fuzhou


                                                                                   Xiamen
                                         Guangzhou         Heyuan
                                                        Dongguan
                          Nanning
                                         Zhongshan       Shenzhen



                                                                                                 .            .             .        .   .   .
Next slide: Relative likelihood that, if a DNS result is returned for a
given site, that it is a ā€˜lieā€™. Speciļ¬cally, that the returned IP address does
not point to the requested domain or a related domain. Typically, these
false results point to a small number of IP addresses in Beijing.




                                                  .     .     .     .    .       .
Harbin



                                                                                                                       Changchun



                                                                                                            Shenyang
                                                                                             Chaoyang

                                      Baotou
                                                                    Beijing
                                                                         Tianjin
                                                                Hebei




Xining                                                                  Jinan
                                                                                            Qingdao


                                                       Zhengzhou
                               Xian




                                                                         Hefei     Nanjing
                                                                                                 Shanghai
         Chengdu                                          Wuhan
                                                                                                 Ningbo
                   Chongqing


                                                     Changsha


                   Guiyang
                                                                                     Fuzhou


                                                                                   Xiamen
                                         Guangzhou         Heyuan
                                                        Dongguan
                          Nanning
                                         Zhongshan       Shenzhen



                                                                                                 .            .             .        .   .   .
Introduction Information Sources Legality and Ethics Early Results Questions


     Results of Visualization
              We can clearly verify that ļ¬ltering is
              heterogeneous across China.
              Some cities show little DNS ļ¬ltering,
              some return no results, some return
              poisoned results, some do both!
                      Chengdu, Shenzhen, Shanghai are
                      notable ā€œtechā€ cities, and have little
                      ļ¬ltering.
                      Beijing is, perhaps surprisingly, relatively
                      permissive.



                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 28/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Caveats
              Restricted list of DNS servers. I can get
              more, but will have to portscan China
              for them.
              DNS server in a city does not represent
              where the users originate.
              These maps do not show how many
              DNS servers were in each city, or give
              any distinction between them.
                      78 DNS servers in Beijing, only 1 in
                      Xiamen.


                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 29/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Questions
              What are the legal and, importantly,
              ethical limits to what we can do in this
              area?
              What good services exist from which to
              ā€œbounceā€ connections?
                      Speciļ¬cally, public services rather than
                      individual services.
              Can we intelligently split on
              organizational as well as geographical
              lines.


                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 30/32
Introduction Information Sources Legality and Ethics Early Results Questions


     Questions

              How can we best represent this
              information?
              What will we learn when we repeat
              experiments over time looking for
              patterns?
              What questions would anyone like to
              ask?




                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 31/32
Introduction Information Sources Legality and Ethics Early Results Questions


     The End




                                                                                        .        .       .        .        .       .

Joss Wright                                                Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 32/32

More Related Content

Similar to Fine-Grained Censorship Mapping

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
Ā 
Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101jcscholtes
Ā 
Addressing privacy concerns_in_the_age_of_federated_data_access
Addressing privacy concerns_in_the_age_of_federated_data_accessAddressing privacy concerns_in_the_age_of_federated_data_access
Addressing privacy concerns_in_the_age_of_federated_data_accessBen Busby
Ā 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocationsferguspitt
Ā 
sakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptsakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptSakshiAlex
Ā 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
Ā 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.pptGnanavi2
Ā 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
Ā 
Joss wright
Joss wrightJoss wright
Joss wrightoiisdp
Ā 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
Ā 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdflibowskymcinnisell69
Ā 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
Ā 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfHari319621
Ā 
Data Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsData Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsKaitlin Thaney
Ā 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaOECD Governance
Ā 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
Ā 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
Ā 

Similar to Fine-Grained Censorship Mapping (20)

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Ā 
Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101
Ā 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
Ā 
Addressing privacy concerns_in_the_age_of_federated_data_access
Addressing privacy concerns_in_the_age_of_federated_data_accessAddressing privacy concerns_in_the_age_of_federated_data_access
Addressing privacy concerns_in_the_age_of_federated_data_access
Ā 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Ā 
sakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptsakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.ppt
Ā 
1482734.ppt
1482734.ppt1482734.ppt
1482734.ppt
Ā 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
Ā 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.ppt
Ā 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
Ā 
Joss wright
Joss wrightJoss wright
Joss wright
Ā 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Ā 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdf
Ā 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
Ā 
Polinter09
Polinter09Polinter09
Polinter09
Ā 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
Ā 
Data Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsData Sharing and the Polar Information Commons
Data Sharing and the Polar Information Commons
Ā 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
Ā 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
Ā 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
Ā 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 

