Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►

Slides:



Advertisements
Similar presentations
By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Advertisements

Northside I.S.D. Acceptable Use Policy
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
The Great Firewall of China INTRODUCTION Gisela Torrentí, Judith Martín & Julia Mabrey.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
Self-Censorship in China Eric Schabel & Fahad Pervaiz.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul,
Inappropriate Materials. Discussion Question Think of a time in your classroom when a student viewed inappropriate materials. Why were they inappropriate?
Netiquette Rules.
Copyright Infringement
1 Freedom of Expression Prepared By Joseph Leung.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Internet Censorship Sri Reddy Internet and Web Systems 2 Presentation.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Internet Censorship Controversy Internet censorship, When does it go to far?
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
Chinese internet control: Corporate collaboration Rebecca MacKinnon 4/20/2006
Freedom of Speech in Cyberspace
Compsci 82, Fall Sex, Gambling, (Rock and Roll) Online l Gambling in the USA:  Where is gambling legal?
1 “ISP Blocking” in Italy Francesco Rodano, AAMS REGULATING GAMBLING: THE ROLE OF THE AUTHORITY Bruxelles, 12 October 2010.
Chapter 3: Freedom of Speech.
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Content Control. Extreme Regimes Myanmay (Burma) - Possession of modem without permission punishable by years gaol Cuba - Internet access only through.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Chapter 3: 1st Amendment.
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Restrictions of Internet Use Jeremiah Jones Rodney Dowdy Pablo Gonzalez Pers 2730 Internet Technologies Dr. Chunlei Liu Jeremiah.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Presentation by: Jennifer Collins Roldan Padilla.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
Chapter 14 How Universal is access to Computers and the Web.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 30 Security, Knowledge and Freedom of Expression.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 17: Internet IV (Content Regulation) Copyright © 2007.
China China is attempting to gain wealth and power by increasing trade with Japan, controlling the population, and limiting the information available to.
Think / Pair / Share What are Human Rights?
CS590B690B Detecting network interference
Think / Pair / Share What are Human Rights?
Background Because of the large amount of copyright infringement and piracy many companies are reaching and claiming that ISPs should be responsible for.
In order of appearance:
A Gift of Fire Third edition Sara Baase
Internet Acceptable Use Policy:
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Democracy and Information
Democracy and Information
Presentation transcript:

Forced Internet Filtering Thomas Mahoney

Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ► Types of filtering  Political  Social  Conflict/ Security  Internet Tools

Filtering in the US ► The United States filters illegal material or anything potentially harmful to children  Child Pornography  Sites that sell illegal drugs  Sites that infringe copyright law ► ISP Comcast  Has attempted to limit access to bit torrent from clients that use an extreme amount of bandwidth

Attempts at Laws ► Communications Decency Act (CDA)‏  Over turned before it went into effect ► Child Online Protection Act (COPA)‏  Over turned due to first amendment ► The Children’s Internet Protection Act (CIPA)‏  Still in effect, forces libraries funded by the state to use an internet filter on all computers

How the US Filters ► Obviously, there is no automated system ► ISP are not forced to regulate any sites on their own, but they can if they choose ► A judge has to sign off on it, and then the ISP is noticed when there is an issue  They have to get it removed, and may notify the offender  They may be forced to give personal information of the offender

China’s Attempt ► China has successfully created an internet filter for their country.  Golden Shield  Great Firewall of China ► China was the first dictatorship to realize they could not do without the internet ► The next question was how could they regulate it

Olympics in Beijing ► The Chinese crackdowns in Tibet have sparked bitter protests around the world  Information about these events in China have been filtered to only show Pro-China stories  This worked in China’s favor, as there was millions of Chinese citizens who used MSN to show their support against Pro-Tibet Protesters  Bloggers rallying protest against Pro-Tibet Protesters (Germany)‏ ► China refuses to open the internet during the Olympic games.

China leads in Internet Filtering ► China’s Internet population has grown past the US’s ► China uses between 30,000 and 40,000

How China’s GFC works ► Automated Filter  Targets pages rather then IP addresses  Filters any page with objectionable words, such as Falun Gong, Tibet, Taiwan ► Team of Censors  Unblock and Block pages as required ► Self-Censorship  Fear of punishment  Patriotism

War vs Internet Filtering ► Google  Fought to not bend to Chinas needs in removing its features, such as cache that could bypass the GFC  China removed Google from its network  Google made a special search engine as an extension of the one in America especially for China. ► Yahoo  Was forced by China to give the information of a Chinese citizen

The Future of Filtering ► With China as a role model of how internet Filtering should work, it is hard to see how this will not be adapted into other parts of the world ► Companies will have to bend to China’s demands when it comes to enforcing filtering, there is just too much money as China now leads the world in internet population ► The US has been upping its own Internet Filtering practices, so there may be more of a filtering effort in the US to block illegal content

The End Questions?