SlideShare a Scribd company logo
1 of 44
Download to read offline
Monitoring Internet
Censorship
Linux Day 2013
Napoli, October 26 2013
Antonio Pescapè, pescape@unina.it
@ Linux Day 2013: Monitoring Internet Censorship

2
Internet Censorship

3
Agenda
} 

Part 1
} 
} 
} 
} 
} 
} 
} 

} 

Part II
} 

4

Some Example
Introduction to Internet Censorship
Censorship @ work
Monitoring Internet Censorship
Our Contribution
Open Questions
Conclusion
UBICA, User-Based Internet Censorship Analysis
Some Example

5
Example: Site Blocked

6
Example: TOM Skype

•  Different Versions Censor Differently
•  Censor and Surveillance / Surveillance Only
7
Example: Google Search (1/3)

8
Example: Google Search (2/3)

9
Example: Google Search (3/3)
}  Imagine

having to do research on the Tiananmen
Square Massacre for history homework and you
are only able to access bias information that the
government allows you to read.
}  Isn’t this a really bad research?
}  Isn’t this a violation of your rights and the
violation of the internet freedom?
}  The universal declaration of Human Rights say
“human beings shall enjoy freedom of speech…”
10
Introduction

11
Censorship: Introduction
} 

Startling growth in short time

} 

Change in source of information
- from libraries, books to internet
- boom in individual contribution
(book needs much investment, but internet not)

} 

Increase in individual inclusion
} 

} 

disclosure of ideologies, creativities, documents
which leads to virtual pollution

Intervention of authorities by
censorship
} 

12

nature of censorship varies acc. to states
Internet Censorship is Widespread
} 

Practiced in 59 countries around the world
} 
} 

} 

Many western countries
Several electoral democracies (e.g., S. Korea, Turkey) have
significant censorship
}  YouTube blocked in Turkey for two years
}  Many North Korean sites blocked in South Korea

Twelve countries have centralized infrastructure
for monitoring/blocking

13

Source: Open Network Initiative
Trend: Increasing Number of Users in NonWestern Regions

14
Examples of Recent Trends
} 

In 23 countries, a blogger or Internet user was
arrested for content posted online
} 
} 

} 

Chinese woman sent to labor camp for satirical Twitter
message
Indonesian woman fined for an email complaining about a
local hospital

Twelve countries instituted bans on Twitter,YouTube
or some other online social media service.

15
Internet Censorship by Governments
} 

Here s a list of countries who practices extreme levels of
internet censorship

* Identified by OpenNet Initiative and Reporters without borders

16
Why do countries censor?
} 

Political
stability

} 

National
security

} 

Social values

17
Internet Surveillance & Censorship
} 

Pros:
} 
} 
} 

Protecting children (Child violence and
pornography)
Control of terrorist activities
Crime control

}  Cons:
} 
} 
} 

18

Violate freedom of speech
Violate media freedom
Limited access to extensive source of information
Censorship Targets
UNHEALTY INFORMATION .

} 
} 
} 
} 
} 

Violent video games
Child pornography
Terrorism
Etc.

But also…
} 
} 
} 

19

Human rights activists
Anti-government organizations
Anti-government criticism issues
Censorship @ work

20
Conventional Internet Censorship
Censor	
  

Censor	
  
Firewall	
  

Alice
Punish	
  User	
  

Block	
  Traffic	
  
Censored	
  net	
  
Uncensored	
  net	
  

Bob

“Suppose Alice wants to get some content from Bob. If she accesses the Internet from
behind a censorship firewall then the censor may monitor or block communication with
Bob, and may even punish Alice for trying to communicate with Bob.”
21
Technical Enforcement
IP blocking
}  Domain Name System filtering &
redirection
}  URL filtering
}  Deep Packet filtering
}  Connection reset
}  Web feed blocking
}  Reverse surveillance
}  Self censorship
} 

22
Technical Enforcement: Blocking
} 

ISP acts on instructions
from a judge, government
official, etc.
} 
} 

Filtering: IP address, DNS
Keyword-based: search for
keyword in URL
} 

} 

China, Iran, Tunisia have such
systems in place

Common: Use of
centralized infrastructure
(e.g., routing)
23

Source: Renesys
Monitoring
Internet Censorship

24
Monitoring Censorship (1/3)
Herdict: Crowdsourcing reports of Internet censorship
}  Google Transparency Report: Monitor reachability of
online services
} 

