Inferring Mechanics of Web Censorship Around the World

Total Page:16

File Type:pdf, Size:1020Kb

Inferring Mechanics of Web Censorship Around the World Inferring Mechanics of Web Censorship Around the World John-Paul Verkamp Minaxi Gupta School of Informatics and Computing, Indiana University fverkampj, [email protected] Abstract known censored websites from the test machines, analyzing raw packet captures, and various other specialized tests on a While mechanics of Web censorship in China are well stud- per site basis, we discovered and verified the following as- ied, those of other countries are less understood. Through a pects of the mechanics of censorship in the countries under combination of personal contacts and Planet-Lab nodes, we study: conduct experiments to explore the mechanics of Web cen- sorship in 11 countries around the world, including China. - Mechanics of censorship vary across countries: Even Our work provides insights into the diversity of modus though we were only able to conduct measurements in a operandi of censors around the world and can guide future small number of countries of interest due to lack of mea- work on censorship evasion. surement infrastructure in other countries, we saw evidence of much of the design space from our taxonomy being ex- 1 Introduction ploited by censors. For example, Malaysia, Russia and Turkey censor at the DNS while other countries do so at Internet censorship is a growing concern around the world, routers or other network hardware. South Korea censors affecting a large portion of the world’s population. Modes both at the DNS and at the routers. Also, Saudi Arabia and of censorship vary widely, ranging from complete discon- China censor on destination IP addresses, while other coun- nection, to selective censorship of Web pages, to censorship tries primarily censor on hostnames, URLs, or keywords. of search engines and online social networks (OSNs)–such Further, execution of censorship ranges between DNS redi- as Facebook and Twitter. Owing to these developments, the rects (Malaysia, Russia, South Korea and Turkey), connec- research community has recently been studying censorship tion timeouts (Bangladesh and India), TCP resets (China), from various angles. One of those angles is censorship eva- and HTTP responses with various 200-, 300-, and 400-level sion, with works in [1, 5, 7, 10, 19] proposing various ways status codes (Bahrain, Iran, Saudi Arabia, South Korea and of defeating censorship. Thailand). Measurement studies of censorship have also been un- - Censorship is not always explicitly communicated: dertaken. For example, Dainotti et al. studied complete While Bahrain, Iran, Saudi Arabia, South Korea and Thai- Internet disconnection, such as that in Egypt and Libya dur- land make censorship evident, other countries leave users ing the Arab Spring revolution in early 2011 [3]. The Open wondering why their attempt to fetch a web page was un- Net Initiative (ONI) studies have focused on what various successful. countries around the world censor [4, 11, 12]. In a similar spirit, CensMon used PlanetLab infrastructure to measure - Censorship can be stateful: China filters only the first censorship in various countries [15]. Aspects of Chinese HTTP GET request in a TCP stream, likely for the sake of censorship have received particular attention, with works efficiency. It does so by maintaining state. In addition, af- investigating how China censors Web accesses [2], Tor [17], ter filtering an HTTP request, it maintains flow state about Skype [9] and where its censoring modules are located [20]. source and destination IP addresses, port number and pro- However, the study of censorship in other countries has thus tocol of the denied request to deny further communication far been limited to identifying what is being censored rather between the same pair of machines even when such com- than how, leading to a gap in our understanding of how cen- munication would not previously have been blocked. No sors around the world operate. other country in our lists conducts stateful censorship. In this paper, we complement existing knowledge about - Customized censorship evasion is possible: Censorship the mechanics of Web censorship in 11 countries around the evasion techniques roughly fall in two categories. In the world, including China and an additional seven where no first are ones that avoid arousing suspicion from the censor- well-known publicly-available measurement infrastructure ing techniques in the first place, such as [1, 5, 7, 10, 19]. exists. Focusing on the question of how censorship is con- The second category includes techniques where the impact ducted (as opposed to what is being censored), we present of censorship is annulled at the client, such as in [2], where results on how Bangladesh, Bahrain, India, Iran, Malaysia, Clayton et al. propose a way to ignore TCP reset packets Russia, Saudi Arabia, South Korea, Thailand, and Turkey sent by the Chinese censoring module. Our work can mo- censor the Web. Of these, we could only find accessible tivate novel censorship evasion techniques, particularly in PlanetLab nodes in China, India, Russia and Turkey. For the latter category. the other