Anonymity Government Control of Internet Censorship Other Countries

Total Page:16

File Type:pdf, Size:1020Kb

Anonymity Government Control of Internet Censorship Other Countries Day 8 Anonymity Government control of Internet Censorship Other countries vs. US Microsoft + NSA Apple + FBI update Anonymity Thomas Paine Hamilton, Madison, Jay (Common Sense) (The Federalist Papers) 2 Positive uses 0 Protect political speech 0 Protect aGainst retaliation and embarrassment 0 AnonymizinG services 0 used by reporters, human riGhts activists, citizens in repressive countries, law enforcement aGencies, and Government intelligence services 3 Negative uses 0 protects criminal activities 0 aids fraud à Amazon, eBay reviews 0 harassment, 0 extortion, 0 distribution of child pornography, 0 theft, 0 copyriGht infrinGement 0 masks illeGal surveillance by Government agencies 4 5 Government Censorship Information + education = power 6 Authoritarian Governments have impeded low of information and opinion throughout history. 0 Burma 0 Western Countries 0 Chile 0 Belarus 0 Cuba 0 Russia 0 China 0 India 0 Tunisia 0 Venezuela 0 Vietnam 0 Saudi Arabia 0 Syria 0 North Korea 0 Iran 0 Egypt 0 Singapore 0 Turkmenistan 0 Azerbaijan 7 8 https://www.nytimes.com/2017/02/10/world/africa/african-nations-increasinGly-silence-internet-to-stem-protests.html 9 http://qz.com/576485/brazil-has-shut-down-whatsapp-for-rouGhly-100-million-people/ 0 Some countries own the Internet backbone within their countries and block speci`ic sites and content at the border 0 Some countries ban all or certain types of access to the Internet 0 Iran has blocked wikipedia, the New York Times, youtube, amazon, and changeforequality. 10 “The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible… The Ministry for the Promotion of Virtue and Prevention of Vice is obliged to monitor the order and punish violators.” - Excerpt from Taliban edict banning Internet use in Afghanistan (2001) Textbook p. 165 11 And in the US? 0 2005: London subway bombinGs – remote detonation by phone? 0 2009 à 12 Censor/Block vs. Spy on 13 14 Te Guardian, 2013 15 Spy on vs. Iniltrate 16 2/2016 17 0 Companies who do business in countries that control Internet access must comply with the local laws 0 GooGle arGued that some access is better than no access… is that true? 0 Google.cn complies with Chinese law and does not show sites with banned content. 18 §Repressive governments intercept ciAzens ’ communicaons and filter Internet content. §Companies in Western democracies sell them the sophisAcated tools to do so. California-based Narus (a BoeinG subsidiary) sold Telecom EGypt “real-time traf`ic intelliGence” and Deep Packet Inspection equipment. They also supply Pakistan, Bahrain, Qatar and Saudi Arabia. Texas-based Cisco systems “aGGressively souGht” the contracts to implement the Great Firewall of China. 19 http://en.rsf.org/companies-that-cooperate-with-02-09-2011,40914.html 0"Anything that comes through (an Internet protocol network), we can record, we can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” - Steve Bannerman, Narus' marketinG vice president, to Wired, 2006 http://archive.wired.com/science/discoveries/news/2006/05/70914 20 Aiding foreign censors and repressive regimes 0 Yahoo and French censorship 0 Yahoo, eBay and others make decisions to comply with foreign laws for business reasons 2001 2006 0Skype and Chinese control 0 Chinese Government requires modi`ied version of Skype 21 Worst Censorship? 22 Communication Shutdowns – Free Countries 0 Public safety 0 BART and protests: 23 Anonymous Reaction 24 25 .