25
Monitoring Censorship (2/3)

26

Source: http://www.thenutgraph.com/six-words-on-internet-censorship/
Monitoring Censorship (3/3)
} 

Google Transparency Report: Summary of all requests

27
Monitoring Censorship: Challenges
} 

“Censorship” is ill-defined
} 
} 

} 

Measurement tools can be blocked
} 
} 

} 

Measurements may be blocked
Reports may be blocked

Measurements tough to characterize
} 

} 

Personalization may be confused with censorship
Performance problems may be confused with censorship

Reports may be falsified

Running the tool may be incriminating

28
Problems with Current Approaches
Biased by what users choose to report
}  Lack of corroborating, open measurements
}  Not general (focused only on limited services)
}  Not longitudinal
}  Do not cover a set of ISPs or access modes within a
country
}  Do not run on a diversity of hardware
} 

29
Design Requirements
Easy to install and use: Should be easy to install and run
on a variety of platforms.
}  Cross-platform: Tests should be write once, run
anywhere.
}  Flexible: Should be capable of implementing a wide variety
of experiments, including many from the test specifications
from existing projects (e.g., OONI).
}  Secure: Arbitrary remote code execution is bad.
}  Extensible: Should be capable of incorporating new
experiments.
} 

30
Censorship: our contributions

31
Contributions
} 

UBICA, User-based Internet Censorship
Analysis

} 

Analysis of Country-wide Internet Outages
Caused by Censorship

32
UBICA

33

http://traffic.comics.unina.it/internetcensor.php
Detection of Country-wide Censorship Episodes
} 

We analyzed disruptions of Internet communications in
Egypt and Libya in response to civilian protests and threats
of civil war, by combining BGP updates, Ark traceroutes,
and darknet measurements.

34

The first two Libyan outages: (a) visibility of Libyan IPv4 prefixes in BGP; (b) unsolicited traffic to
UCSD telescope from Libya.
Open Questions

35
Questions
} 
} 

How widespread is Internet censorship?
How do countries enforce censorship?
} 

How does it evolve over time?
} 

} 

i.e. Iran

Does it coincide with other events?
} 

i.e. “Arab Spring”

} 

How can citizens circumvent it?

} 

How (else) might a government (or organization) exercise
control over its citizens?

36
Questions
} 

(Self-)Censorship is not limited to China—in France, Italy,
Austria, and Germany, sites such as Google, eBay, and Amazon
are required to block white supremacist and nazi-related
items.

} 

In France, one cannot buy Nazi paraphernalia from any
merchant. eBay cooperates with this law by blocking all
products and users linked to Nazism from their sites.
} 

37

Is this form of censorship more acceptable than Beijing s
policy of blocking sensitive topics? Keep in mind that buying
Nazi products is completely legal in the States.
Final Remarks
•  Censor and Surveillance change continuously
•  Importance of Interdisciplinary Research
•  Policy
•  Technology
•  Etc.
•  Importance of Crowd-sourced approaches

38
Conclusion

39
Linux Day 2013: take home message

40
Linux Day 2013: take home message
}  As

long as hackers are around…there will
always be ways to bypass Internet censorship!!!

} 

Here are some examples:
} 
} 
} 
} 
} 

41

Proxy websites
Java Anon Proxy
Psiphon
Tor (The Onion Router)
Sneakernets
Looking at the future: Hackers, Unite !!!

42
References/Credits
• 

Part of this talk contains slides or ideas from the following sources:
• 

GOVERNMENT REGULATION AND SURVEILLANCE OF THE
INTERNET, Ayman Irziqat, Katarzyna Kosarska, Sergio Pradel

• 

Measuring and Circumventing Internet Censorship and Control, Nick Feamster

• 

FREEDOM OF THE INTERNET

• 

Internet Censorship in Turkey: Stop Legalized Cyber-Murder

• 

Self-Censorship in China, Eric Schabel & Fahad Pervaiz

• Thanks/Credits to
•  Google
•  Herdict Project
•  ONI
•  Google Images
•  Images found thanks to Google Images
•  Giorgio Ventre for his “Looking at the future….”
43
Thank you for your attention!

