C 2017 Frederick Ernest Douglas CIRCUMVENTION of CENSORSHIP of INTERNET ACCESS and PUBLICATION

Total Page:16

File Type:pdf, Size:1020Kb

C 2017 Frederick Ernest Douglas CIRCUMVENTION of CENSORSHIP of INTERNET ACCESS and PUBLICATION c 2017 Frederick Ernest Douglas CIRCUMVENTION OF CENSORSHIP OF INTERNET ACCESS AND PUBLICATION BY FREDERICK ERNEST DOUGLAS DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2017 Urbana, Illinois Doctoral Committee: Associate Professor Matthew Caesar, Chair Associate Professor Nikita Borisov Professor Klara Nahrstedt Assistant Professor Eric Wustrow, University of Colorado, Boulder ABSTRACT Internet censorship of one form or another affects on the order of half of all internet users. Previous work has studied this censorship, and proposed techniques for circumventing it, ranging from making proxy servers avail- able to censored users, to tunneling internet connections through services such as voice or video chat, to embedding censorship circumvention in cloud platforms' front-end servers or even in ISP's routers. This dissertation describes a set of techniques for circumventing internet censorship building on and surpassing prior efforts. As is always the case, there are tradeoffs to be made: some of this work emphasizes deployability, and some aims for unstoppable circumvention with the assumption of sig- nificant resources. However, the latter techniques are not merely academic thought experiments: this dissertation also describes the experience of suc- cessfully deploying such a technique, which served tens of thousands of users. While the solid majority of previous work, as well as much of the work presented here, is focused on governments blocking access to sites and services hosted outside of their country, the rise of social media has created a new form of internet censorship. A country may block a social media platform, but have its own domestic version, on which it tightly controls what can be said. This dissertation describes a system for enabling users of such a platform to monitor for post deletions, and distribute the contents to other users. ii To my wife, my parents, and my cats Oolong and Lilly, for their love and support. iii ACKNOWLEDGMENTS I would like to acknowledge the people whom I worked with on these various projects: Nikita Borisov, Matthew Caesar, Daniel Ellard, Sergey Frolov, Alex Halderman, Christine Jones, Allison McDonald, Rorshach1, Steve Schultze, Will Scott, Weiyang Pan, Ben VanderSloot, and (last but not least!) Eric Wustrow. Additionally, I would like to thank the developers of the SoftEther VPN system, which the Salmon implementation is built upon, for releasing it under the GPL. I thank ntop for providing the deployable TapDance project with academic licenses for the zero-copy version of PF RING. 1Pseudonym. iv TABLE OF CONTENTS CHAPTER 1 INTRODUCTION . 1 1.1 Access Censorship . .3 1.2 Publication Censorship . .3 1.3 Structure . .4 CHAPTER 2 RELATED WORK . 7 2.1 Censorship of Access . .7 2.2 Censorship of Publication . 12 2.3 Summary . 14 CHAPTER 3 SALMON: ROBUST DISTRIBUTION OF PROXIES . 15 3.1 Problem and Design Overview . 16 3.2 Algorithm . 17 3.3 Implementation . 22 3.4 Evaluation . 33 3.5 Conclusion . 42 CHAPTER 4 GHOSTPOST: DISTRIBUTED SOCIAL MEDIA UN-DELETION . 44 4.1 Background . 44 4.2 Threat Model . 45 4.3 Design . 46 4.4 Centralization . 47 4.5 Implementation . 48 4.6 Evaluation . 50 4.7 Summary . 57 CHAPTER 5 DEPLOYABLE PASSIVE DECOY ROUTING . 58 5.1 Background: TapDance . 58 5.2 Implementation . 60 5.3 Deployment . 63 5.4 Challenges . 68 CHAPTER 6 FASTER UPLOAD IN PASSIVE DECOY ROUTING . 70 6.1 Upload-only Streams . 71 6.2 Implementation . 72 v CHAPTER 7 DITTOTAP: DECOY ROUTING WITH BETTER CAMOUFLAGE . 74 7.1 Implementation . 74 7.2 TCP Traffic Patterns . 76 7.3 Page Load Patterns . 79 7.4 Avoiding Startup Delay . 80 7.5 Full Page Mimicking . 81 7.6 Summary . 83 CHAPTER 8 CONCLUSION . 85 8.1 Future Work . 86 8.2 Future Challenges . 87 REFERENCES . 90 vi CHAPTER 1 INTRODUCTION Governments have always sought some degree of control over what their citizens say, regardless of the means of communication involved. Censorship has followed civilization onto the internet, with governments blocking traffic to undesirable web sites and services based in freer countries. Data from Freedom House indicates that on the order of half of the world's internet users live under some significant form of internet censorship (illustrated in Figure 1.1). Internet censorship includes simple techniques such as disruption of DNS resolutions of banned domain names [1] and blocking of flows to blacklisted IP addresses, as well as more sophisticated techniques, such as killing flows when deep packet inspection detects a banned keyword [2], identifying Tor connec- tions with traffic pattern fingerprinting [3, 4], and (not yet widely deployed, but practical) general fingerprinting of websites' traffic patterns within en- crypted tunnels [5,6]. Anti-censorship techniques should defeat any such censorship technique (with the possible exception of traffic fingerprinting, which is not yet a real issue and can typically be dealt with in a separate component [7]). The sim- plest technique is to connect (with encryption) to a proxy server: a server that performs internet communication on behalf of a client, making the client's internet location appear to be the proxy's address. A user with access to a proxy server has escaped the censor: the encrypted data being transferred be- tween the user and proxy is not visible to the censor, and no censor currently blocks encrypted communication entirely. However, the proxy approach relies on the censor not realizing the proxy is a proxy, at which point its IP address can simply be added to a block list. Any system employing proxy servers is attempting to reconcile the contradictory goals of widespread distribution of proxy serves, and keeping the identities of the proxy servers hidden from the censor. 