Fine-Grained Censorship Mapping

  • 1. Introduction Information Sources Legality and Ethics Early Results Questions Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics Joss Wright joss.wright@oii.ox.ac.uk Oxford Internet Institute University of Oxford . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 1/32
  • 2. Introduction Information Sources Legality and Ethics Early Results Questions 1 Introduction 2 Information Sources 3 Legality and Ethics 4 Early Results 5 Questions . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 2/32
  • 3. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet ļ¬ltering. Chinaā€™s ā€œGolden Shieldā€ is the classic example. Saudi Arabia presents perhaps the most extreme ļ¬ltering regime. (OpenNet Initiative) Many different technologies; many different ļ¬ltering targets; many different rationales and justiļ¬cations. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/32
  • 4. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify ļ¬ltering according to their focus: DNS Poisoning IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We can consider takedown, social pressure, legislation as ļ¬ltering, but will focus on technology. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/32
  • 5. Introduction Information Sources Legality and Ethics Early Results Questions Limitations A tradeoff between subtlety and computational requirements. Sophisticated methods require greater computational resources. At national scale, these can be severe. Centralization can cause problems, as seen with CleanFeed. Central management also raises administrative and organizational burdens. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/32
  • 6. Introduction Information Sources Legality and Ethics Early Results Questions Localized Filtering We can observe localized ļ¬ltering in response to local events. We therefore see ļ¬ltering differ across a state, rather than homogeneity. We also expect ļ¬ltering to vary over time. We may expect organizations to have one ļ¬ltering regime, even across a state. This can reveal ļ¬ltering tactics, methods, reasoning, limitations. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 6/32
  • 7. Introduction Information Sources Legality and Ethics Early Results Questions Existing Work HERDICT: crowdsources ļ¬ltering information from volunteer web users. OpenNet Initiative: use volunteers and direct means to examine ļ¬ltering around the world. Both consider national-level ļ¬ltering as homogeneous. Both also make judgements as to the nature of ļ¬ltering. Political, religious, social . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 7/32
  • 8. Introduction Information Sources Legality and Ethics Early Results Questions Existing Approaches HERDICT relies on users for information. Visitors to the website report sites that appear blocked. The website actively presents potentially blocked content, allowing users to verify if it is blocked. OpenNet Initiativeā€™s methods vary, but include direct investigation and liason with volunteers in blocked regions. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 8/32
  • 9. Introduction Information Sources Legality and Ethics Early Results Questions Fine-Grained Sources For ļ¬ne-grained mapping we wish to combine data gathered at various locations with GeoIP data at the city level. GeoIP databases are increasingly cheap and accurate. The problem is to get readings from a wide geographical distribution. Ideally, not just blocking status but type of blocking. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 9/32
  • 10. Introduction Information Sources Legality and Ethics Early Results Questions Limitations Crowdsourcing or using volunteers can be effective if the tool is sufļ¬ciently usable, but is limited: Undirected, inconsistent coverage. Direct investigation is expensive. Ideally we desire direct access to ļ¬ltered internet connections. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 10/32
  • 11. Introduction Information Sources Legality and Ethics Early Results Questions Direct Action Direct access to other connections is possible in some limited cases. Tor exit nodes, and similar services such as psiphon. VPN services or remote shells. Creatively-used public services ā€“ webservers, IRC, bittorrent... Access to DNS is very simple, and directly addresses one major type of ļ¬ltering. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 11/32
  • 12. Introduction Information Sources Legality and Ethics Early Results Questions Direct Action Problems Direct services are rare, especially in countries with interesting ļ¬ltering regimes. No-one wants to run Tor-like services in ļ¬ltered areas! VPN services are also rare. Remote shells are even more so. These services are typically offered to get past ļ¬ltering, not get in. Creative misuse of open services seems the most fruitful option. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 12/32
  • 13. Introduction Information Sources Legality and Ethics Early Results Questions Direct Action Mechanisms DNS is simple and effective for detecting DNS ļ¬ltering, but is not very useful beyond that. Tor and Tor-like services are rare, but wonderful. BitTorrent seems a likely candidate, and we have been investigating it, but consent is a serious issue. If only we could... botnets. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 13/32
  • 14. Introduction Information Sources Legality and Ethics Early Results Questions Legality and Ethics Is it legal to access blocked websites? Is it ethical to ask someone else to access blocked websites? Consent for automated tools. Is it legal to creatively abuse a service, with or without malicious intent? Is it ethical to open a service operator to repercussions based around such misuse? . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 14/32
