<<

and Circumvention Briefing Note

Madeline Bersch and Matthew Wallin - June 2014

What types of information Key Takeaways: are censored on the Internet? • There are a variety of direct and Who does this censoring? What indirect forms of online censorship. tools exist to circumvent this • Foreign governments employ several of these techniques to enforce online censorship? censorship. Interact • Several types of tools are available for Join the discussion on censorship at #ASPcensorship censorship circumvention. Discuss circumvention with the authors at • The U.S. is a major force in promoting @MaddyBersch and @MatthewRWallin anti-censorship tools. Learn more about ASP and our work in diplomacy at @amsecproject

Introduction Types of Censorship Recent news of the failed “Cuban ” and There are four main categories of information increased censorship in have reignited the blocking online: attention paid to how the promotes its ideals abroad. Around the world, thousands of 1. Services, such as or the web; such as those focused on , 2. Content, such as that of political opposition political opposition, and human rights are blocked websites, independent news sites, or human from public view, preventing the dissemination of rights organizations; great volumes of important information. 3. Users, or blocking content by specific Though U.S. should not rely persons, such as human rights advocates or on the internet, it is increasingly becoming an political dissidents; important foreign policy tool. Recognizing this, the U.S. supports a variety of key tools allowing users to 4. Search engines, preventing search results circumvent online. from leading to specific websites.1 This fact sheet provides a brief overview of the In order to specify the content or category to be types of information blocking, a selection of blocked, the blocker may use an IP address; port countries of concern, several means to circumvent or protocol; ; URL; content signature, , and the U.S. role in censorship or keyword. These resources may be used to circumvention. distinguish the exact content to be prevented from appearing in a user’s results or .2 Furthermore, Internet censorship is carried out in several less-direct ways highlighted in recent news stories. These methods include, but are not limited to: • Restricting the speed of the Internet to impede the viewing and downloading of information and materials; • Raising the cost of to levels that are cost-prohibitive to the population; • Monitoring activity to discourage the population from viewing specific websites or classes of websites because the population knows they are being watched. Known Blockers Around the world, several authoritarian regimes are especially known for their censorship of the web. and are two such countries. • China

o China uses a wide range of censorship techniques. The “Great ” includes the blocking of Chinese microblog sites and other “politically sensitive sites” such as , Twitter, and .3,4 Reports that these sites were to be unblocked in Shanghai were later refuted by Chinese authorities.5

o Facebook and Twitter have been blocked in mainland China since 2009.6 This censorship gave rise to , a collection of sites similar to Twitter, which now boasts over 500 million users. 7,8 However, Weibo is still subject to censorship.9

o Censorship is not always flawless. In January, a massive affecting two-thirds of Chinese Internet traffic was allegedly caused by a malfunction of the “,” China’s Internet control infrastructure. For over an hour, millions of users were rerouted to servers owned, ironically, by a company that works to fight web censorship.10 • Iran

o Iran censors web content in a variety of ways, including filtering websites, limiting Internet speed, and monitoring the web activity of individual citizens and bloggers.11

o In Iran, nearly half of the 500 most popular overall Internet sites are blocked. Many websites categorized as “art,” “news”, or “society” are blocked, as are websites focused on specific content such as politics or criticism of the government.12,13

o Across the country, Internet speed is limited to a maximum of 128 kbps, about twice the speed of a dial-up connection but 50 times slower than a typical U.S. Internet connection.14 This speed, often as slow as 6 kbps, renders online information sharing extremely difficult and nearly impossible.15

o Currently, Iran is collaborating with China to create a “National Information Network” in Iran, essentially a “clean internet” that would provide access only to content that has been approved by the Iranian government.16,17 • Turkey

o While Turkey is not as historically known for policing its networks, recent events have raised concerns.