countries we recruited volunteers through personal contacts. In many cases we confirm previous work; how- 2 Design Space for a Censoring Module ever in at least one case we found censorship where none There are three primary design considerations for any Web had previously been reported [4, 11, 12]. censorship system. The first is the trigger for censorship to We began by creating a taxonomy that explores the de- take place. The trigger could be a combination of hostname, sign space of a censoring module in terms of what trig- IP address, port number, protocol, or URL/keyword(s) cap- gers it, where it is located, and how censorship is executed. tured by regular expressions or an equivalent. The second Then through a series of experiments that include accessing consideration is the the location of the censoring module in 1 the network. Common locations of censoring modules in- - Trigger: Keyword, Location: Router Keyword-based clude DNS and routers. The final consideration is the actual filtering is unique in that while all the above forms of fil- execution of censorship, whereby a censor decides which tering filter only outgoing traffic, this type of filtering can protocols to modify and the manner in which censorship is be applied both to outgoing and incoming traffic. Specifi- communicated to the user. The following sections describe cally, a router can filter HTTP requests based on keywords the design space along these dimensions. contained in any portion of the URL and also filter re- 2.1 Trigger and Location sponses based on keywords in the returned content. For ex- ample, if the keyword ‘falun’ is included in the blacklist, Censorship could be triggered at several points after a user each of http://www.falun.com/index.html, http://example. first initiates a given connection. We discuss triggers and com/falun.htm and http://example.com/search?q=falun will location together since only certain kinds of information is be filtered in spite of the fact that ‘falun’ appears in the host- available for triggering censorship at specific locations. name in the first URL, in the directory path in the second, - Trigger: Hostname, Location: Local DNS resolver. The and as a query parameter in the third. first point at which censorship could be triggered is when - Trigger: Any, Location: Client machine. Filtering at the the hostname in the user’s request gets resolved through the client machine is another alternative to filtering at the DNS local DNS resolver. Instead of fetching the IP address(es) or routers. While its deployment could be challenging, it corresponding to the hostname by consulting the DNS hi- has the advantage of not consuming any network resources erarchy (which includes the resolver’s local cache), the re- or requiring any enhancements to network hardware. An solver could determine that the either the hostname itself example of such censorship is the custom version of Skype or the domain or sub-domain portion of it is on a to-be- produced at the behest of Chinese authorities. This version filtered list and return one or more of the pre-configured automatically scans incoming and outgoing messages for IP addresses. Typically, servers behind the returned IP ad- questionable content and sends this information to the Chi- dresses send custom pages indicating the reason for redirec- nese government [9]. Unfortunately, such techniques are tion. Note that since this filter does not have access to port radically different from those otherwise investigated. As number and protocol information, it will indiscriminately such, we do not consider this option subsequently in this filter all connections, possibly hurting non-Web services on paper. the filtered hostnames. 2.2 Execution - Trigger: IP address/port/protocol, Location: Router. Filtering at the level of TCP connection establishment and The actual execution of censorship is dependent on the loca- initial HTTP requests are the next logical steps after DNS tion of the censoring module. When the module is located at resolution. Each of these traverse through routers, making the local DNS resolver, the execution involves a DNS redi- them an excellent choice for locating the censoring module. rection to a specialized server. When the module is located While any router could be used to execute filtering, border at the router, there are multiple choices. In fact, several can routers belonging to ISPs are a good choice and are thus typ- co-exist. We describe them next. ically used because all traffic traverses them [20]. Among - Filter request or response: A censor may simply choose other things, router-based filtering could be triggered on the to filter requests. The first opportunity for this arises during destination server’s IP address–which is available as early the TCP connection establishment phase. However, since as the first SYN packet during TCP connection establish- hostnames are not available in TCP SYN packets, the black- ment and in every subsequent TCP packet containing HTTP list for such filtering would consist of IP addresses, port and data.
Recommended publications
  • THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
    THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy.
