SlideShare a Scribd company logo
1 of 44
Download to read offline
Monitoring Internet
Censorship
Linux Day 2013
Napoli, October 26 2013
Antonio Pescapè, pescape@unina.it
@ Linux Day 2013: Monitoring Internet Censorship

2
Internet Censorship

3
Agenda
} 

Part 1
} 
} 
} 
} 
} 
} 
} 

} 

Part II
} 

4

Some Example
Introduction to Internet Censorship
Censorship @ work
Monitoring Internet Censorship
Our Contribution
Open Questions
Conclusion
UBICA, User-Based Internet Censorship Analysis
Some Example

5
Example: Site Blocked

6
Example: TOM Skype

•  Different Versions Censor Differently
•  Censor and Surveillance / Surveillance Only
7
Example: Google Search (1/3)

8
Example: Google Search (2/3)

9
Example: Google Search (3/3)
}  Imagine

having to do research on the Tiananmen
Square Massacre for history homework and you
are only able to access bias information that the
government allows you to read.
}  Isn’t this a really bad research?
}  Isn’t this a violation of your rights and the
violation of the internet freedom?
}  The universal declaration of Human Rights say
“human beings shall enjoy freedom of speech…”
10
Introduction

11
Censorship: Introduction
} 

Startling growth in short time

} 

Change in source of information
- from libraries, books to internet
- boom in individual contribution
(book needs much investment, but internet not)

} 

Increase in individual inclusion
} 

} 

disclosure of ideologies, creativities, documents
which leads to virtual pollution

Intervention of authorities by
censorship
} 

12

nature of censorship varies acc. to states
Internet Censorship is Widespread
} 

Practiced in 59 countries around the world
} 
} 

} 

Many western countries
Several electoral democracies (e.g., S. Korea, Turkey) have
significant censorship
}  YouTube blocked in Turkey for two years
}  Many North Korean sites blocked in South Korea

Twelve countries have centralized infrastructure
for monitoring/blocking

13

Source: Open Network Initiative
Trend: Increasing Number of Users in NonWestern Regions

14
Examples of Recent Trends
} 

In 23 countries, a blogger or Internet user was
arrested for content posted online
} 
} 

} 

Chinese woman sent to labor camp for satirical Twitter
message
Indonesian woman fined for an email complaining about a
local hospital

Twelve countries instituted bans on Twitter,YouTube
or some other online social media service.

15
Internet Censorship by Governments
} 

Here s a list of countries who practices extreme levels of
internet censorship

* Identified by OpenNet Initiative and Reporters without borders

16
Why do countries censor?
} 

Political
stability

} 

National
security

} 

Social values

17
Internet Surveillance & Censorship
} 

Pros:
} 
} 
} 

Protecting children (Child violence and
pornography)
Control of terrorist activities
Crime control

}  Cons:
} 
} 
} 

18

Violate freedom of speech
Violate media freedom
Limited access to extensive source of information
Censorship Targets
UNHEALTY INFORMATION .

} 
} 
} 
} 
} 

Violent video games
Child pornography
Terrorism
Etc.

But also…
} 
} 
} 

19

Human rights activists
Anti-government organizations
Anti-government criticism issues
Censorship @ work

20
Conventional Internet Censorship
Censor	
  

Censor	
  
Firewall	
  

Alice
Punish	
  User	
  

Block	
  Traffic	
  
Censored	
  net	
  
Uncensored	
  net	
  

Bob

“Suppose Alice wants to get some content from Bob. If she accesses the Internet from
behind a censorship firewall then the censor may monitor or block communication with
Bob, and may even punish Alice for trying to communicate with Bob.”
21
Technical Enforcement
IP blocking
}  Domain Name System filtering &
redirection
}  URL filtering
}  Deep Packet filtering
}  Connection reset
}  Web feed blocking
}  Reverse surveillance
}  Self censorship
} 

22
Technical Enforcement: Blocking
} 

ISP acts on instructions
from a judge, government
official, etc.
} 
} 

Filtering: IP address, DNS
Keyword-based: search for
keyword in URL
} 

} 

China, Iran, Tunisia have such
systems in place

Common: Use of
centralized infrastructure
(e.g., routing)
23

Source: Renesys
Monitoring
Internet Censorship

24
Monitoring Censorship (1/3)
Herdict: Crowdsourcing reports of Internet censorship
}  Google Transparency Report: Monitor reachability of
online services
} 