1 Sites and services hosted within a censored country can be compelled to remove offending content. A censor seeking to block websites is really seeking to prevent the inward flow of unwanted ideas from other countries. However, blocking outside information is only half of the censor's task. About 1 million Internet users “Free” “Partly” or “Not Free” Internet user blob map: Internet freedom data: Mark Graham and Stefano De Sabbata, Internet Geographies https://freedomhouse.org/report/freedom-net/freedom-net-2016 at the Oxford Internet Institute (data source: World Bank 2011) No Data (License: CC BY 3.0) Figure 1.1: Freedom House's overview [8] of internet freedom, overlaid on a map of geographical distribution of internet users. Effective censorship must also prevent people from expressing their own ideas. Social media represents a unique challenge to a censor aiming for this goal. At a traditional newspaper, a handful of known employees write articles that can be carefully monitored, perhaps even requiring explicit ap- proval from the censor to publish. With social media, a significant fraction of the country's entire population is speaking its mind, spontaneously and constantly. Repressive governments, China in particular, attempt to control social media as tightly as they can, deleting undesirable posts. This dissertation presents work intended to enable the circumvention of both types of censorship: censorship preventing people from accessing exter- nal information (access censorship), and censorship preventing people from expressing themselves (publication censorship). 2 1.1 Access Censorship We can divide efforts to defeat access censorship into two categories: those in which circumvention resources are easily blocked, and must be kept hid- den from the censor, and those in which the circumvention is inextricably tied to a service that the censor is unwilling to block. This dissertation will describe a new technique of the former class: Salmon [9], which intelligently distributes proxy servers. It will also describe a new technique of the latter class: DittoTap, an advanced form of decoy routing (where censorship cir- cumvention happens within ISPs' routers). In addition to DittoTap, it will describe a successful effort to deploy a production-quality implementation of an existing decoy routing technique, TapDance1 [10], in the real world with tens of thousands of users (and thousands of concurrent users). Salmon has the advantage of being incrementally deployable, even by in- dividuals on home internet connections. The same is generally true of other easily-blocked-helper techniques, as well: the easily blocked helpers are typ- ically envisioned as individually volunteered proxy servers (or Tor hidden bridges). TapDance and DittoTap require the support of large ISPs, but draw close to the ultimate goal of censorship circumvention: a system that is freely available to the general public, provide high bandwidth and low latency, and cannot be blocked without severing internet connectivity to the outside world. 1.2 Publication Censorship Social media services are massively popular, and in particular have become a significant component of political discourse. If an educated population with exposure to the internet were denied access to social media platforms, the impetus to seek out effective circumvention techniques would increase dramatically. Therefore, an intelligent censoring government will provide its citizens with functional, well-designed social media platforms|that are entirely under its control. In this way, the government can prevent online 1This dissertation describes the development and large-scale deployment of a production-quality TapDance implementation. I was not involved in the original con- ceptual design or publication of TapDance. 3 communities of dissidents from forming, without angering its populace with the obviously and tangibly oppressive move of disallowing social media. With the perfectly free internet access provided by Salmon, or DittoTap, or other systems, people unhappy with the censored social media platforms available to them could in theory simply switch to an uncensored social media platform. However, network effects are powerful. Especially because not all users care about censorship, expecting the bulk of (for example) Sina Weibo users to use anti-censorship tools to switch to Twitter is unrealistic.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • Shedding Light on Mobile App Store Censorship
    Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China.