    [Show full text]
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • Self-Censorship and the First Amendment Robert A
    Notre Dame Journal of Law, Ethics & Public Policy Volume 25 Article 2 Issue 1 Symposium on Censorship & the Media 1-1-2012 Self-Censorship and the First Amendment Robert A. Sedler Follow this and additional works at: http://scholarship.law.nd.edu/ndjlepp Recommended Citation Robert A. Sedler, Self-Censorship and the First Amendment, 25 Notre Dame J.L. Ethics & Pub. Pol'y 13 (2012). Available at: http://scholarship.law.nd.edu/ndjlepp/vol25/iss1/2 This Article is brought to you for free and open access by the Notre Dame Journal of Law, Ethics & Public Policy at NDLScholarship. It has been accepted for inclusion in Notre Dame Journal of Law, Ethics & Public Policy by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. ARTICLES SELF-CENSORSHIP AND THE FIRST AMENDMENT ROBERT A. SEDLER* I. INTRODUCTION Self-censorship refers to the decision by an individual or group to refrain from speaking and to the decision by a media organization to refrain from publishing information. Whenever an individual or group or the media engages in self-censorship, the values of the First Amendment are compromised, because the public is denied information or ideas.' It should not be sur- prising, therefore, that the principles, doctrines, and precedents of what I refer to as "the law of the First Amendment"' are designed to prevent self-censorship premised on fear of govern- mental sanctions against expression. This fear-induced self-cen- sorship will here be called "self-censorship bad." At the same time, the First Amendment also values and pro- tects a right to silence.
    [Show full text]
  • The Velocity of Censorship
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • Quantum in the Cloud: Application Potentials and Research Opportunities
    Quantum in the Cloud: Application Potentials and Research Opportunities Frank Leymann a, Johanna Barzen b, Michael Falkenthal c, Daniel Vietz d, Benjamin Weder e and Karoline Wild f Institute of Architecture of Application Systems, University of Stuttgart, Universitätsstr. 38, Stuttgart, Germany Keywords: Cloud Computing, Quantum Computing, Hybrid Applications. Abstract: Quantum computers are becoming real, and they have the inherent potential to significantly impact many application domains. We sketch the basics about programming quantum computers, showing that quantum programs are typically hybrid consisting of a mixture of classical parts and quantum parts. With the advent of quantum computers in the cloud, the cloud is a fine environment for performing quantum programs. The tool chain available for creating and running such programs is sketched. As an exemplary problem we discuss efforts to implement quantum programs that are hardware independent. A use case from machine learning is outlined. Finally, a collaborative platform for solving problems with quantum computers that is currently under construction is presented. 1 INTRODUCTION Because of this, the overall algorithms are often hybrid. They perform parts on a quantum computer, Quantum computing advanced up to a state that urges other parts on a classical computer. Each part attention to the software community: problems that performed on a quantum computer is fast enough to are hard to solve based on classical (hardware and produce reliable results. The parts executed on a software) technology become tractable in the next classical computer analyze the results, compute new couple of years (National Academies, 2019). parameters for the quantum parts, and pass them on Quantum computers are offered for commercial use to a quantum part.
    [Show full text]
  • The Impact of Disinformation on Democratic Processes and Human Rights in the World
    STUDY Requested by the DROI subcommittee The impact of disinformation on democratic processes and human rights in the world @Adobe Stock Authors: Carme COLOMINA, Héctor SÁNCHEZ MARGALEF, Richard YOUNGS European Parliament coordinator: Policy Department for External Relations EN Directorate General for External Policies of the Union PE 653.635 - April 2021 DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT STUDY The impact of disinformation on democratic processes and human rights in the world ABSTRACT Around the world, disinformation is spreading and becoming a more complex phenomenon based on emerging techniques of deception. Disinformation undermines human rights and many elements of good quality democracy; but counter-disinformation measures can also have a prejudicial impact on human rights and democracy. COVID-19 compounds both these dynamics and has unleashed more intense waves of disinformation, allied to human rights and democracy setbacks. Effective responses to disinformation are needed at multiple levels, including formal laws and regulations, corporate measures and civil society action. While the EU has begun to tackle disinformation in its external actions, it has scope to place greater stress on the human rights dimension of this challenge. In doing so, the EU can draw upon best practice examples from around the world that tackle disinformation through a human rights lens. This study proposes steps the EU can take to build counter-disinformation more seamlessly into its global human rights and democracy policies.