Recommended publications
  • Running Head: Wikileaks and the Censorship of News Media in the U.S
    RUNNING HEAD: WIKILEAKS AND THE CENSORSHIP OF NEWS MEDIA IN THE U.S. WikiLeaks and the Censorship of News Media in the U.S. Author: Asa Hilmersson Faculty Mentor: Professor Keeton Ramapo College of New Jersey WIKILEAKS AND THE CENSORSHIP OF NEWS MEDIA IN THE U.S. 1 “Censorship in free societies is infinitely more sophisticated and thorough than in dictatorships, because ‘unpopular ideas can be silenced, and inconvenient facts kept dark, without any need for an official ban’.” – George Orwell Introduction Throughout history, media has been censored or obscured in different ways which seem to fit the dominant ideology or ruling regime. As William Powers (1995) from The Washington Post said; the Nazis were censored, Big Brother was a censor, and nightmare regimes such as China have censors. Though we are all aware of censorship around the world and in history, little do we look to ourselves because as Powers writes, “None of that [censorship] for us. This is America” (para. 3). People in America have long been led to believe that they live in a free world where every voice is heard. It is not until someone uses the opportunities of this right that we see that this freedom of speech might only be an illusion. The emergence of WikiLeaks in 2010 and the censorship exercised against this organization by the United States’ government exemplifies the major obstacles individuals can face when seeking to expose potential wrongdoing by public officials. Through questioning of media’s power as whistleblowers it is hinted that there are institutions which may carry more weight than the truth in making decisions that affect that public interest.
    [Show full text]
  • The Long Shadow of Chinese Censorship: How the Communist Party’S Media Restrictions Affect News Outlets Around the World
    The Long Shadow of Chinese Censorship: How the Communist Party’s Media Restrictions Affect News Outlets Around the World A Report to the Center for International Media Assistance By Sarah Cook October 22, 2013 The Center for International Media Assistance (CIMA), at the National Endowment for Democracy, works to strengthen the support, raise the visibility, and improve the effectiveness of independent media development throughout the world. The Center provides information, builds networks, conducts research, and highlights the indispensable role independent media play in the creation and development of sustainable democracies. An important aspect of CIMA’s work is to research ways to attract additional U.S. private sector interest in and support for international media development. CIMA convenes working groups, discussions, and panels on a variety of topics in the field of media development and assistance. The center also issues reports and recommendations based on working group discussions and other investigations. These reports aim to provide policymakers, as well as donors and practitioners, with ideas for bolstering the effectiveness of media assistance. Don Podesta Interim Senior Director Center for International Media Assistance National Endowment for Democracy 1025 F Street, N.W., 8th Floor Washington, DC 20004 Phone: (202) 378-9700 Fax: (202) 378-9407 Email: [email protected] URL: http://cima.ned.org Design and Layout by Valerie Popper About the Author Sarah Cook Sarah Cook is a senior research analyst for East Asia at Freedom House. She manages the editorial team producing the China Media Bulletin, a biweekly news digest of media freedom developments related to the People’s Republic of China.
    [Show full text]
  • July 20, 2020 the Honorable David N. Cicilline Chairman
    July 20, 2020 The Honorable David N. Cicilline Chairman, Subcommittee on Antitrust, Commercial and Administrative Law U.S. House of Representatives Subject: House Judiciary Committee’s July 27 hearing of Apple’s CEO Tim Cook Chairman Cicilline, GreatFire is a China-based, anti-censorship organization that has been working since 2011 to bring transparency to online censorship in China and to help Chinese citizens to freely access information. We would like to draw to your attention Apple’s current policy of censorship of its App Store, which constitutes a serious abuse of its dominant position in the digital marketplace as well as a violation of human rights. On July 27, the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S House of Representatives Judiciary Committee will question Apple Inc. CEO Tim Cook, along with the CEOs of Amazon, Google and Facebook, as part of the Committee’s ongoing investigation into competition in the digital marketplace. The “Online Platforms and Market Power, Part 6: Examining the Dominance of Amazon, Facebook, Google and Apple” hearing will conclude an investigation which began last year and has already covered Apple’s anti-competitive practices and their impact, most notably on a “Free and Diverse Press”. We believe that one crucial consequence of Apple’s dominant position in the digital market has not been covered by the investigation: Apple’s opaque and arbitrary management of its China App Store. In China, currently Apple’s biggest market worldwide, Apple directly collaborates with the Chinese authorities to censor apps that the government does not want its population to use.