    [Show full text]
  • Internet Infrastructure Review Vol.27
    Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry∗
    Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry∗ Christopher McKnight Ian Goldberg Magnet Forensics University of Waterloo [email protected] [email protected] ABSTRACT worm based on an examination of the reverse-engineered code [17], The results of recent experiments have suggested that code stylom- casting style analysis as a forensic technique. etry can successfully identify the author of short programs from This technique, however, may be used to chill speech for soft- among hundreds of candidates with up to 98% precision. This poten- ware developers. There are several cases of developers being treated tial ability to discern the programmer of a code sample from a large as individuals of suspicion, intimidated by authorities and/or co- group of possible authors could have concerning consequences for erced into removing their software from the Internet. In the US, the open-source community at large, particularly those contrib- Nadim Kobeissi, the Canadian creator of Cryptocat (an online se- utors that may wish to remain anonymous. Recent international cure messaging application) was stopped, searched, and questioned events have suggested the developers of certain anti-censorship by Department of Homeland Security officials on four separate oc- and anti-surveillance tools are being targeted by their governments casions in 2012 about Cryptocat and the algorithms it employs [16]. and forced to delete their repositories or face prosecution. In November 2014, Chinese developer Xu Dong was arrested, pri- In light of this threat to the freedom and privacy of individual marily for political tweets, but also because he allegedly “committed programmers around the world, we devised a tool, Style Counsel, to crimes of developing software to help Chinese Internet users scale aid programmers in obfuscating their inherent style and imitating the Great Fire Wall of China” [4] in relation to proxy software he another, overt, author’s style in order to protect their anonymity wrote.
    [Show full text]
  • Social Media Contracts in the US and China
    DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L.
    [Show full text]
  • Digital Authoritarianism and the Global Threat to Free Speech Hearing
    DIGITAL AUTHORITARIANISM AND THE GLOBAL THREAT TO FREE SPEECH HEARING BEFORE THE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 26, 2018 Printed for the use of the Congressional-Executive Commission on China ( Available at www.cecc.gov or www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 30–233 PDF WASHINGTON : 2018 VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS Senate House MARCO RUBIO, Florida, Chairman CHRIS SMITH, New Jersey, Cochairman TOM COTTON, Arkansas ROBERT PITTENGER, North Carolina STEVE DAINES, Montana RANDY HULTGREN, Illinois JAMES LANKFORD, Oklahoma MARCY KAPTUR, Ohio TODD YOUNG, Indiana TIM WALZ, Minnesota DIANNE FEINSTEIN, California TED LIEU, California JEFF MERKLEY, Oregon GARY PETERS, Michigan ANGUS KING, Maine EXECUTIVE BRANCH COMMISSIONERS Not yet appointed ELYSE B. ANDERSON, Staff Director PAUL B. PROTIC, Deputy Staff Director (ii) VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID C O N T E N T S STATEMENTS Page Opening Statement of Hon. Marco Rubio, a U.S. Senator from Florida; Chair- man, Congressional-Executive Commission on China ...................................... 1 Statement of Hon. Christopher Smith, a U.S. Representative from New Jer- sey; Cochairman, Congressional-Executive Commission on China .................. 4 Cook, Sarah, Senior Research Analyst for East Asia and Editor, China Media Bulletin, Freedom House ..................................................................................... 6 Hamilton, Clive, Professor of Public Ethics, Charles Sturt University (Aus- tralia) and author, ‘‘Silent Invasion: China’s Influence in Australia’’ ............