    [Show full text]
  • West Censoring East
    West Censoring East The Use of Western Technologies by Middle East Censors 2010-2011 Executive Summary The OpenNet Initiative has documented network filtering of the Internet by national governments in over forty countries worldwide. Countries use this network filtering as one of many methods to control the flow of online content that is objectionable to the filtering governments for social, political, and security reasons. Filtering is particularly appealing to governments as it allows them to control content not published within their national borders. National governments use a variety of technical means to filter the Internet; in this paper, we analyze the use of American- and Canadian- made software for the purpose of government-level filtering in the Middle East and North Africa. In this report, the authors find that nine countries in the region utilize Western-made tools for the purpose of blocking social and political content, effectively blocking a total of over 20 million Internet users from accessing such websites. 1 The authors analyze as well the increasing opacity of the usage of Western-made tools for filtering at the national level. Helmi Noman and Jillian C. York authored this report. ONI principal investigators Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain authored the foreword. Noman is a Senior Research Fellow at the Munk School of Global Affairs, University of Toronto, and is a Berkman Center Research Affiliate. York is the coordinator for the OpenNet Initiative at the Berkman Center for Internet & Society. The authors would like to thank James Tay of Citizen Lab for technical support and test data analysis.
    [Show full text]
  • Everyone's Guide to Bypassing Internet Censorship
    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
    [Show full text]
  • Translation and Manipulation
    5785 Forough Rahimi et al./ Elixir Ling. & Trans. 41 (2011) 5785-5790 Available online at www.elixirpublishers.com (Elixir International Journal) Linguistics and Translation Elixir Ling. & Trans. 41 (2011) 5785-5790 Translation and manipulation: a critical discourse analysis case study Forough Rahimi and Mohammad Javad Riasati Department of Foreign Languages, Shiraz Branch, Islamic Azad University, Shiraz, Iran. ARTICLE INFO ABSTRACT Article history: This paper seeks to delineate the constraints imposed on translators of movie dialogues in Received: 20 September 2011; the context of Iran. The movie ''Platoon'' is selected for this purpose. In this situation a Received in revised form: myriad of external constraints, that is, cultural, religious, and political, lead to rewriting or 16 November 2011; manipulation of movie texts. This is an effective means for creating and naturalizing Accepted: 28 November 2011; ideologies, through expurgation, derogation, etc. The movie translations in Iran are scenes of ideological incursions in translation, that is, suppression of dialectal features. They are sites Keywords of ideological clashes in which certain realities are constructed and challenged and Translation, xenophobic attitudes are propagated. The translators counterfeit realities and inculcate them Censorship, in the innocent audience. This paper explores the ideological and socio-political factors Ideological manipulation. which determine the strategies applied in the translation of western movies. © 2011 Elixir All rights reserved. Introduction language is an irreducible part of social life. The dialectic During the past decade educational researchers increasingly relation between language and social reality is realized through have turned to Critical Discourse Analysis (CDA) as a set of social events (texts), social practices (orders of discourse) and approaches to answer questions about the relationships between social structures (languages) [3].
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1
    Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1 Ben Wagner, Ludwig-Maximilians-Universität München and Universiteit Leiden Introduction* The academic debate on deep packet inspection (DPI) centres on methods of network management and copyright protection and is directly linked to a wider debate on freedom of speech on the Internet. The debate is deeply rooted in an Anglo-Saxon perspective of the Internet and is frequently depicted as a titanic struggle for the right to fundamentally free and unfettered access to the Internet.2 This debate is to a great extent defined by commercial interests. These interests whether of copyright owners, Internet service providers, 1 (Bendrath 2009) * A first draft of this paper was presented at the 3rd Annual Giganet Symposium in December 2008 in Hyderabad, India. For their advice and support preparing this paper I would like to thank: Ralf Bendrath, Claus Wimmer, Geert Lovink, Manuel Kripp, Hermann Thoene, Paul Sterzel, David Herzog, Rainer Hülsse, Wolfgang Fänderl and Stefan Scholz. 2 (Frieden 2008, 633-676; Goodin 2008; Lehr et al. 2007; Mueller 2007, 18; Zittrain 2008) Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1, by Ben Wagner application developers or consumers, are all essentially economic. All of these groups have little commercial interest in restricting free speech as such. However some might well be prepared to accept a certain amount of ‘collateral damage’ to internet free speech in exchange for higher revenues. It can be argued that more transparent and open practices from network service providers are needed regarding filtering policy and the technology used.
    [Show full text]