    [Show full text]
  • The Impact of Media Censorship: Evidence from a Field Experiment in China
    The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle
    [Show full text]
  • Democracy in the Age of Google, Facebook and Wikileaks*
    Democracy in the Age of Google, Facebook and WikiLeaks* John Keane * Public lecture delivered in the Council Of Europe Democracy Debate Series, Strasbourg, Tuesday July 5th, 2011. Ladies and Gentlemen, In the beginning there was a worldwide satellite television broadcast, live, featuring Maria Callas, Pablo Picasso and the Beatles. Then came fax machines, photocopiers, video recorders and personal computers. Now there is cloud computing, electronic books, scanners, interactive video technology, tweets and smart phones converted into satellite navigators and musical instruments. It is unclear even to the innovators what comes next but these and other media inventions, commercially available only during recent decades, have persuaded more than a few people that we are living in a revolutionary age of communicative abundance. In the spirit of the revolution, as in every previous revolution in the prevailing mode of communication, fascination mixed with excitement is fuelling bold talk of the transcendence of television, the disappearance of printed newspapers, the decline of the book, even the end of literacy as we have known it. There is widespread recognition that time is up for spectrum scarcity, mass broadcasting and predictable prime-time national audiences. Symbolised by the Internet, the age of communicative abundance is a new world system of overlapping and interlinked media devices that for the first time in human history, thanks to built-in cheap microprocessors, integrate texts, sounds and images in compact and reproducible form, so enabling communication to take place through multiple user points, in chosen time, either real or delayed, within modularised and ultimately global networks that are affordable and accessible to more than a billion people scattered across the globe.
    [Show full text]
  • Games Without Frontiers: Investigating Video Games As a Covert Channel
    Games Without Frontiers: Investigating Video Games as a Covert Channel Bridger Hahn Rishab Nithyanand Phillipa Gill Stony Brook University Stony Brook University Stony Brook University Rob Johnson Stony Brook University Abstract something censorship circumvention tools, which aim to dis- The Internet has become a critical communication infrastruc- guise covert traffic as another protocol to evade detection by ture for citizens to organize protests and express dissatisfaction censors. This can take two forms: either mimicking the cover with their governments. This fact has not gone unnoticed, with protocol using an independent implementation, as in Skype- governments clamping down on this medium via censorship, Morph [11] and StegoTorus [12], or encoding data for transmis- and circumvention researchers working to stay one step ahead. sion via an off-the-shelf implementation of the cover protocol, In this paper, we explore a promising new avenue for covert as in FreeWave [13]. channels: real-time strategy video games. Video games have This has created an arms race between censors and circum- two key features that make them attractive cover protocols for ventors. Many censors now block Tor [14], so Tor has intro- censorship circumvention. First, due to the popularity of gam- duced support for “pluggable transports”, i.e. plugins that em- ing platforms such as Steam, there are a lot of different video bed Tor traffic in a cover protocol. There are currently six plug- games, each with their own protocols and server infrastructure. gable transports deployed in the Tor Browser Bundle [15]. Cen- Users of video-game-based censorship-circumvention tools can sors have already begun blocking some of these transports [16], therefore diversify across many games, making it difficult for and some censors have gone so far as to block entire content- the censor to respond by simply blocking a single cover pro- distribution networks that are used by some circumvention sys- tocol.