o A law was passed earlier this year allowing the country’s authority to websites without a court order.18

o In March, after an audio recording of a high-level meeting which reportedly implicated several high-level officials in a corruption investigation was leaked on Twitter, Prime Minister Recep Tayyip Erdogan called for the government to block the social media site.19

o Following this, YouTube was blocked after an audio recording of a high-level security meeting detailing possible action in was uploaded to the site.20

o Turkish courts eventually reversed the blocking of both sites and Twitter. However, authorities defied the YouTube court order and continued to block the video sharing site.21,22 Turkey finally unblocked YouTube access in early June, 2014.23 •

o Recent news has also highlighted Cuba’s censorship of the Internet, mainly done through excessive charges for access and slowing the speed of the Internet.24

o An initial lack of a telecommunications structure contributed to a very miniscule portion of the population having access to Internet at home; only a small percentage of Cubans have access to the Internet at work, which often consists of only the Cuban .25

o Government-run Internet cafes provide a common source of web access, but at an expense of $6- $10 per hour of unlimited use. In a country where the average weekly salary is only $20—access is cost-prohibitive for most.26

o Additionally, despite recent investments made in the country’s telecommunications structure, Cuba possesses the lowest connection speed in the Western Hemisphere, according to a Analytics study.27 Circumvention Tools There are four main types of technical tools used to circumvent Internet censorship. • Proxies

o The use of proxies in bypassing Internet censorship is useful for accessing specific blocked foreign websites. In this case, the user may utilize a foreign proxy with compatible programs to access the .28 A is essentially an “intermediary computer,” typically located in another country, that is able to access the blocked site. This proxy is used to find and return information for the user while disguising his or her IP address.29 • Tunneling/VPN

o A , or VPN, allows a user to create an encrypted “tunnel” to a different computer which may then be used to access the Internet. 30 The VPN/tunnel “wraps” the user’s to appear the same as other web traffic. As it is encrypted, the tunneled traffic is difficult to access or intercept by normal web filters.31 • DNS-based filters

o The , or DNS, is a system that converts a website’s numeric IP address to a standard URL.32 DNS filters, while often put into place to block a specific web IP address, can also be used to bypass censorship by changing the DNS server of the provider of the website to be accessed. As long as the second server is not also blocked, it is possible to navigate around the censorship.33 • Telescopic crypto (onion )

o works by creating a system of network connections “that resist , , and other attacks” by outside parties.34 Essentially, it “distribut[es] [web activity] over several places on the Internet” so no one point can link to a user’s destination.35 The network then displays only that communication is occurring, not which parties are communicating with one another.36

o is one of the most well-known onion routing services, and was originally developed by the U.S. Navy to protect government communications. Today, it is used to create a wall of privacy between an internet user and another party monitoring the internet.37 U.S. Role in Censorship Circumvention The United States plays a strong role in promoting censorship circumvention, funding programs and tools advancing Internet freedom, countering Internet censorship, supporting secure communications, and contributing to policy and research programs for those facing censorship, as well as other related objectives.38 Some examples and figures are highlighted below. • From 2008 to 2012, the Department of State and USAID have contributed more than $100 million in support of Internet freedom programs.39 In 2013 alone, the U.S. Department of State and the U.S. Agency for International Development (USAID) gave $25 million in awards to groups focused on censorship circumvention.40 • The Broadcasting Board of Governors is an independent federal agency that oversees U.S. international broadcasting. Its target audience includes those in countries subject to internet and traditional media censorship. 41