?
Any Questions?
44

More Related Content

Viewers also liked

What is Internet Monitoring?
What is Internet Monitoring?What is Internet Monitoring?
What is Internet Monitoring?Spiral16
 
Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Paul Bradshaw
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Sanae El Habbari
 

Viewers also liked (7)

What is Internet Monitoring?
What is Internet Monitoring?What is Internet Monitoring?
What is Internet Monitoring?
 
Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
Standards & Satisfaction - MEC AIESEC in MOROCCO 1415
 

Similar to Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china文煜 王
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyAnahi Iacucci
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyMatt Imrie
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...dmcmenemy
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 

Similar to Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technology
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
IT does not stop
IT does not stopIT does not stop
IT does not stop
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Linux Day 2013: Monitoring Internet Censorship and Circumventing Blocks

  • 1. Monitoring Internet Censorship Linux Day 2013 Napoli, October 26 2013 Antonio Pescapè, pescape@unina.it
  • 2. @ Linux Day 2013: Monitoring Internet Censorship 2
  • 4. Agenda }  Part 1 }  }  }  }  }  }  }  }  Part II }  4 Some Example Introduction to Internet Censorship Censorship @ work Monitoring Internet Censorship Our Contribution Open Questions Conclusion UBICA, User-Based Internet Censorship Analysis
  • 7. Example: TOM Skype •  Different Versions Censor Differently •  Censor and Surveillance / Surveillance Only 7
  • 10. Example: Google Search (3/3) }  Imagine having to do research on the Tiananmen Square Massacre for history homework and you are only able to access bias information that the government allows you to read. }  Isn’t this a really bad research? }  Isn’t this a violation of your rights and the violation of the internet freedom? }  The universal declaration of Human Rights say “human beings shall enjoy freedom of speech…” 10
  • 12. Censorship: Introduction }  Startling growth in short time }  Change in source of information - from libraries, books to internet - boom in individual contribution (book needs much investment, but internet not) }  Increase in individual inclusion }  }  disclosure of ideologies, creativities, documents which leads to virtual pollution Intervention of authorities by censorship }  12 nature of censorship varies acc. to states
  • 13. Internet Censorship is Widespread }  Practiced in 59 countries around the world }  }  }  Many western countries Several electoral democracies (e.g., S. Korea, Turkey) have significant censorship }  YouTube blocked in Turkey for two years }  Many North Korean sites blocked in South Korea Twelve countries have centralized infrastructure for monitoring/blocking 13 Source: Open Network Initiative
  • 14. Trend: Increasing Number of Users in NonWestern Regions 14
  • 15. Examples of Recent Trends }  In 23 countries, a blogger or Internet user was arrested for content posted online }  }  }  Chinese woman sent to labor camp for satirical Twitter message Indonesian woman fined for an email complaining about a local hospital Twelve countries instituted bans on Twitter,YouTube or some other online social media service. 15
  • 16. Internet Censorship by Governments }  Here s a list of countries who practices extreme levels of internet censorship * Identified by OpenNet Initiative and Reporters without borders 16
  • 17. Why do countries censor? }  Political stability }  National security }  Social values 17
  • 18. Internet Surveillance & Censorship }  Pros: }  }  }  Protecting children (Child violence and pornography) Control of terrorist activities Crime control }  Cons: }  }  }  18 Violate freedom of speech Violate media freedom Limited access to extensive source of information
  • 19. Censorship Targets UNHEALTY INFORMATION . }  }  }  }  }  Violent video games Child pornography Terrorism Etc. But also… }  }  }  19 Human rights activists Anti-government organizations Anti-government criticism issues
  • 21. Conventional Internet Censorship Censor   Censor   Firewall   Alice Punish  User   Block  Traffic   Censored  net   Uncensored  net   Bob “Suppose Alice wants to get some content from Bob. If she accesses the Internet from behind a censorship firewall then the censor may monitor or block communication with Bob, and may even punish Alice for trying to communicate with Bob.” 21
