Censorship's Fragile Grip on the Internet: Can Online Speech Be Controlled Jessica Li
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate. -
Pacer Emerging Markets Cash Cows 100 ETF Schedule of Investments July 31, 2020 (Unaudited) Shares Value
Page 1 of 5 Pacer Emerging Markets Cash Cows 100 ETF Schedule of Investments July 31, 2020 (Unaudited) Shares Value COMMON STOCKS - 91.4% Bermuda - 0.9% Nine Dragons Paper Holdings Ltd. 8,922 $ 9,336 Brazil - 11.1% Ambev SA - ADR 7,396 19,821 BRF SA - ADR (a) 2,000 7,960 CCR SA 2,652 7,651 Cosan SA 386 6,660 CPFL Energia SA 1,795 10,787 Engie Brasil Energia SA 740 6,527 JBS SA 4,938 20,513 Petrobras Distribuidora SA 1,561 6,823 TIM Participacoes SA - ADR 510 7,619 Vale SA - ADR 1,878 21,860 116,221 Cayman Islands - 3.4% SINA Corp./China (a) 222 8,958 Tongcheng-Elong Holdings Ltd. (a) 1,612 2,957 Xiaomi Corp. - Class B (a)(b) 12,393 23,698 35,613 Chile - 0.7% Cencosud SA 4,410 7,683 China - 12.8% Air China Ltd. - Class H 29,824 18,509 Anhui Conch Cement Co. Ltd. - Class H 2,910 21,984 Beijing Capital International Airport Co Ltd. - Class H 5,986 3,947 China Communications Services Corp Ltd. - Class H 8,207 5,316 China Eastern Airlines Corp. Ltd. - Class H 52,387 18,588 China Shenhua Energy Co Ltd. - Class H 12,317 20,533 China Telecom Corp. Ltd. - Class H 65,857 19,629 Great Wall Motor Co. Ltd. - Class H 20,076 19,609 Sinopec Shanghai Petrochemical Co. Ltd. 26,213 5,851 133,966 Colombia - 1.8% Ecopetrol SA - ADR 1,602 18,647 Greece - 0.9% Hellenic Telecommunications Organization SA 483 7,112 OPAP SA 283 2,544 9,656 Hong Kong - 8.5% China Medical System Holdings Ltd. -
The Velocity of Censorship
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users. -
Baker Institute Policy Report Published by the James A
ISSN 1941-6466 BAKER INSTITUTE POLICY REPORT PUBLISHED BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY NUMBER 57 JANUARY 2014 BUILDING A TRANSPARENT WEB: TRANSNATIONAL SOCIAL MEDIA, CYBERSECURITY, AND SINO –U.S. TRADE Overview practices. In 2007, when the United States leveraged its initial WTO complaint against China, the Social media sites, while currently treated as an terms of the debate were substantially different “audiovisual product”1 by the Chinese government than they are now. Seven years ago, audiovisual under the World Trade Organization’s (WTO) materials were much more easily decoupled from trade policy, have outgrown this construct and their digital distribution sites.5 However, in the instead have become the “ports”2 of the twenty- current environment, delivery portals are so first century. Taking into consideration the global deeply entwined with the dispersal of content trade significance of social media as a locus of that it has become nearly impossible to make international trade in advertising, information, cogent international policy based on distinctions and increasingly other types of commercial goods, between digital “audiovisual products” and it is essential that the United States continues to digital distribution sites.6,7 Indeed, because these pursue WTO action to encourage China to open sites have become so central to the experience trade in social media infrastructure. This, in turn, of media consumption, as well as a host of other would ensure long-term global competitiveness in activities ranging from commerce to social life, it the information communication and technology is essential to take into account these complexities sector. -
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government. -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
Dozens of Outspoken, Popular Blogs Shut in China 15 July 2010, by CARA ANNA , Associated Press Writer
Dozens of outspoken, popular blogs shut in China 15 July 2010, By CARA ANNA , Associated Press Writer microblog was closed. Both men are well-known for taking on sensitive issues. Chinese officials fear that public opinion might spiral out of control as social networking - and social unrest - boom among its 420 million Internet users. China maintains the world's most extensive Internet monitoring and filtering system, and it unplugged Twitter and Facebook last year. Blogger Yao Yuan listed at least 61 closed Sohu blogs, including his own, on a separate, unblocked In this photo taken Wednesday, July 14, 2010, a blog Thursday. He called the closings mass Chinese man uses a computer at an Internet cafe in murder. Beijing, China. China's Twitter-like microblogs are facing new threats of censorship. The country's top microblogs "If Internet users don't speak out, all sites will be either are down for maintenance or now display a "beta" cracked down on in the future," said Yao, who owns tag to indicate they are in a testing phase, though they have been operating for months. (AP Photo/Ng Han an Internet-promotion company in Shanghai. Guan) "Ordinary people will forever lose their freedom to speak online, and the government can rest without worrying anymore." (AP) -- Dozens of blogs by some of China's most Microblogs can quickly aggregate critical voices, outspoken users have been abruptly shut down which is why authorities have been increasing while popular Twitter-like services appear to be the controls, said Xiao Qiang, director of the China newest target in government efforts to control Internet Project at the University of California- social networking. -