    [Show full text]
  • Clickstream Analysis for Sybil Detection
    You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson†, Xiao Wang‡ Haitao Zheng and Ben Y. Zhao UC Santa Barbara †Northeastern University ‡Renren Inc. Sybils in Online Social Networks • Sybil (sɪbəl): fake identities controlled by attackers – Friendship is a pre-cursor to other malicious activities – Does not include benign fakes (secondary accounts) 20 Mutual Friends • Large Sybil populations* 14.3 Million Sybils (August, 2012) 20 Million Sybils (April, 2013) 2 *Numbers from CNN 2012, NYT 2013 Sybil Attack: a Serious Threat Malicious URL • Social spam – Advertisement, malware, phishing • Steal user information Taliban uses sexy Facebook profiles to lure troops into giving away military secrets" • Sybil-based political lobbying efforts 3 Sybil Defense: Cat-and-Mouse Game Social Networks A>ackers Stop automated account creation Crowdsourcing CAPTCHA solving •! CAPTCHA •! [USENIX’10] Detect suspicious profiles Realistic profile generation •! Spam features, URL blacklists •! Complete bio info, profile pic •! User report [WWW’12] Detect Sybil communities •! [SIGCOMM’06], [Oakland’08], [NDSS’09], [NSDI’12] 4 Graph-based Sybil Detectors •! A key assumption Sybil Real –! Sybils have difficulty “friending” normal users –! Sybils form tight-knit communities Is This True? •! Measuring Sybils in Renren social network [IMC’11] –! Ground-truth 560K Sybils collected over 3 years –! Most Sybils befriend real users, integrate into real-user communities –! Most Sybils don’t befriend other Sybils Sybils Don’t neeD to form communiGes! 5 Sybil Detection Without Graphs •! Sybil detection with static profiles analysis [NDSS’13] –! Leverage human intuition to detect fake profiles (crowdsourcing) –! Successful user-study shows it scales well with high accuracy •! Profile-based detection has limitations –! Some profiles are easy to mimic (e.g.
    [Show full text]
  • July 20, 2020 the Honorable David N. Cicilline Chairman
    July 20, 2020 The Honorable David N. Cicilline Chairman, Subcommittee on Antitrust, Commercial and Administrative Law U.S. House of Representatives Subject: House Judiciary Committee’s July 27 hearing of Apple’s CEO Tim Cook Chairman Cicilline, GreatFire is a China-based, anti-censorship organization that has been working since 2011 to bring transparency to online censorship in China and to help Chinese citizens to freely access information. We would like to draw to your attention Apple’s current policy of censorship of its App Store, which constitutes a serious abuse of its dominant position in the digital marketplace as well as a violation of human rights. On July 27, the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S House of Representatives Judiciary Committee will question Apple Inc. CEO Tim Cook, along with the CEOs of Amazon, Google and Facebook, as part of the Committee’s ongoing investigation into competition in the digital marketplace. The “Online Platforms and Market Power, Part 6: Examining the Dominance of Amazon, Facebook, Google and Apple” hearing will conclude an investigation which began last year and has already covered Apple’s anti-competitive practices and their impact, most notably on a “Free and Diverse Press”. We believe that one crucial consequence of Apple’s dominant position in the digital market has not been covered by the investigation: Apple’s opaque and arbitrary management of its China App Store. In China, currently Apple’s biggest market worldwide, Apple directly collaborates with the Chinese authorities to censor apps that the government does not want its population to use.
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]
  • The Impact of Media Censorship: Evidence from a Field Experiment in China
    The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle
    [Show full text]