o The , part of Radio Free Asia within the Board, funds numerous projects dedicated to advancing Internet freedom and circumventing its censorship. Projects include developing an iOS version of TextSecure, an encrypted text messaging application currently only available on Android devices; Cupcake Bridge, a browser extension that allows users to act as Tor bridges automatically, removing the need to install specialized software; and the translating of online toolkits from Security-in- a-box, a program designed to educate users on how to circumvent Internet censorship and remain undetected.42 • The Tor Project receives significant funding from the U.S. Government.43 • The U.S. is also a member of the Freedom Online Coalition, a collection of 22 like-minded countries working to advance “the ability of individuals to exercise their human rights and fundamental freedoms online.”44 The Coalition works with both civil society and the private sector, often working through multilateral organizations to protect and increase users’ rights on the Internet. A Coalition conference recently took place in Estonia in late April 2014.45 Next Steps Issues surrounding internet censorship have wide-reaching consequences not exclusively limited to . The U.S. has a variety of interests it should consider as its role in promoting freedomof communication evolves. Some of these issues include: • Cyber security as an issue of personal security—How do circumvention, security of electronic data, and protection of fit into this? • How do anonymity tools threaten or increase security of the U.S.? • What role should the U.S. play considering the increasing popularity of mobile platforms? • How can the U.S. work with foreign parties, whether publics or governments, to increase freedom to access online information? • What role do non-state actors play in anonymity, circumvention and censorship? • How do U.S. laws affecting usage of the internet affect the global scene for online communication? While censorship circumvention is vital to promoting U.S. foreign policy, it is also not always effective against countermeasures, and should not be the end goal. It is necessary for U.S. government leaders to work with their foreign counterparts to not only fund and develop censorship circumvention programs, but to foster a broader dialogue on the subject and call for increased awareness of the importance of an open Internet for the countries in which this is not a current reality.

Madeline Bersch is a Research Assistant & Intern at the American Security Project. She graduated from the University of Maryland College Park in May 2014 with a degree in Government & Politics and minors in Arabic and Global Terrorism.

Matthew Wallin is a Fellow at the American Security Project and holds a Master’s in Public Diplomacy from the University of Southern California. (Endnotes)

