Internet Censorship in Thailand: User Practices and Potential Threats
Total Page:16
File Type:pdf, Size:1020Kb
Internet Censorship in Thailand: User Practices and Potential Threats Genevieve Gebhart∗†1, Anonymous Author 2, Tadayoshi Kohno† ∗Electronic Frontier Foundation †University of Washington [email protected] [email protected] 1 Abstract—The “cat-and-mouse” game of Internet censorship security community has proposed novel circumvention and circumvention cannot be won by capable technology methods in response [10, 25, 38]. alone. Instead, that technology must be available, The goal of circumventing censorship and attaining freer comprehensible, and trustworthy to users. However, the field access to information, however, relies on those largely focuses only on censors and the technical means to circumvent them. Thailand, with its superlatives in Internet circumvention methods being available, comprehensible, use and government information controls, offers a rich case and trustworthy to users. Only by meeting users’ needs can study for exploring users’ assessments of and interactions with circumvention tools realize their full technical capabilities. censorship. We survey 229 and interview 13 Internet users in With this goal in mind, the field lacks sufficient inquiry Thailand, and report on their current practices, experienced into the range of user perceptions of and interactions with and perceived threats, and unresolved problems regarding censorship. How do users assess censored content? What is censorship and digital security. Our findings indicate that the range of their reactions when they encounter existing circumvention tools were adequate for respondents to censorship? How does censorship affect the way they not access blocked information; that respondents relied to some only access but also produce information? extent on risky tool selection and inaccurate assessment of blocked content; and that attempts to take action with In addition to guiding more thorough anti-circumvention sensitive content on social media led to the most concrete strategies, these questions about users and censorship can threats with the least available technical defenses. Based on act as a lens into broader security issues. Users’ these findings and in direct response to these problems, we perspectives on censorship have wide-ranging implications make recommendations for shifting objectives in anti- for security behaviors both on and offline [51, 55], censorship work, as well as for technical directions and future especially in the politically repressive, low-resource research to address users’ on-the-ground needs. environments in which common-sense censorship circumvention technologies are most needed. Looking at 1. Introduction users’ censorship circumvention strategies can produce insights into the vulnerabilities of those strategies and the The “cat-and-mouse” game of Internet censorship and varied content perceptions, risk assessments, and self- circumvention cannot be won by capable technology alone. censorship practices that inform them. Overall, these This ongoing struggle generally pits government-level questions can guide research priorities toward safer Internet censors seeking to block citizens’ access to content against use. researchers and developers devising ways to circumvent In order to address the gap in understanding around users such blocks. In the middle, users face the often-overlooked and censorship, we report on the results of online surveys task of putting these circumvention tools into action and and in-depth interviews with users of the Internet in reconciling them with on-the-ground conditions. Thailand. This effort represents a cross-disciplinary The bulk of research on censorship circumvention collaboration among authors from information science, focuses on the former two sides of this “game” and their sociology, and computer security, as well as Southeast deployment of increasingly sophisticated technologies Asian studies. Using standard sampling methodologies, we against each other. On one side, government censorship surveyed 229 and interviewed 13 respondents until policies have received in-depth study [28, 46, 54], and reaching a “point of saturation” at which new respondents corresponding technical measurements of censorship are did not reveal new information. These methods were well developed [1, 14, 16, 47, 53]. On the other side, the approved through our institution’s IRB to protect respondents’ privacy and safety. This deep dive into users in a particular setting—in this 1. Genevieve Gebhart conducted this research at the University of case, Thailand under military dictatorship—allows us to Washington. She is now at the Electronic Frontier Foundation. have a concrete, informed discussion about the risks and 2. The second author is a Thai citizen and preferred to remain anonymous. challenges real individuals face with existing technologies in a repressive environment. We focus our investigation on directions to address respondents’ three unresolved Thailand for the superlatives it exhibits in information problems above: a browser extension to aid in content controls, government repression, and Internet use. assessment, tool delivery strategies to help with tool Conclusions about our sample provide lessons for efforts to selection, and changes to build plausible deniability into protect users in other politically repressive contexts, existing social media platforms. We hope these particularly in neighboring Southeast and East Asian states. recommendations for future action, and the findings on The challenges and nuances of this extreme environment which they draw, will inform a next generation of anti- can also motivate the development of stronger security censorship tools even more closely tied to real users’ measures valuable to users in any setting. practices and challenges. We organize our findings around users’ current practices, threats, and unresolved problems, as well as other pertinent 2. Background and Related Work observations. Here we preview the takeaways from each section: To provide the necessary context for our respondents’ • Current practices. Most respondents were able to survey and interview responses, we offer brief background access censored content with existing technical tools on Internet censorship in Thailand before situating our and ad hoc methods. However, respondents tended study within three areas of related work: user practices and to search for new tools every time they encountered needs, censorship circumvention and resistant systems, and blocked content, an incident-driven strategy that left the impact of censorship on user behavior. them vulnerable to malware and surveillance. Further, respondents did not always accurately assess the actors and methods behind blocked 2.1. Internet Censorship in Thailand content. Respondents also took extensive precautions on social media to avoid consequences With unique censorship implementation and rationale, as from their peers as well as from the government. well as an escalating environment of direct and indirect • Threats. Respondents faced direct, concrete threats censorship, Thailand represents a valuable case study in on social media, primarily from politically motivated how users interact with Internet censorship. peers. Respondents’ perceived, hypothetical threats Internet censorship in Thailand was formally legislated revolved around uncertain, self-contradictory with the Computer Crime Act of 2007. Among other conceptions of government capacity and will. These provisions, this act criminalized the concealment of one’s vague perceptions nevertheless informed IP address, a key element of technical censorship respondents’ behavior. We also highlight threats that circumvention strategies, thus ushering in “much more respondents may have overlooked, including draconian Internet censorship than in China, Saudi Arabia, government phishing and malicious proxies. Iran, or even Vietnam” [56]. The act has faced international • Unresolved problems. Respondents’ most urgent criticism in particular for the broad discretion it gives the unresolved problems were with content assessment, government to interpret what does or does not constitute a tool selection, and safe engagement on social media. computer crime violation [49]. • Additional observations. Both quantitative and Since then, the volume, range, and methods for qualitative evidence pointed to a correlation between restricting blocked content have accelerated. Tests in 2006, how often respondents encountered blocked content 2010, and after the most recent military coup in 2014 found and their tendency to self-censor. Further, blocked that implementation of censorship was highly inconsistent content had complicated meaning and symbolism among Thai ISPs in terms of content filtered, mechanisms even to respondents who did not want or need to used to filter it, and block pages visible to users as a result access it. Finally, respondents did not exhibit [40, 41, 48]. Such large-scale variation poses a challenge to exclusively pro- or anti-censorship attitudes. technical measurements, making user testimony particularly valuable. Together, these findings motivate a discussion about The defining characteristic of censorship in Thailand is shifting objectives in censorship work in particular and lèse majesté, a Thai law that criminalizes insulting, security research in general. Our findings demonstrate that threatening, or defaming Thailand’s monarchy, particularly fighting censorship requires more than access to blocked the late King Bhumibol. With 70 years on the throne and content;