25
Monitoring Censorship (2/3)

26

Source: http://www.thenutgraph.com/six-words-on-internet-censorship/
Monitoring Censorship (3/3)
} 

Google Transparency Report: Summary of all requests

27
Monitoring Censorship: Challenges
} 

“Censorship” is ill-defined
} 
} 

} 

Measurement tools can be blocked
} 
} 

} 

Measurements may be blocked
Reports may be blocked

Measurements tough to characterize
} 

} 

Personalization may be confused with censorship
Performance problems may be confused with censorship

Reports may be falsified

Running the tool may be incriminating

28
Problems with Current Approaches
Biased by what users choose to report
}  Lack of corroborating, open measurements
}  Not general (focused only on limited services)
}  Not longitudinal
}  Do not cover a set of ISPs or access modes within a
country
}  Do not run on a diversity of hardware
} 

29
Design Requirements
Easy to install and use: Should be easy to install and run
on a variety of platforms.
}  Cross-platform: Tests should be write once, run
anywhere.
}  Flexible: Should be capable of implementing a wide variety
of experiments, including many from the test specifications
from existing projects (e.g., OONI).
}  Secure: Arbitrary remote code execution is bad.
}  Extensible: Should be capable of incorporating new
experiments.
} 

30
Censorship: our contributions

31
Contributions
} 

UBICA, User-based Internet Censorship
Analysis

} 

Analysis of Country-wide Internet Outages
Caused by Censorship

32
UBICA

33

http://traffic.comics.unina.it/internetcensor.php
Detection of Country-wide Censorship Episodes
} 

We analyzed disruptions of Internet communications in
Egypt and Libya in response to civilian protests and threats
of civil war, by combining BGP updates, Ark traceroutes,
and darknet measurements.

34

The first two Libyan outages: (a) visibility of Libyan IPv4 prefixes in BGP; (b) unsolicited traffic to
UCSD telescope from Libya.
Open Questions

35
Questions
} 
} 

How widespread is Internet censorship?
How do countries enforce censorship?
} 

How does it evolve over time?
} 

} 

i.e. Iran

Does it coincide with other events?
} 

i.e. “Arab Spring”

} 

How can citizens circumvent it?

} 

How (else) might a government (or organization) exercise
control over its citizens?

36
Questions
} 

(Self-)Censorship is not limited to China—in France, Italy,
Austria, and Germany, sites such as Google, eBay, and Amazon
are required to block white supremacist and nazi-related
items.

} 

In France, one cannot buy Nazi paraphernalia from any
merchant. eBay cooperates with this law by blocking all
products and users linked to Nazism from their sites.
} 

37

Is this form of censorship more acceptable than Beijing s
policy of blocking sensitive topics? Keep in mind that buying
Nazi products is completely legal in the States.
Final Remarks
•  Censor and Surveillance change continuously
•  Importance of Interdisciplinary Research
•  Policy
•  Technology
•  Etc.
•  Importance of Crowd-sourced approaches

38
Conclusion

39
Linux Day 2013: take home message

40
Linux Day 2013: take home message
}  As

long as hackers are around…there will
always be ways to bypass Internet censorship!!!

} 

Here are some examples:
} 
} 
} 
} 
} 

41

Proxy websites
Java Anon Proxy
Psiphon
Tor (The Onion Router)
Sneakernets
Looking at the future: Hackers, Unite !!!

42
References/Credits
• 

Part of this talk contains slides or ideas from the following sources:
• 

GOVERNMENT REGULATION AND SURVEILLANCE OF THE
INTERNET, Ayman Irziqat, Katarzyna Kosarska, Sergio Pradel

• 

Measuring and Circumventing Internet Censorship and Control, Nick Feamster

• 

FREEDOM OF THE INTERNET

• 

Internet Censorship in Turkey: Stop Legalized Cyber-Murder

• 

Self-Censorship in China, Eric Schabel & Fahad Pervaiz

• Thanks/Credits to
•  Google
•  Herdict Project
•  ONI
•  Google Images
•  Images found thanks to Google Images
•  Giorgio Ventre for his “Looking at the future….”
43
Thank you for your attention!