1. Callanan, Cormac, Hein Dries-Ziekenheiner, Alberto Escudero-Pascual, and Robert Guerra, Leaping Over the Firewall: A Review of Censorship Circumvention Tools, Pg. 19-20, , April 2011,http://www.freedomhouse.org/sites/default/files/ inline_images/Censorship.pdf Accessed May 13, 2014 2. Ibid. 3. Woollastno, Victoria, China lifts ban on Facebook – but only for people living in a 17 square mile area of Shanghai, Daily Mail Online, September 25, 2013, http://www.dailymail.co.uk/sciencetech/article-2431861/China-lifts-ban-Facebook--people-living- working-small-area-Shanghai.html Accessed May 13, 2014 4. Chen, George, China to lift ban no Facebook – but only within Shanghai free-trade zone, South China Morning Post, September 25, 2013, http://www.scmp.com/news/china/article/1316598/exclusive-china-lift-ban-facebook-only-within-shanghai-free-trade- zone Accessed May 13, 2014 5. Rigg, Jamie, Chinese Squashes Claims of Less Restricted Internet in Shanghai Zone, Endgadget, http://www.engad- get.com/2013/09/26/china-not-unblocking-facebook-twitter-nyt-shanghai/ Accessed May 22, 2014 6. Ibid. 7. Pepitone, Julianne, Meet Sina Weibo and Alibaba, the Chinese E-Giants Comings to U.S., NBC News, March 14, 2014, http://www. nbcnews.com/tech/social-media/meet-sina-weibo-alibaba-chinese-e-giants-coming-u-s-n54741 Accessed May 13, 2014 8. Hua, Yu, The Censorship Pendulum, The New York Times, February 4, 2014, http://www.nytimes.com/2014/02/05/opinion/yu- hua-chinas-censorship-pendulum.html?ref=internetcensorship Accessed May 13, 2014 9. Ibid. 10. Qin, Amy, Chinese Web Outge Blamed on Censorship Glitch, The New York Times, January 22, 2014, http://sinosphere.blogs. nytimes.com/2014/01/22/chinese-web-outage-blamed-on-censorship-glitch/?ref=internetcensorship Accessed May 13, 2014 11. Ministry of Communications and Information Technology, International Campaign for Human Rights in Iran, August 21, 2013, http://www.iranhumanrights.org/2013/08/ministry-communications/ Accessed May 13, 2014 12. Lee, Timothy B., Here’s how Iran censors the Internet, The Washington Post, August 15, 2013, http://www.washingtonpost.com/ /the-switch/wp/2013/08/15/heres-how-iran-censors-the-internet/ Accessed May 13, 2014 13. Ministry of Communications and Information Technology, International Campaign for Human Rights in Iran, August 21, 2013, http://www.iranhumanrights.org/2013/08/ministry-communications/ Accessed May 13, 2014 14. Lee, Timothy B., Here’s how Iran censors the Internet, The Washington Post, August 15, 2013, http://www.washingtonpost.com/ blogs/the-switch/wp/2013/08/15/heres-how-iran-censors-the-internet/ Accessed May 13, 2014 15. Ministry of Communications and Information Technology, International Campaign for Human Rights in Iran, August 21, 2013, http://www.iranhumanrights.org/2013/08/ministry-communications/, Accessed May 13, 2014. 16. Eades, Mark C., China’s Newest Export: Internet Censorship, U.S. News & World Report, January 30, 2014, http://www.usnews. com/opinion/blogs/world-report/2014/01/30/china-is-exporting-internet-censorship-to-iran Accessed May 13, 2014 17. China to Help Iran Implement Its Closed National Internet, International Campaign for Human Rights in Iran, January 21, 2014, http://www.iranhumanrights.org/2014/01/china-iran-internet/ Accessed May 13, 2014 18. Letsch, Constanze and Dominic Rushe, YouTube amid ‘’ concerns, , March 28, 2014, http://www.theguardian.com/world/2014/mar/27/google-youtube-ban-turkey-erdogan Accessed May 13, 2014 19. Arsu, Sebnem, Turkish Officials Block Twitter in Leak Inquiry, The New York Times, March 20, 2014,http://www.nytimes. com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html?action=click&module=Search&regi on=searchResults%230&version=&=http%3A%2F%2Fquery.nytimes.com%2Fsearch%2Fsitesearch%2F%3Faction%3 Dclick%26region%3DMasthead%26pgtype%3DHomepage%26module%3DSearchSubmit%26contentCollection%3DHomepage%2 6t%3Dqry249%23%2Fturkey%2520twitter Accessed May 13, 2014 20. Letsch, Constanze and Dominic Rushe, Turkey blocks YouTube amid ‘national security’ concerns, The Guardian, March 28, 2014, http://www.theguardian.com/world/2014/mar/27/google-youtube-ban-turkey-erdogan Accessed May 13, 2014 21. Yeginsu, Ceylan, Turkey Lifts Twitter Ban After Court Calls It Illegal, The New York Times, April 3, 2014,http://www.nytimes. com/2014/04/04/world/middleeast/turkey-lifts-ban-on-twitter.html Accessed May 13, 2014 22. Butler, Daren, Turkey keeps YouTube block despire court rulings, Reuters, April 10, 2014, http://www.reuters.com/arti- cle/2014/04/10/us-turkey-youtube-idUSBREA390J320140410, Accessed May 13, 2014. 23. Francheschi-Bicchierai, Lorenzo, Turkey Unblocks YouTube after 2 Months, Mashable, http://mashable.com/2014/06/03/turkey- unblocks-youtube/ Accessed June 11, 2014 24. Freedom on the Net 2013: Cuba, Freedom House, April 2013, http://www.freedomhouse.org/report/freedom-net/2013/cuba#. U0hC26hdXmd Accesses May 13, 2014 25. Franceschi-Bicchierai, Lorenzo, The Internet in Cuba: 5 Things You Need to Know, Mashable, April 3, 2014, http://mashable. com/2014/04/03/internet-freedom-cuba/ Accessed May 13, 2014 26. Wills, Santiago, Cuba’s Internet: It’s Bad, But It Might Get Better, Fusion, August 7, 2013,http://fusion.net/abc_univision/story/ internet-cuba-facts-myths-web-access-22566 Accessed May 13, 2014 27. Global Site Speed Overview: How Fast Are Websites Around The World?, Google Analytics , April 19, 2012,http://analytics. blogspot.com.es/2012/04/global-site-speed-overview-how-fast-are.html Accessed May 13, 2014 28. Callanan, Cormac, Hein Dries-Ziekenheiner, Alberto Escudero-Pascual, and Robert Guerra, Leaping Over the Firewall: A Review of Censorship Circumvention Tools, Pg. 22, Freedom House, April 2011,http://www.freedomhouse.org/sites/default/files/inline_ images/Censorship.pdf Accessed May 13, 2014 29. Circumvention Tools, How To Bypass Internet Censorship, Pg. 5, March 10, 2011,://www.howtobypassinternetcensorship. org/files/bypassing-censorship.pdf Accessed May 13, 2014 30. Circumvention Tools, How To Bypass Internet Censorship, Pg. 11, March 10, 2011,https://www.howtobypassinternetcensorship. org/files/bypassing-censorship.pdf Accessed May 13, 2014 31. Callanan, Cormac, Hein Dries-Ziekenheiner, Alberto Escudero-Pascual, and Robert Guerra, Leaping Over the Firewall: A Review of Censorship Circumvention Tools, Pg. 22, Freedom House, April 2011,http://www.freedomhouse.org/sites/default/files/inline_ images/Censorship.pdf Accessed May 13, 2014 32. What is DNS?, TechNet, March 28, 2003,http://technet.microsoft.com/en-us/library/cc787921(v=ws.10).aspx Ac- cessed May 13, 2014 33. Callanan, Cormac, Hein Dries-Ziekenheiner, Alberto Escudero-Pascual, and Robert Guerra, Leaping Over the Firewall: A Review of Censorship Circumvention Tools, Pg. 22, Freedom House, April 2011,http://www.freedomhouse.org/sites/default/files/inline_ images/Censorship.pdf Accessed May 13, 2014 34. Syverson, Paul, Onion Routing, Center for High Assurance Computer Systems of the U.S. Naval Research Lab, 2005,http://www. onion-router.net/ Accessed May 13, 2014 35. Tor: Overview, Tor Project, https://www.torproject.org/about/overview.html.en#overview Accessed May 13, 2014 36. Syverson, Paul, Onion Routing, Center for High Assurance Computer Systems of the U.S. Naval Research Lab, 2005,http://www. onion-router.net/ Accessed May 13, 2014 37. Tor: Overview, Tor Project, https://www.torproject.org/about/overview.html.en#overview Accessed May 13, 2014 38. Internet Freedom, U.S. Department of State, http://www.state.gov/e/eb/cip/netfreedom/index.htm Accessed May 13, 2014