    [Show full text]
  • Measuring I2P Censorship at a Global Scale
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • ENGLISH Internet Shutdowns
    Internet Shutdowns and Blockages دری Dari https://docs.google.com/document/d/1KZhHh38m0g1M6pb0cx5bveHqasTCXh_ueCnh2hs86kA/ edit?usp=sharing All of this only helps if you download these tools before censorship or network shutdowns happen. Your use of these tools can often be detected by your Internet provider, and show up as installed apps visible to anyone looking at your unlocked phone. Dedicated anti-censorship tools: ● Psiphon is a free and open source censorship circumvention VPN that uses a variety of techniques to bypass Internet censorship ○ https://www.psiphon3.com/en/download.html (iOS, Android, Windows) ○ Download via email: Send an email to [email protected] to receive mirror download links of Psiphon in multiple languages. ● Lantern is a free and open source censorship circumvention VPN that uses a variety of techniques to bypass Internet censorship. ○ https://getlantern.org/en_US/index.html (Windows, MacOSX, Linux, iOS, Android) ● Tor Browser is the de-facto anonymity web browser that uses the Tor network for improved anonymity and provides censorship circumvention. ○ https://www.torproject.org/download/ (Windows, MacOSX, Linux, Android); ○ Download via email: Send a request to GetTor ([email protected]) specifying your operating system (and your locale). Ex: "windows fa" ○ OnionBrowser (iOS) https://onionbrowser.com https://apps.apple.com/us/app/onion-browser/id519296448 VPNs with good anti-censorship track records: ● TunnelBear - https://www.tunnelbear.com/download - (Windows, MacOSX, Linux, iOS, Android) ○ NOTE: Tunnelbear
    [Show full text]
  • Rook: Using Video Games As a Low-Bandwidth Censorship Resistant Communication Platform
    Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform Paul Vines Tadayoshi Kohno University of Washington University of Washington [email protected] [email protected] ABSTRACT 1. INTRODUCTION Censorship and surveillance is increasing in scale, sophisti- There are increasing concerns about the privacy of online cation, and prevalence across the globe. While most censor- communications throughout the world: both surveillance ship circumvention systems still focus on escaping a given and censorship of the Internet has continued to increase in censored region to access Internet content outside of its con- scale, sophistication, and prevalence [6, 13, 34]. There have trol, we address a different but equally pressing problem: been many systems developed for attempting to hide com- secure and secret chat within a censored region. munications on the Internet from censors, we will simply We present Rook as a censorship and surveillance resistant refer to these as circumvention systems. Most of these are platform for communication using online games as its cover designed to route a user's traffic outside of a censored re- application. The use of online games represents a novel form gion to access censored content. These systems have many of cover application that provides several features that make different approaches and goals with respect to circumvent- them uniquely well-suited for this purpose. Rook transmits ing censorship and surveillance, and what kinds of attacks data secretly by embedding it in the network traffic of an on- they can withstand. This has led to an arms race situa- line game. To mitigate current attacks based on deep-packet tion in which new circumvention systems are invented and inspection and traffic shape analysis Rook uses the normal improved followed closely by attacks against them similarly traffic used by the game, it does not generate additional being invented and improved.
    [Show full text]
  • Practical Countermeasures Against Network Censorship
    Practical Countermeasures against Network Censorship by Sergey Frolov B.S.I.T., Lobachevsky State University, 2015 M.S.C.S., University of Colorado, 2017 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science 2020 Committee Members: Eric Wustrow, Chair Prof. Sangtae Ha Prof. Nolen Scaife Prof. John Black Prof. Eric Keller Dr. David Fifield ii Frolov, Sergey (Ph.D., Computer Science) Practical Countermeasures against Network Censorship Thesis directed by Prof. Eric Wustrow Governments around the world threaten free communication on the Internet by building increasingly complex systems to carry out Network Censorship. Network Censorship undermines citizens’ ability to access websites and services of their preference, damages freedom of the press and self-expression, and threatens public safety, motivating the development of censorship circumvention tools. Inevitably, censors respond by detecting and blocking those tools, using a wide range of techniques including Enumeration Attacks, Deep Packet Inspection, Traffic Fingerprinting, and Active Probing. In this dissertation, I study some of the most common attacks, actually adopted by censors in practice, and propose novel attacks to assist in the development of defenses against them. I describe practical countermeasures against those attacks, which often rely on empiric measurements of real-world data to maximize their efficiency. This dissertation also reports how this work has been successfully deployed to several popular censorship circumvention tools to help censored Internet users break free of the repressive information control. iii Acknowledgements I am thankful to many engineers and researchers from various organizations I had a pleasure to work with, including Google, Tor Project, Psiphon, Lantern, and several universities.
