Evasion Tactics

نویسنده

  • NART VILLENEUVE
چکیده

The number of countries that censor and monitor their citizens’ use of the Internet is increasing. While it is no secret that China and Iran censor the Internet, at least 25 countries, including Pakistan, Ethiopia, Thailand and Uzbekistan, also have technical filtering regimes in place. Some of the technology is even exported by western companies: search engines, blog hosting providers and email providers have extended their existing filtering mechanisms – which usually target pornography and copyright infringement – to censor political content and gain access to lucrative markets in repressive countries. Censorship and surveillance is not restricted to authoritarian regimes. The technology used to censor the Internet in entire countries in the Middle East and North Africa also filters access in schools and libraries in North America. An Internet service provider (ISP) in Canada blocked access to a website set up by members of its workers’ union during a labour dispute. ISPs in the United States have implemented a sophisticated, and illegal, monitoring and data-mining programme, covering both Internet and telephone communications, at the behest of the National Security Agency. The problem is magnified when the concept of censorship is extended beyond just the technical aspects of filtering web content and Internet services. There is, however, a growing resistance to Internet censorship and surveillance, although it is often characterised as a struggle confined to dissidents in a few select authoritarian regimes. There are a wide variety of awareness raising campaigns as well as academic research projects aimed at exposing and confronting censorship. Legal battles are being fought all over the globe, while the development and use of technologies that protect privacy and make it possible to circumvent censorship are rapidly increasing. The same tools helping dissidents to evade censorship in repressive countries are also being used by citizens in democratic countries – to protect themselves from unwarranted Internet surveillance. There are three key factors to Internet censorship. First, there are formal and informal mechanisms, including laws, licensing and self-regulation, that act to create the legal, and often extra-legal, framework within which Internet censorship takes place. Second, there are a variety of technical methods

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A skeptical look at viral immune evasion.

In the past several years, many viral gene products have been found to encode proteins which interfere with immune defense mechanisms. Whether these interactions between virus and immune system components are actually evasion mechanisms used during viral infections in their natural hosts remains to be proven. In vitro studies do, however, reveal several tactics which may aid viral replication a...

متن کامل

Coping With Accountability Cross-Pressures: Low-Effort Evasive Tactics and High-Effort Quests for Complex Compromises

The current study explores two classes of strategies of coping with accountability: low-cognitive-effort decision-evasion tactics (buckpassing, procrastination, and exiting the situation) and high-cognitive-effort attempts to craft integratively complex compromises among conflicting perspectives. Some participants read weak arguments on one side of the free trade issue and strong arguments on t...

متن کامل

Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods

Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods. An evasion tactic has two associated costs: implementation complexity and effect on botnet utility. An evasion tactic’s implementation complexity is based on the ease with which bot writers can incrementally modify cu...

متن کامل

The Natural Selection of Herpesviruses and Virus-Specific NK Cell Receptors

During the co-evolution of cytomegalovirus (CMV) and natural killer (NK) cells, each has evolved specific tactics in an attempt to prevail. CMV has evolved multiple immune evasion mechanisms to avoid detection by NK cells and other immune cells, leading to chronic infection. Meanwhile, the host has evolved virus-specific receptors to counter these evasion strategies. The natural selection of vi...

متن کامل

Yang, Harkreader and Gu: Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

To date, as one of the most popular Online Social Networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit activities. Due to the significance and indispens...

متن کامل

Malware Normalization

Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection by malware detectors, malware writers use various obfuscation techniques to transform their malware. There is strong evidence that commercial malware detectors are susceptible to thes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007