39. Hanson, Fergus, Baked in and Wired: eUDiplomacy @ State in Internet Freedom: The Role of the U.S. State Department, The Brookings Institution, October 25, 2012,http://www.brookings.edu/research/reports/2012/10/25-ediplomacy-hanson-internet- freedom Accessed May 13, 2014

40. Internet Freedom, U.S. Department of State, http://www.state.gov/e/eb/cip/netfreedom/index.htm Accessed May 13, 2014

41. FAQs, Broadcasting Board of Governors,http://www.bbg.gov/about-the-agency/history/faqs/ Accessed May 13, 2014

42. Projects, Open Technology Fund, https://www.opentechfund.org/projects Accessed May 13, 2014

43. Wallin, Matthew, The New Public Diplomacy Imperative, American Security Project, p. 19,http://www.americansecurityproject. org/the-new-public-diplomacy-imperative/

44. U.S. Department of State, Fact Sheet: Freedom Online Coalition, November 20, 2012,http://www.humanrights.gov/2012/11/20/ fact-sheet-freedom-online-coalition/ Accessed May 13, 2014

45. Estonian e-Governance Academy, Concept Paper for Freedom Online Coalition Conference 2014,http://www.freedomonline.ee/ sites/www.freedomonline.ee/files/docs/FOC%20Tallinn%20concept%20paper%20-%20designed%20ver2_0.pdf Accessed May 13, 2014 BOARD OF DIRECTORS

The Honorable Gary Hart, Chairman Admiral William Fallon, USN (Ret.) Senator Hart served the State of Colorado in the Admiral Fallon has led U.S. and Allied forces and U.S. Senate and was a member of the Committee played a leadership role in military and diplomatic on Armed Services during his tenure. matters at the highest levels of the U.S. government.