    [Show full text]
  • Distributed Ledger Technology (DLT), Also Re- Ferred to As “Blockchain”, Has the Potential to Be Such a Disruptive Solution
    Distributed Ledger Technology for Climate Action Assessment IN PARTNERSHIP WITH 1 Introduction A letter from Dr. Harald Rauter, Innovation Lead - DACH, EIT Climate-KIC. Over the past decade the world has witnessed More than that, it bears the potential to create a myriad of milestones that that have put the new social- and market dynamics, helps develop vision of a prosperous, climate-resilient society new and innovative ways of doing business and on the main stage of the world’s attention. From brings unprecedented transparency to capital the UN’s Sustainable Development Goals to the flows. Bringing powerful technologies of data Paris Agreement, there is overwhelming global sensing and -collection (Internet of Things), consensus that collective action is needed to data analysis (Artifical Intelligence and Machine meet the 2° target. The painful truth, however, Learning) and data encryption and transaction is that Europe and the world are not on track to (Distributed Ledger Technology) to climate action reach the 2° target. opens a new opportunity window for highly impactful climate action initiatives that lead to At EIT Climate-KIC, as Europe’s largest public- the deep decarbonisation that is needed to reach private partnership focused on climate the 2° target. innovation, more than 300 world-class partner organisations across business, academia, the How to read this report public sector and NGOs are committed to the In the ever-changing and evolving world of shared vision of taking a systemic approach digital transformation, keeping up with the most across technology, infrastructure, economic recent developments and their respective impact models, capital flows and policy to turn innovation potential can seem a daunting and almost into climate action.
    [Show full text]
  • Harboring Wikileaks: Comparing Swedish and American Press Freedom
    Corneil: Harboring WikiLeaks: Comparing Swedish and American Press Freedom HARBORING WIKILEAKS: COMPARING SWEDISH AND AMERICAN PRESS FREEDOM IN THE INTERNET AGE TABLE OF CONTENTS 1. INTRODUCTION ........................... ..... 477 II. BACKGROUND ........................................ 484 A. Brief Overview of WikiLeaks ............ ......... 484 B. Overview of Media Regulation ............. ..... 487 III. THE STATE OF DIGITAL PRESS FREEDOM IN SWEDEN..............489 A. The History of Swedish Press Freedom ......... ........ 490 B. WikiLeaks'Presence in Sweden .................. 491 C. Lessons from the PirateBay Trial ........... ..... 497 D. WikiLeaks'Future in Sweden and PossibleAlternatives .. 501 IV. THE STATE OF DIGITAL PRESS FREEDOM IN THE UNITED STATES ...................................... ....... 503 A. Developing Exceptions to the Freedom of the Press ......... 504 B. PriorRestraint and the PentagonPapers ...... ....... 505 C. Reporter'sPrivilege and Whistleblower ProtectionLaws 513 D. Bank Julius Baer v. WikiLeaks .............. ..... 515 V. PROPOSED LEGISLATION: THE DIGITAL WHISTLEBLOWER PROTECTION ACT .................................... 517 VI. CONCLUSION. .................................. ...... 521 I. INTRODUCTION "Today, with authoritarian governments in power around much of the world, increasing authoritarian tendencies in democratic governments, and increasing amounts of power vested in unaccountable corporations, the need for openness and transparency is greater than ever. WikiLeaks is a tool to satisfy that need."'
    [Show full text]