+ All Categories
Home > Documents > I NTERNET CENSORSHIP – The Information Blocking Wall Di Wen

I NTERNET CENSORSHIP – The Information Blocking Wall Di Wen

Date post: 24-Feb-2016
Category:
Upload: robert
View: 52 times
Download: 0 times
Share this document with a friend
Description:
I NTERNET CENSORSHIP – The Information Blocking Wall Di Wen dw2464. Why Study Internet Censorship? Free Speech Internet in Day-to-day Life – Information Source Difference from Other Censorships A Global Issue. History of Internet Censorship - PowerPoint PPT Presentation
18
INTERNET CENSORSHIP – The Information Blocking Wall Di Wen dw2464
Transcript
Page 1: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

INTERNET

CENSORSHIP

– The Information

Blocking Wall

Di Wen dw2464

Page 2: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Why Study Internet Censorship?

Free Speech Internet in Day-to-day Life – Information Source Difference from Other Censorships A Global Issue

Page 3: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

History of Internet Censorship

Censorship Has Been in Existence Almost as Long as Intellectual Exploration

The History of Censorship Can be Traced Back to Ancient Times: Socrates, Protagras, Galileo, Bulunuoga

Internet Censorship Emerged in 1990s, Not Long After Usage of Internet

CHINA: Great Fire Wall Started in 1998. Keeps Upgrading.

USA: CDA (Communications Decency Act) COPA (Child On-line Protection Act)

Page 4: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Internet Censorship Methods – Non-technological

TAKE-DOWN: Regulators Force Websites to Shut Down

SELF-CENSORSHIP: Use Laws or Social Norms to Educate People

Page 5: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Internet Censorship Methods – Brute-force

FULL BLOCK

Cut off Routers. Disconnected from World's Internet. Used in 2011 Egyptian Protests SEARCH RESULT REMOVAL:

Internet Search Service Company Cooperates with Government by Removing Forbidden Entries in Search Results

Story of Baidu and Google in 2010 Funny Words: River Crab, Grass Mud Horse, Six + Four

Page 6: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Internet Censorship Methods – Technical Blocking

IP BLOCKING

Block Access to Specific Hosting Servers with Banned IP One of the Earliest Strategies

DNS TAMPERING

Focus on Domain Names Instead of IP Addresses DNS Server Refuses to Resolve Domain Names, or Returns

Wrong IP Addresses for the Domain Names Usually Returns a Fake IP Which is Already Blocked

Page 7: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

“The Great DNS Wall of China”

Comparison Between the Normal US DNS Servers and Tampered Chinese Servers

Running Two Rounds of DNS Query Tests Using the Same Set of Partially Tampered Domains

Result:

Page 8: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Internet Censorship Methods – Technical Blocking

URL FILTERING Look for Sensitive Strings in the URL Input into Browser

PACKET FILTERING Scan the Information Contained in Packets, and

Terminates the TCP Packet Transmissions When a Certain Number of Sensitive Keywords Are Detected

CONNECTION RESET Set the Firewalls So That the System Will Automatically

Block Connections from/to an Entity for a Period of Time if the Previous TCP Connection was Blocked

Page 9: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Internet Censorship

Brute-force

Non-technological

Technical Blocking

Take-down

Self-censorship

Full Block

Search Result Removal

IP Blocking

DNS Tampering

Internet Censorship Methods

URL Filtering

Packet FilteringConnection

Reset

Page 10: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Analysis of Internet Censorship Methods – Non-technological & Brute-Force

TAKE-DOWN & SELF-CENSORSHIP

Useful in Countries Where Government Is Highly Centralized and Owns Great Power Over Its People – Dictatorship

Not Useful in Democratic Countries

FULL BLOCK & SEARCH RESULT REMOVAL

Simple And Efficient – No Way to Fight Back High Cost: Egyptians Lost $ 110 Million In the Internet Locking Jan 2011 Chinese Government Received Unanimous Criticism for Google

Quit

Page 11: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Analysis of Internet Censorship Methods

– Technical Blocking

Advantage over Non-technical Blocking: There Are Websites Which Citizens Can Access But Government Has No Control

Disadvantage: Under-blocking & Over-blocking

IP BLOCKING:

Works for All Protocols Based on IP Depends on the Accuracy of the Blacklist of Registered IPs IPs Keep Changing – Difficult to Maintain Accuracy May Falsely Block Accepted Websites on the Same Server of

the Forbidden Websites on the List Easily Bypassed Using Proxies

Page 12: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Analysis of Internet Censorship Methods

– Technical Blocking

DNS TAMPERING: Works for All Protocols Based on IP Focus on Domain Names – Domain Names Seldom Change Circumvented by Looking for Not Tampered Foreign Servers

Or Get IP Address via Other Ways besides DNS Queries – Inconvenient

URL FILTERING: Only Works for HTTP Accuracy Depends on Blacklist of Blocked URL Strings Bypassed by Escape Characters and VPN Scunthorpe Problem: A String Is Blocked Because Its Text

Contains a Substring of Letters Shared with Forbidden Strings

Page 13: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Analysis of Internet Censorship Methods

– Technical Blocking

PACKET FILTERING:

Works for All Protocols Based on TCP Focus on TCP Packets Instead of Higher-level Input Strings Scunthorpe Problem Circumvented by VPN Or Modifying the TCP/IP Stack to

Reduce the Amount of Text in a Packetng the TCP/IP stack to reduce the amount of te in a packet

CONNECTION RESET

Works for TCP-based Protocols Avoided by Omitting the Signal of Reset from Firewall

Page 14: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Analysis of Internet Censorship Methods

– Summary

DNS Tampering Looks to Be the Best Solution But The Choice Depends on Specific Situation – Use as Much

as Needed

Page 15: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Future of Internet Censorship Techs – Current Circumvention Tools

Came into Being Shortly after Censorship Technologies – Cat-and-mouse Game

WEB PROXIES Hides Connections between User and Forbidden Server

TUNNELING SOFTWARE A Means for Communication from Network Locations with

Restricted Connectivity: behind NATs, Firewalls, etc.

VPNs (Virtual Private Networks) Build a Secure Connection to Another Region Which

Doesn't Pose Restriction on the Blocked Material in the User's

Region

Page 16: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Future of Internet Censorship Techs –Trends of Censorship Technologies

Move Filtering from Browsers to Web Proxies

Easier Maintenance and Better Compatibility No Longer Able to Bypass Internet Censorship by Any

Modifications or Deletions on Browsers

Move from Static Detection to Dynamic Analysis

Solve the Problem of Accuracy of Blacklist in IP & URL Blocking

Keyword-matching on Every Page Instead of Per Website Kills the Attempts to Fight against Censorship by Changing IP

Addresses or URL Strings

Page 17: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

Conclusions

Non-Technical Methods are Powerful, but Have Limited Usage

Technical Blocking Methods Are Preferable. The Government Should Choose among the Technical Blocking Methods According to the Practical Conditions and Implement as Many Methods as Possible to Fight against Different Kinds of Anti-censorship Users

Future Trends: Combination of Proxy Servers and Dynamic Content Analysis Can Make Internet Censorship More Efficient and Powerful

The Cat-and-mouse Games Go Marching On……

Page 18: I NTERNET CENSORSHIP – The Information  Blocking Wall Di Wen

THE END!


Recommended