Making sense of internet censorship: a new frontier for internet measurement

Free and open access to information on the Internet is at risk: more than 60 countries around the world practice some form of Internet censorship, and both the number of countries practicing censorship and the proportion of Internet users who are subject to it are likely to increase. We posit that, although it may not always be feasible to guarantee free and open access to information, citizens have the right to know when their access has been obstructed, restricted, or tampered with, so that they can make informed decisions on information access. We motivate the need for a system that provides accurate, verifiable reports of censorship and discuss the challenges involved in designing such a system. We place these challenges in context by studying their applicability to OONI, a new censorship measurement platform.

[1]  Robert N. M. Watson,et al.  Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.

[2]  Ronald J. Deibert,et al.  Access Denied The Practice and Policy of Global Internet Filtering , 2008, CrimRxiv.

[3]  Minaxi Gupta,et al.  Inferring Mechanics of Web Censorship Around the World , 2012, FOCI.

[4]  Jacob Appelbaum,et al.  OONI: Open Observatory of Network Interference , 2012, FOCI.

[5]  Paul Sturges,et al.  Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .

[6]  George Danezis An anomaly-based censorship-detection system for Tor , 2011 .

[7]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[8]  Santosh S. Vempala,et al.  Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.

[9]  Vinod Yegneswaran,et al.  StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.

[10]  Ian Goldberg,et al.  Telex: Anticensorship in the Network Infrastructure , 2011, USENIX Security Symposium.

[11]  Nick Feamster,et al.  Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.

[12]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[13]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[14]  Jedidiah R. Crandall,et al.  ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.

[15]  Sotiris Ioannidis,et al.  CensMon: A Web Censorship Monitor , 2011, FOCI.