Norman R. Augustine Raj Fernando Mr. Augustine was Chairman and Principal Raj Fernando is CEO and founder of Officer of the American Red Cross for nine Chopper Trading, a technology based trading years and Chairman of the Council of the firm headquartered in Chicago. National Academy of Engineering.

The Hon. Donald Beyer Vice Admiral Lee Gunn, USN (Ret.) The Hon. Donald Beyer is the former United Vice Admiral Gunn is the President of the States Ambassador to to Switzerland and Institute of Public Research at the CNA Liechtenstein, as well as a former Lieutenant Corporation, a non-profit corporation in Virginia. Governor and President of the Senate of Virginia.

Lieutenant General John Castellaw, USMC (Ret.) Lieutenant General Claudia Kennedy, USA (Ret.) John Castellaw is President of the Crockett Policy Lieutenant General Kennedy was the first woman Institute (CPI), a non-partisan policy and research to achieve the rank of three-star general in the organization headquartered in Tennessee. United States Army.

General Lester L. Lyles, USAF (Ret.) Brigadier General Stephen A. Cheney, USMC (Ret.) General Lyles retired from the United States Air Force Brigadier General Cheney is the Chief Executive after a distinguished 35 year career. He is presently Officer of ASP. Chairman of USAA, a member of the Defense Science Board, and a member of the President’s Intelligence Advisory Board.

Lieutenant General Daniel Christman, USA (Ret.) Dennis Mehiel Lieutenant General Christman is Senior Vice Dennis Mehiel is the Principal Shareholder President for International Affairs at the United and Chairman of U.S. Corrugated, Inc. States Chamber of Commerce.

Robert B. Crowe Stuart Piltch Robert B. Crowe is a Partner of Nelson Stuart Piltch is the Co-Founder and Managing Mullins Riley & Scarborough in its Boston and Director of Cambridge Advisory Group, an Washington, DC offices. He is co-chair of the actuarial and benefits consulting firm based in firm’s Government Relations practice. Philadelphia.

Lee Cullum Ed Reilly Lee Cullum, at one time a commentator on the Edward Reilly is CEO of Americas of FD PBS NewsHour and “All Things Considered” International Limited, a leading global on NPR, currently contributes to the Dallas communications consultancy that is part of FTI Morning News and “CEO.” Consulting, Inc.

Governor Christine Todd Whitman Nelson W. Cunningham Christine Todd Whitman is the President of the Nelson Cunningham is President of Whitman Strategy Group, a consulting firm that McLarty Associates. specializes in energy and environmental issues. The American Security Project (ASP) is a nonpartisan organization created to educate the American public and the world about the changing nature of national security in the 21st Century. Gone are the days when a nation’s security could be measured by bombers and battleships. Security in this new era requires harnessing all of America’s strengths: the force of our diplomacy; the might of our military; the vigor and competitiveness of our economy; and the power of our ideals. We believe that America must lead in the pursuit of our common goals and shared security. We must confront international challenges with our partners and with all the tools at our disposal and address emerging problems before they become security crises. And to do this we must forge a bipartisan consensus here at home. ASP brings together prominent American business leaders, former members of Congress, retired military flag officers, and prominent former government officials. ASP conducts research on a broad range of issues and engages and empowers the American public by taking its findings directly to them via events, traditional & new media, meetings, and publications. We live in a time when the threats to our security are as complex and diverse as terrorism, nuclear proliferation, climate change, energy challenges, and our economic wellbeing. Partisan bickering and age old solutions simply won’t solve our problems. America – and the world - needs an honest dialogue about security that is as robust as it is realistic. ASP exists to promote that dialogue, to forge that consensus, and to spur constructive action so that America meets the challenges to its security while seizing the opportunities that abound.

www.americansecurityproject.org