  • 22. Technical Enforcement IP blocking }  Domain Name System filtering & redirection }  URL filtering }  Deep Packet filtering }  Connection reset }  Web feed blocking }  Reverse surveillance }  Self censorship }  22
  • 23. Technical Enforcement: Blocking }  ISP acts on instructions from a judge, government official, etc. }  }  Filtering: IP address, DNS Keyword-based: search for keyword in URL }  }  China, Iran, Tunisia have such systems in place Common: Use of centralized infrastructure (e.g., routing) 23 Source: Renesys
  • 25. Monitoring Censorship (1/3) Herdict: Crowdsourcing reports of Internet censorship }  Google Transparency Report: Monitor reachability of online services }  25
  • 26. Monitoring Censorship (2/3) 26 Source: http://www.thenutgraph.com/six-words-on-internet-censorship/
  • 27. Monitoring Censorship (3/3) }  Google Transparency Report: Summary of all requests 27
  • 28. Monitoring Censorship: Challenges }  “Censorship” is ill-defined }  }  }  Measurement tools can be blocked }  }  }  Measurements may be blocked Reports may be blocked Measurements tough to characterize }  }  Personalization may be confused with censorship Performance problems may be confused with censorship Reports may be falsified Running the tool may be incriminating 28
  • 29. Problems with Current Approaches Biased by what users choose to report }  Lack of corroborating, open measurements }  Not general (focused only on limited services) }  Not longitudinal }  Do not cover a set of ISPs or access modes within a country }  Do not run on a diversity of hardware }  29
  • 30. Design Requirements Easy to install and use: Should be easy to install and run on a variety of platforms. }  Cross-platform: Tests should be write once, run anywhere. }  Flexible: Should be capable of implementing a wide variety of experiments, including many from the test specifications from existing projects (e.g., OONI). }  Secure: Arbitrary remote code execution is bad. }  Extensible: Should be capable of incorporating new experiments. }  30
  • 32. Contributions }  UBICA, User-based Internet Censorship Analysis }  Analysis of Country-wide Internet Outages Caused by Censorship 32
  • 34. Detection of Country-wide Censorship Episodes }  We analyzed disruptions of Internet communications in Egypt and Libya in response to civilian protests and threats of civil war, by combining BGP updates, Ark traceroutes, and darknet measurements. 34 The first two Libyan outages: (a) visibility of Libyan IPv4 prefixes in BGP; (b) unsolicited traffic to UCSD telescope from Libya.
  • 36. Questions }  }  How widespread is Internet censorship? How do countries enforce censorship? }  How does it evolve over time? }  }  i.e. Iran Does it coincide with other events? }  i.e. “Arab Spring” }  How can citizens circumvent it? }  How (else) might a government (or organization) exercise control over its citizens? 36
  • 37. Questions }  (Self-)Censorship is not limited to China—in France, Italy, Austria, and Germany, sites such as Google, eBay, and Amazon are required to block white supremacist and nazi-related items. }  In France, one cannot buy Nazi paraphernalia from any merchant. eBay cooperates with this law by blocking all products and users linked to Nazism from their sites. }  37 Is this form of censorship more acceptable than Beijing s policy of blocking sensitive topics? Keep in mind that buying Nazi products is completely legal in the States.
  • 38. Final Remarks •  Censor and Surveillance change continuously •  Importance of Interdisciplinary Research •  Policy •  Technology •  Etc. •  Importance of Crowd-sourced approaches 38
  • 40. Linux Day 2013: take home message 40
  • 41. Linux Day 2013: take home message }  As long as hackers are around…there will always be ways to bypass Internet censorship!!! }  Here are some examples: }  }  }  }  }  41 Proxy websites Java Anon Proxy Psiphon Tor (The Onion Router) Sneakernets
  • 42. Looking at the future: Hackers, Unite !!! 42
  • 43. References/Credits •  Part of this talk contains slides or ideas from the following sources: •  GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET, Ayman Irziqat, Katarzyna Kosarska, Sergio Pradel •  Measuring and Circumventing Internet Censorship and Control, Nick Feamster •  FREEDOM OF THE INTERNET •  Internet Censorship in Turkey: Stop Legalized Cyber-Murder •  Self-Censorship in China, Eric Schabel & Fahad Pervaiz • Thanks/Credits to •  Google •  Herdict Project •  ONI •  Google Images •  Images found thanks to Google Images •  Giorgio Ventre for his “Looking at the future….” 43
  • 44. Thank you for your attention! ? Any Questions? 44