T10 GROUP 5

Our Topic: Internet Censorship
Group Members: * Ying Sun * John Crisfiel * Joyti Kalsi



Introduction
Places control and restricts the access to select information that can be retrievable to us through the internet.



Varies in degrees of severity

Ways Internet Censorship is Implemented
Internet censorship is usually implemented through the use of 2 techniques:


 * Internet Service Provider (ISP) Level Blocking


 * PC And Network Level Blocking

Internet Service Provider (ISP) Level Blocking

 * A banned list made by the Government (commonly known as a Black or Blocked List) is given to the internet service provider to add to their database.


 * Any websites that people attempt to access that are on the Blocked List the Interception Proxy Server re routes the person to a page telling them the requested site has been blocked.


 * Interception Proxy Servers tend to slow down the bandwidth of computers they are monitoring.

Specific Examples of Internet Censorship
1.The Chinese government has sent lists of URL`s and specific key words to search engines and Internet service providers that they deem inappropriate for the citizens to view.

2.Such western based corporations such as Google, Yahoo and Microsoft (to name a few) have re-configured their software to comply with Chinese censorship laws.

3.Internet service providers must track internet users IP addresses, phone numbers and account numbers and they must be kept on file.

4.Failure to comply with china`s censorship laws can result in fines and prison time.

PC and Network Level Blocking
Performs a similar function as a interception proxy server.
 * A firewall is placed between a network or single computer and the entire internet.


 * Administrator sets the firewall settings for unwanted internet material. The blocked material most often consist of specific URL’s, key words or full domains.


 * State inspection looks for similarities between incoming/outgoing information and information that has already been deemed appropriate and decides weather the information should be allowed to pass.

Censorship in the Workplace & School

 * Methods of censorship are significantly scaled down from the international level.


 * Goals of workplace and school censorship are to increase productivity and prevent inappropriate content in a learning or professional environment.


 * The most common method of workplace and school censorship involves the use of a firewall. Most effective and manageable for offices filled with computers.

Circumvention Technologies:

 * Include tools such as software and different methods that help bypass filtering of the internet.


 * These technologies can be composed of complex computer programs or simple manual steps.


 * Example would be to access a banned website stored in a search engine’ cache appose to trying to access it directly

Circumvention Providers:

 * Have software which is installed on a computer in a location where there is no censorship and makes it accessible to those who want to access the internet from a censored location.


 * Circumvention providers can range in size.
 * They can consist of large commercial organizations offering their services for a fee or just individual providing circumvention services to other for free.

Pros of Interent Censorship

 * Despite the principal of Freedom of speech in democratic countries is it thought that when it comes to certain types of ‘speech’ it should be censored, considering some content is more hurtful or harmful then useful or constructive. Such as Child pornography or radical racial hatred which would never be acceptable in print of broadcast media. Therefore should not be tolerated on the internet which is readily accessible to anyone and all age types.


 * The redistribution and selling of ‘fake’ or illegal goods should be censored in the internet so buyers aren’t wrongfully taken advantage of. Just as Canada has adverting laws which have specific rules and guidelines for what advertisers in the media, be it television or magazines can put into their advertisements. There should be a parallel for advertising on the World Wide Web.


 * Keeping a professional or academic environment through the censorship of what can or cannot be accessible to the people in that facility creates a more motivating environment for work to be done and offers fewer distractions.

Cons of Interent Censorship

 * Important information that is educational or informative can be blocked if it doesn’t concede with governmental view, therefore suppressing knowledge to anyone who is curious to learn. This in turn is not fair and wrong.


 * Violation of the freedom of speech stops us from expanding our opinions and knowledge so we can’t express what we feel and think as individuals.

Aditional Information
Some Technic Tools Deal With Internet Censhorship 1. Proxy websites

Proxy websites are often the simplest and fastest way to access banned websites in censored nations. Such websites work by being themselves un-banned but capable of displaying banned material within them. This is usually accomplished by entering a URL address which the proxy website will fetch and display. They recommend using the https protocol since it is encrypted and harder to block.

2. Java Anon Proxy

Java Anon Proxy is primarily a strong, free and open source anonymizer software available for all operating systems. As of 2004, it also includes a blocking resistance functionality that allows users to circumvent the blocking of the underlying anonymity service AN.ON by accessing it via other users of the software (forwarding client).[citation needed]

The addresses of JAP users that provide a forwarding server can be retrieved by getting contact to AN.ON's InfoService network, either automatically or, if this network is blocked, too, by writing an e-mail to one of these InfoServices. The JAP software automatically decrypts the answer after the user did a CAPTCHA. The developers are currently[citation needed] planning to integrate additional and even stronger blocking resistance functions.

3. Psiphon

Psiphon software allows users in nations with censored Internet such as China to access banned websites like Wikipedia. The service requires that the software be installed on a computer with uncensored access to the Internet so that the computer can act as a proxy for users in censored environments.

4. Tor

Tor is a free software implementation that allows users to bypass Internet censorship while granting strong anonymity (though it has its weaknesses).

5. Sneakernets

Sneakernet is a term used to describe the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another. A sneakernet can move data regardless of network restrictions simply by not using the network at all.

The charity relief organization Information Without Borders is attempting to implement a sneakernet routing protocol for providing cheap Internet access to developing and post-conflict regions using donated PDAs and mobile phones, and also for providing free and open Internet access to repressive regimes that restrict free expression by limiting access.

Main References
Internet censorship http://en.wikipedia.org/wiki/Internet_censorship

How Internet Censorship Works, Jonathan Strickland, http://computer.howstuffworks.com/internet-censorship.htm

Emperical Analysis of Internet Filtering in China, Jonathan Zittrain and Benjamin Edelman http://cyber.law.harvard.edu/filtering/china/

Beijing`s Internet Censorship, Surveillance, Graham Webster                    				  http://news.cnet.com/8301-13908_3-9977927-59.html

Finnish Internet Censorship, Kai Puolamaki and Helmikuu http://www.effi.org/blog/kai-2008-02-18.html

What`s a MySpace Proxy Server and How Does it Work, Dave Taylor,   http://www.askdavetaylor.com/myspace_proxy_server_how_it_works.html

Australia Gov`t Mandatory ISP Filtering and Censorship Plan, Irene Graham http://libertus.net/censor/ispfiltering-au-govplan.html

Domain Name Systems, Microsoft, http://technet.microsoft.com/en-us/network/bb629410.aspx

China and Internet Censorship, CNN Journalists,  http://www.cnn.com/interactive/world/0603/explainer.china.internet/frameset.exclude.html

Internet Censorship around the World, Charles A. Gimon                          http://www.gimonca.com/personal/archive/foreign.html

Chinese Internet Censorship: A Look Inside, Carolyn Duffy Marsan, http://www.networkworld.com/news/2008/051208-china-internet.html