A Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship

نویسندگان

  • Christopher S. Leberknight
  • Mung Chiang
  • Felix Ming Fai Wong
چکیده

The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of news coverage in the past decade, and presents a taxonomy of the principles, techniques, and technologies of Internet censorship. The interplay between social, political, and technological factors is presented to highlight the challenges in anti-censorship. Part II of the paper focuses on anti-censorship. DOI: 10.4018/jep.2012040104 International Journal of E-Politics, 3(2), 52-64, April-June 2012 53 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. • VoIP (e.g., Skype) • Social Networks (e.g., Facebook) While various media have been used in the past to communicate and inform the public of current events, none is as formidable to oppressive regimes as the Internet. For example, the printing press helped to spread information by accelerating the publication and dissemination of books and newspapers, while radio and television broadcasting facilitated the rapid communication of events and helped to expand overall news coverage. However, the Internet enables a much more rapid generation and spread of information and ideas compared to previous technologies. In addition, the inherent characteristics of the Internet make controlling information on the network extremely challenging. One factor is that national borders are more permeable online: residents of a country that ban certain information can find it on websites hosted outside the country (Wikipedia, n. d.). Another major factor that makes online information especially difficult to control has to do with the fundamental design and objective of the Internet. The initial requirement for the Internet was to design a distributed system that was secure and would be less susceptible to failure and damage from a single point of failure. The very nature and advantage of a distributed system is that in the event that there is some damage or failure in the network, transmission can be routed around the damage. In addition, to allow for communication between different systems a set of standard protocols had to be developed to ensure interoperability. As a result, characteristics such as robustness which make the Internet an ideal platform for communication and dissemination of information also make it very difficult medium on which to regulate the spread and access of information. The combination of the ability to rapidly generate and share new ideas coupled with the complexity of controlling information flow, creates a viral effect which can, for example, spur social change. This phenomenon is especially significant if the information being exchanged contains content that may induce collective action and free thought. As a result, Internet censorship, which is defined as the control or suppression of the publishing or accessing of information on the Internet (Wikipedia, n. d.) has been steadily increasing in several countries. Even though censoring information on the Internet may be more difficult compared to other forms of media, several techniques have been developed and are in use in many societies such as China, Iran, and Syria. Some recent events involving Internet censorship have also occurred in Iran, Tunisia and Egypt. In June 2009, the Iranian government headed by President Mahmoud Ahmadinejad blocked several websites and text messages to deter protesters supporting Presidential candidate Mir Hussein Moussavi (Chen, 2011). The popular social networking site, Twitter, was widely used by Iranian citizens to circumvent censorship to communicate current events outside of Iran. In October 2010, the Chinese “Great Firewall” obstructed the spread of the news that Liu Xiaobo, imprisoned for his activities for democracy in the country, received the Nobel Peace Prize, in recognition of “his long and nonviolent struggle for fundamental human rights in China” (“Liu Xiaobo”, 2010). Another case of Internet censorship that took place amidst presidential elections occurred in January 2011, when the Tunisian government selectively blocked many sites during the political uprising against existing President Zine el-Albidine Ben Aliin. While these three examples underscore the impact of using the Internet to precipitate social change, perhaps the most prominent and extreme form of Internet censorship occurred in Egypt on January 28, 2011. In response to political unrest, the Egyptian government shut down Internet connections for several days “...Citizens in Egypt were able to use satellite communications, Twitter feeds, and land lines to continue to communicate outside of the country” (Chen, 2011). While this event marks one of the most recent drastic measures to control the flow of information, many oppressive regimes that have blocked Internet services for political purposes are continuing to investigate new approaches to censoring the Internet. 11 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/taxonomy-censors-anti-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies

This paper presents a conceptual study of Internet anti-censorship technologies. It begins with an overview of previous research on Internet anti-censorship systems and discusses their social, political and technological dimensions. Then for deployed Internet anti-censorship technologies, a taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and...

متن کامل

Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

متن کامل

Leveraging Internet Services to Evade Censorship

Free and uncensored access to the Internet is an important right nowadays. Repressive regimes, however, prevent their citizens from freely using the Internet and utilize censorship to suppress unwanted content. To overcome such filtering, researchers introduced circumvention systems that avoid censorship by cloaking and redirecting the censored traffic through a legitimate channel. Sadly, this ...

متن کامل

No Direction Home: The True Cost of Routing Around Decoys

Decoy routing is a recently proposed approach for censorship circumvention. It relies on cooperating ISPs in the middle of the Internet to deploy the so called “decoy routers” that proxy network traffic from users in the censorship region. A recent study, published in an award-winning CCS 2012 paper [24], suggested that censors in highly connected countries like China can easily defeat decoy ro...

متن کامل

Thanks to Platinum Supporters Silver Supporters Bronze Supporters

Exploiting recent advances in monitoring technology and the drop of its costs, authoritarian and oppressive regimes are tightening the grip around the virtual lives of their citizens. Meanwhile, the dissidents, oppressed by these regimes, are organizing online, cloaking their activity with anti-censorship systems that typically consist of a network of anonymizing proxies. The censors have becom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJEP

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012