The Right to Privacy in the Digital Age
The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments. -
Social Media Contracts in the US and China
DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L. -
1 of Enclaves and Internet
Of Enclaves and Internet: How Social Media Affects Political Participation in Authoritarian States Political Science Research Thesis Presented in Partial Fulfillment of the Requirements for Graduation “with Research Distinction in Political Science” in the undergraduate Colleges of The Ohio State University by Andrew Keller The Ohio State University May 2013 Project Advisor: Professor Randal Schweller, Department of Political Science 1 Of Enclaves and Internet: How Social Media Affects Political Participation in Authoritarian States By Andrew Keller In 1962, Canadian philosopher Marshall McLuhan proclaimed that the emergence of worldwide telecommunications would transform the planet into a ‘global village’ of sorts, constructing ties among peoples who had never before been able to interact and who perhaps did not know of each other’s existence. This was prior to the emergence of the internet—a phenomenon that has drawn even greater praise from optimistic futurists. Some even claim that the internet is ushering in a new cosmopolitan age, which will weaken ties to the nation-state as it forges transnational identities rooted in a common humanity. While this new age has yet to emerge, many praise the potential power of internet discourse to derail authoritarianism. The arrival of social media (blogging, chat forums, Facebook, twitter, and so on) has raised the possibility that discussion among disparate peoples online can lead to new ideas, a more informed citizenry, and, consequently, greater mass political participation. Many, however, do not share this bleary-eyed cyber-optimism, insisting, instead, that online interactions, like many varieties of human interactions, can be marred by the less-logical and more group-oriented sides of the brain. -
Partisan Platforms: Responses to Perceived Liberal Bias in Social Media
Partisan Platforms: Responses to Perceived Liberal Bias in Social Media A Research Paper submitted to the Department of Engineering and Society Presented to the Faculty of the School of Engineering and Applied Science University of Virginia • Charlottesville, Virginia In Partial Fulfillment of the Requirements for the Degree Bachelor of Science, School of Engineering Luke Giraudeau Spring, 2021 On my honor as a University Student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments Signature __________________________________________ Date __________ Luke Giraudeau Approved __________________________________________ Date __________ Richard Jacques, Department of Engineering and Society Introduction In the United States, public opinion about tech companies’ political biases is divided along partisan lines (Vogels, Perrin, & Anderson, 2020). In the U.S. since 2018, 69 percent of Republicans claim that technology companies favor liberal views, whereas only 19 percent of Democrats say that technology companies favor the alternative view. Over 50 percent of liberals believe that perspectives are treated equally, whereas only 22 percent of conservatives feel this way. Critics who allege bias have organized to promote legislation such as the Ending Support for Internet Censorship Act (2020) as well as an executive order (Executive Order 13,925, 2020). Furthermore, conservative entrepreneurs have produced new social media platforms such as Gab and Parler that claim -
Internet Censorship in Turkey: University Students' Opinions
World Journal on Educational Technology 1 (2009) 46‐56 www.world‐education‐center.org/index.php/wjet Internet censorship in Turkey: University students' opinions * Hasan Ozkan a , Arda Arikan b a Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey b Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey Received April 30, 2009; revised May 31, 2009; accepted June 22 , 2009 Abstract The aim of this paper is to study university students’ opinions toward online censorship with references to their socio‐ political and economic variables. Considering the upwards trend and the increasing number of online restrictions in Turkey, the opinions of university students (n=138) are thought to give significant findings. The questionnaire aimed to collect data on some chosen aspects of censorship which are internet access regulation by legal authorities, online pornographic content, websites distributing illegal and crime related information and the political and religious aspects of the internet censorship. The findings about these four basic aspects toward the online censorship revealed that despite the high proportion of approval, participants have a confused and inconsistent attitude towards the issue especially within the application and the idea of censorship. In a broader aspect, the findings can be interpreted as a sign of university students’ insufficient knowledge and understanding towards the current situation and the possible future of online censorship in Turkey. Keywords: Internet; censor; censorship;