OONI: Open Observatory of Network Interference

OONI, the Open Observatory of Network Interference, is a global observation network which aims to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and open data about the various types, methods, and amounts of network tampering in the world. Furthermore, OONI is a human rights observation project – observation is a fundamental requirement for the advancement of knowledge and OONI aims to ensure that the tools to make such observations are freely available to all. With the belief that unfettered access to information is an intrinsic human right, OONI seeks to observe levels of surveillance, censorship, and network discrimination in order for people worldwide to have a clearer understanding of the ways in which their access to information and speech is monitored, censored or otherwise filtered. The end goal of OONI is to collect data which will show an accurate topology of network surveillance, interference and outright censorship. Through this data, it will be possible to draw conclusions about how the internet functions from any location where an OONI probe is present. This data includes which websites are censored, or which services have been tampered with, and by whom. The data also includes information about the observer and will attempt to classify the results. We use the term filternet to describe network connections that are under measurable surveillance, tampering, or subject to censorship.

[1]  Jack M. Balkin Media Filters, The V -Chip and the Foundations of Broadcast Regulation , 1996 .

[2]  Jonathan Weinberg Rating the Net , 1996 .

[3]  Lawrence Lessig What Things Regulate Speech , 1997 .

[4]  Richard J. Peltz Use "the Filter You Were Born with": The Unconstitutionality of Mandatory Internet Filtering for the Adult Patrons of Public Libraries , 2002 .

[5]  R. Dettmer The Net effect (Internet) , 1995 .

[6]  Richard J. Peltz-Steele Use ‘the Filter You Were Born with’: The Unconstitutionality of Mandatory Internet Filtering for the Adult Patrons of Public Libraries , 2002 .

[7]  Jonathan L. Zittrain,et al.  Be Careful What You Ask For: Reconciling a Global Internet and Local Law , 2003 .

[8]  Stephen Isaac,et al.  The Net Effect , 2011 .

[9]  Boris Nechaev,et al.  Netalyzr: illuminating the edge network , 2010, IMC '10.

[10]  Sotiris Ioannidis,et al.  CensMon: A Web Censorship Monitor , 2011, FOCI.

[11]  Ray P. Norris How to Make the Dream Come True: The Astronomers' Data Manifesto , 2007, Data Sci. J..

[12]  KEEPING IT CLEAN,et al.  Keeping it clean. , 2014, Joint Commission perspectives. Joint Commission on Accreditation of Healthcare Organizations.

[13]  Chris Newman,et al.  Date and Time on the Internet: Timestamps , 2002, RFC.

[14]  Georg Carle,et al.  X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle , 2012, ESORICS.

[15]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[16]  Tim Hwang,et al.  Threat Modeling: Herdict: A distributed model for threats online , 2007 .

[17]  Fred Von Lohmann Unintended Consequences: Twelve Years under the DMCA. , 2010 .

[18]  R. Feynman Surely You''re Joking Mr , 1992 .