  • 15. Introduction Information Sources Legality and Ethics Early Results Questions Legal Concerns HERDICT Legal FAQ: ā€Rules vary by country, but we know of no nation where it is illegal for you to report information about sites you cannot access.ā€ . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 15/32
  • 16. Introduction Information Sources Legality and Ethics Early Results Questions Legal Concerns Sites are sometimes blocked for serious legal or societal reasons: Pornography, homosexuality, lĆØse majestĆ©, insult to religion Reporting sites as blocked may well be legal, but detection attempts may cause legal or social consequences. When is the risk too small, and how can we judge this against arbitrary cultural contexts? . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 16/32
  • 17. Introduction Information Sources Legality and Ethics Early Results Questions Current Work Retrieved a list of 278 DNS servers across China from the APNIC WHOIS database. Selected the top 80 reported blocked websites according to HERDICT. Performed a DNS query for each site to each server. We have code to scan China for DNS servers, but have not deemed it necessary at this point. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 17/32
  • 18. Introduction Information Sources Legality and Ethics Early Results Questions Early Observations Initial observations: Many blocked sites are listed as non-existent in the majority of DNS servers tested. Several servers return no result for most blocked sites, but occasionally redirect requests to other DNS servers before doing so. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 18/32
  • 19. Introduction Information Sources Legality and Ethics Early Results Questions Early Observations DNS poisoning is rife: wujie.net 161 servers returned a response to wujie.net directed to only 9 separate IPs ā€“ none of which offer services, and are unrelated to wujie.net. Many blocked sites do get genuine DNS responses. In many cases we simply get no result, or a timeout. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 19/32
  • 20. Next slide: map of China showing cities for which we have data. . . . . . .
  • 21. Harbin Changchun Chaoyang Shenyang Baotou Beijing Hebei Tianjin Xining Jinan Qingdao Zhengzhou Xian Hefei Nanjing Shanghai Chengdu Wuhan Chongqing Ningbo Changsha Guiyang Fuzhou Xiamen GuangzhouHeyuan Dongguan Nanning Zhongshan Shenzhen . . . . . .
  • 22. Next slide: zoomed map of China showing cities for which we have data. . . . . . .
  • 23. Harbin Changchun Shenyang Chaoyang Baotou Beijing Tianjin Hebei Xining Jinan Qingdao Zhengzhou Xian Nanjing Hefei Shanghai Chengdu Wuhan Ningbo Chongqing Changsha Guiyang Fuzhou Xiamen Guangzhou Heyuan Dongguan Nanning Zhongshan Shenzhen . . . . . .
  • 24. Next slide: Relative likelihood that the DNS server will return ā€˜no resultā€™ when asked for a censored website. Larger and redder dots are more likely not to return a result. Note that if a result is given, it is not necessarily correct. (See next map.) . . . . . .
  • 25. Harbin Changchun Shenyang Chaoyang Baotou Beijing Tianjin Hebei Xining Jinan Qingdao Zhengzhou Xian Hefei Nanjing Shanghai Chengdu Wuhan Ningbo Chongqing Changsha Guiyang Fuzhou Xiamen Guangzhou Heyuan Dongguan Nanning Zhongshan Shenzhen . . . . . .
  • 26. Next slide: Relative likelihood that, if a DNS result is returned for a given site, that it is a ā€˜lieā€™. Speciļ¬cally, that the returned IP address does not point to the requested domain or a related domain. Typically, these false results point to a small number of IP addresses in Beijing. . . . . . .
  • 27. Harbin Changchun Shenyang Chaoyang Baotou Beijing Tianjin Hebei Xining Jinan Qingdao Zhengzhou Xian Hefei Nanjing Shanghai Chengdu Wuhan Ningbo Chongqing Changsha Guiyang Fuzhou Xiamen Guangzhou Heyuan Dongguan Nanning Zhongshan Shenzhen . . . . . .
  • 28. Introduction Information Sources Legality and Ethics Early Results Questions Results of Visualization We can clearly verify that ļ¬ltering is heterogeneous across China. Some cities show little DNS ļ¬ltering, some return no results, some return poisoned results, some do both! Chengdu, Shenzhen, Shanghai are notable ā€œtechā€ cities, and have little ļ¬ltering. Beijing is, perhaps surprisingly, relatively permissive. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 28/32
  • 29. Introduction Information Sources Legality and Ethics Early Results Questions Caveats Restricted list of DNS servers. I can get more, but will have to portscan China for them. DNS server in a city does not represent where the users originate. These maps do not show how many DNS servers were in each city, or give any distinction between them. 78 DNS servers in Beijing, only 1 in Xiamen. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 29/32
  • 30. Introduction Information Sources Legality and Ethics Early Results Questions Questions What are the legal and, importantly, ethical limits to what we can do in this area? What good services exist from which to ā€œbounceā€ connections? Speciļ¬cally, public services rather than individual services. Can we intelligently split on organizational as well as geographical lines. . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 30/32
  • 31. Introduction Information Sources Legality and Ethics Early Results Questions Questions How can we best represent this information? What will we learn when we repeat experiments over time looking for patterns? What questions would anyone like to ask? . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 31/32
  • 32. Introduction Information Sources Legality and Ethics Early Results Questions The End . . . . . . Joss Wright Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 32/32