?
Any Questions?
44

More Related Content

Viewers also liked

What is Internet Monitoring?
What is Internet Monitoring?What is Internet Monitoring?
What is Internet Monitoring?Spiral16
 
Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Paul Bradshaw
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Sanae El Habbari
 

Viewers also liked (7)

What is Internet Monitoring?
What is Internet Monitoring?What is Internet Monitoring?
What is Internet Monitoring?
 
Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
 

Similar to Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china文煜 王
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyAnahi Iacucci
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyMatt Imrie
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...dmcmenemy
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 

Similar to Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technology
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
IT does not stop
IT does not stopIT does not stop
IT does not stop
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks

  • 1. Monitoring Internet Censorship Linux Day 2013 Napoli, October 26 2013 Antonio Pescapè, pescape@unina.it
  • 2. @ Linux Day 2013: Monitoring Internet Censorship 2
  • 4. Agenda }  Part 1 }  }  }  }  }  }  }  }  Part II }  4 Some Example Introduction to Internet Censorship Censorship @ work Monitoring Internet Censorship Our Contribution Open Questions Conclusion UBICA, User-Based Internet Censorship Analysis
  • 7. Example: TOM Skype •  Different Versions Censor Differently •  Censor and Surveillance / Surveillance Only 7
  • 10. Example: Google Search (3/3) }  Imagine having to do research on the Tiananmen Square Massacre for history homework and you are only able to access bias information that the government allows you to read. }  Isn’t this a really bad research? }  Isn’t this a violation of your rights and the violation of the internet freedom? }  The universal declaration of Human Rights say “human beings shall enjoy freedom of speech…” 10
  • 12. Censorship: Introduction }  Startling growth in short time }  Change in source of information - from libraries, books to internet - boom in individual contribution (book needs much investment, but internet not) }  Increase in individual inclusion }  }  disclosure of ideologies, creativities, documents which leads to virtual pollution Intervention of authorities by censorship }  12 nature of censorship varies acc. to states
  • 13. Internet Censorship is Widespread }  Practiced in 59 countries around the world }  }  }  Many western countries Several electoral democracies (e.g., S. Korea, Turkey) have significant censorship }  YouTube blocked in Turkey for two years }  Many North Korean sites blocked in South Korea Twelve countries have centralized infrastructure for monitoring/blocking 13 Source: Open Network Initiative
  • 14. Trend: Increasing Number of Users in NonWestern Regions 14
  • 15. Examples of Recent Trends }  In 23 countries, a blogger or Internet user was arrested for content posted online }  }  }  Chinese woman sent to labor camp for satirical Twitter message Indonesian woman fined for an email complaining about a local hospital Twelve countries instituted bans on Twitter,YouTube or some other online social media service. 15
  • 16. Internet Censorship by Governments }  Here s a list of countries who practices extreme levels of internet censorship * Identified by OpenNet Initiative and Reporters without borders 16
  • 17. Why do countries censor? }  Political stability }  National security }  Social values 17
  • 18. Internet Surveillance & Censorship }  Pros: }  }  }  Protecting children (Child violence and pornography) Control of terrorist activities Crime control }  Cons: }  }  }  18 Violate freedom of speech Violate media freedom Limited access to extensive source of information
  • 19. Censorship Targets UNHEALTY INFORMATION . }  }  }  }  }  Violent video games Child pornography Terrorism Etc. But also… }  }  }  19 Human rights activists Anti-government organizations Anti-government criticism issues
  • 21. Conventional Internet Censorship Censor   Censor   Firewall   Alice Punish  User   Block  Traffic   Censored  net   Uncensored  net   Bob “Suppose Alice wants to get some content from Bob. If she accesses the Internet from behind a censorship firewall then the censor may monitor or block communication with Bob, and may even punish Alice for trying to communicate with Bob.” 21
  • 22. Technical Enforcement IP blocking }  Domain Name System filtering & redirection }  URL filtering }  Deep Packet filtering }  Connection reset }  Web feed blocking }  Reverse surveillance }  Self censorship }  22
  • 23. Technical Enforcement: Blocking }  ISP acts on instructions from a judge, government official, etc. }  }  Filtering: IP address, DNS Keyword-based: search for keyword in URL }  }  China, Iran, Tunisia have such systems in place Common: Use of centralized infrastructure (e.g., routing) 23 Source: Renesys
  • 25. Monitoring Censorship (1/3) Herdict: Crowdsourcing reports of Internet censorship }  Google Transparency Report: Monitor reachability of online services }  25
  • 26. Monitoring Censorship (2/3) 26 Source: http://www.thenutgraph.com/six-words-on-internet-censorship/
  • 27. Monitoring Censorship (3/3) }  Google Transparency Report: Summary of all requests 27
  • 28. Monitoring Censorship: Challenges }  “Censorship” is ill-defined }  }  }  Measurement tools can be blocked }  }  }  Measurements may be blocked Reports may be blocked Measurements tough to characterize }  }  Personalization may be confused with censorship Performance problems may be confused with censorship Reports may be falsified Running the tool may be incriminating 28
  • 29. Problems with Current Approaches Biased by what users choose to report }  Lack of corroborating, open measurements }  Not general (focused only on limited services) }  Not longitudinal }  Do not cover a set of ISPs or access modes within a country }  Do not run on a diversity of hardware }  29
  • 30. Design Requirements Easy to install and use: Should be easy to install and run on a variety of platforms. }  Cross-platform: Tests should be write once, run anywhere. }  Flexible: Should be capable of implementing a wide variety of experiments, including many from the test specifications from existing projects (e.g., OONI). }  Secure: Arbitrary remote code execution is bad. }  Extensible: Should be capable of incorporating new experiments. }  30
  • 32. Contributions }  UBICA, User-based Internet Censorship Analysis }  Analysis of Country-wide Internet Outages Caused by Censorship 32
  • 34. Detection of Country-wide Censorship Episodes }  We analyzed disruptions of Internet communications in Egypt and Libya in response to civilian protests and threats of civil war, by combining BGP updates, Ark traceroutes, and darknet measurements. 34 The first two Libyan outages: (a) visibility of Libyan IPv4 prefixes in BGP; (b) unsolicited traffic to UCSD telescope from Libya.
  • 36. Questions }  }  How widespread is Internet censorship? How do countries enforce censorship? }  How does it evolve over time? }  }  i.e. Iran Does it coincide with other events? }  i.e. “Arab Spring” }  How can citizens circumvent it? }  How (else) might a government (or organization) exercise control over its citizens? 36
  • 37. Questions }  (Self-)Censorship is not limited to China—in France, Italy, Austria, and Germany, sites such as Google, eBay, and Amazon are required to block white supremacist and nazi-related items. }  In France, one cannot buy Nazi paraphernalia from any merchant. eBay cooperates with this law by blocking all products and users linked to Nazism from their sites. }  37 Is this form of censorship more acceptable than Beijing s policy of blocking sensitive topics? Keep in mind that buying Nazi products is completely legal in the States.
  • 38. Final Remarks •  Censor and Surveillance change continuously •  Importance of Interdisciplinary Research •  Policy •  Technology •  Etc. •  Importance of Crowd-sourced approaches 38
  • 40. Linux Day 2013: take home message 40
  • 41. Linux Day 2013: take home message }  As long as hackers are around…there will always be ways to bypass Internet censorship!!! }  Here are some examples: }  }  }  }  }  41 Proxy websites Java Anon Proxy Psiphon Tor (The Onion Router) Sneakernets
  • 42. Looking at the future: Hackers, Unite !!! 42
  • 43. References/Credits •  Part of this talk contains slides or ideas from the following sources: •  GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET, Ayman Irziqat, Katarzyna Kosarska, Sergio Pradel •  Measuring and Circumventing Internet Censorship and Control, Nick Feamster •  FREEDOM OF THE INTERNET •  Internet Censorship in Turkey: Stop Legalized Cyber-Murder •  Self-Censorship in China, Eric Schabel & Fahad Pervaiz • Thanks/Credits to •  Google •  Herdict Project •  ONI •  Google Images •  Images found thanks to Google Images •  Giorgio Ventre for his “Looking at the future….” 43
  • 44. Thank you for your attention! ? Any Questions? 44