CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Twitter The Basics. What is Twitter? Tweets are: 140 characters or less Quick to follow and view updates Used to share links, photos, videos, music,hot.
© 2015 Imperva, Inc. All rights reserved. Collateral DDoS Ido Leibovich, ADC.
Keeping our Children Safe Online
Cyber bullying and internet safety Parents meeting: staying safe online.
THE INTERNET IN CHINA 384 million users by the end of 2009 (Xinhua News Agency, Jan. 15, 2010) Top three uses are online music, online news and search.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Concept Doppler: A weather Tracker For Internet Censorship Author: Jedidiah R. Crandall, Danial Zinn, Michael Byrd, Earl Barr, Rich East Presented At:
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Norman SecureSurf Protect your users when surfing the Internet.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
+ The Future of Social Media By Abigail Boghurst.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Lovejoy Preschool PTA Association January 20, 2011 Terri Harkey Puster Elementary Library Media Specialist.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Keeping on Top of Technological Trends and Uses of Existing Technology Daniel L. Appelman Heller Ehrman LLP.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 03 PHILLIPA GILL STONY BROOK UNIVERSITY, COMPUTER SCIENCE ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S.
Security & Reputation protection or restriction?building or destroying? & Reputation helen goss
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Pete Bohman Adam Kunk. What is real-time search? What do you think as a class?
Pete Bohman Adam Kunk. Real-Time Search  Definition: A search mechanism capable of finding information in an online fashion as it is produced. Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu 1 ; David Phipps 2 ; Adam Pridgen 3 ; Jedidiah R. Crandall 4 ;
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
Social Searching on the Web Max Macias Emporia State University.
Twitter: What can you do in 140 characters or less? COM 160: New Communications Technologies.
Role Of Network IDS in Network Perimeter Defense.
Donna Waters Felecia Wesley The Man with the visio n Tim Berners-Lee began the development of his vision of the World Wide Web in Before the creation.
How Social Media Changed The World Of Event Planning By Olivia Burke.
Personal Branding. Objectives How do you see yourself? How do others see you? What is your personal brand?
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
How to minimise the risks for your children online
Live. me is a Video Streaming App
E-Safety Briefing
CS590B/690B Detecting network interference (Fall 2016)
CS590B690B Detecting network interference
CS590/690 Detecting network interference Fall 2016
CS590B/690B Detecting Network Interference (Fall 2016)
Introduction to Networking
CS590B/690B Detecting network interference (Spring 2018)
CS590B/690B Detecting Network Interference Spring 2018
Live. me is a Video Streaming App
Why the government should monitor its citizens using technology
Why is Access to folk and Popular Culture Unequal?
A Gift of Fire Third edition Sara Baase
Firewall Installation
A Gift of Fire Third edition Sara Baase
Social Media Presentation
Presentation transcript:

CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WHERE WE ARE Last time: Case study: China Case Study + Nick Weaver Surveillance Talk Questions?

TEST YOUR KNOWLEDGE 1.What were the Green Dam and Blue Dam projects? 2.How did Concept Doppler test for blocking by the GFW? 3.How did Concept Doppler localize the Chinese censor? 4.How does LSA help Concept Doppler? 5.What are challenges/limitations of Concept Doppler? 6.What was the goal of the second reading? 7.What was a necessary first step that paper had to take? 8.How did they go about this? 9.Where did they find censors located? 10.Why would censors be distributed across the provinces? 11.Describe the Great Cannon and how it operates

TODAY Censorship + Social Media Twitter spam for political censorship c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/ foci13-verkamp.pdfhttp://0b4af6cdc2f0c c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/ foci13-verkamp.pdf Censorship on Weibo

RELATED READING 1 Adapting Social Spam Infrastructure for Political Censorship. Reading presentation.

OTHER INCIDENTS Reading 2. PDF Slides. Five incidents, one theme. SlidesSlides

SOCIAL MEDIA CENSORSHIP IN CHINA Western online social networks (OSNs) blocked …local alternatives provided These local alternatives provide censors with a tighter rein on the content that is posted …since these products are in their jurisdiction

SOCIAL MEDIA IN CHINA

WEIBO IS A POPULAR SUBJECT FOR RESEARCH Velocity of censorship Identifying “sensitive users” Users who post about 25 previously-banned keywords Anyone these users retweet at least 5 times was potentially sensitive Monitored these users until they had 5 posts remove then added them to the set of ``sensitive’’ users. 15 days of this process: 3.5K users 4.5K post deletions per day for these users ~12% of posts from sensitive users deleted ~1 minute granularity on monitoring these users Weibo accounts Tor circuits needed to accomplish this

TYPES OF DELETIONS “general deletion” – when a query for a post results in “post does not exist” “permission-denied deletion”/”system deletion” – when the query results in a “permission denied” error code Relation of posts: if A is a repost of B; A is the “Child post” and B is the “parent post” 82% of deletions are of child posts; 75% have pictures either in the child or parent post. Deletions happen fast: 30% within 30 minutes, 90% within a day.

FACTORS THAT IMPACT THIS RATE Keyword lists of content to block Certain users targeted for blocking Users with more deletions are deleted faster Reposts of an original post deleted at the same time as the original

SPEED OF CENSORSHIP Less censorship when censorship workforce is likely off (nighttime) Early morning posts live longer as the censors catch up

WEIBO FILTERING MECHANISMS Proactive filtering: Explicit filtering: user is notified that their post cannot be posted because of sensitive content Implicit filtering: user is notified that post is delayed because of “server data synchronization” seems to suggest post is delayed until it can be manually checked Camouflaged posts: user can see the post, but other users cannot Retroactive filtering: Removing reposts Retroactive keyword filtering (spike in deletion of posts with a given keyword) User monitoring (users with many deletions get deleted fast) Account closures (10% of sensitive users had accounts closed) Search filtering (cannot search for certain words) Sensitive topics appear to be filtered fro the public timeline

EVOLVING TOPICS AND WORD CHOICE ON WEIBO Gathering tweets from 280K politically active Weibo users for 44 days NLP for trending topics Censorship per topic varies with up to 82% censorship for some topics.

USERS ARE RESOURCEFUL

HANDS ON ACTIVITY Explore China Chats data Study done by U New Mexico + The Citizen Lab Monitoring keyword lists used by two Chinese Chat Clients TOM Skype ; SINA UC

WHERE WE ARE Nearly finished! So far, focus mainly on measurement of censorship Measuring censorship at different layers of the protocol stack Network layer (IP filtering) Transport (RST injection) Application (DNS injection, HTTP proxies, Online social network censorship) Measuring different information controls (traffic differentiation) Challenges and proposed platforms (ONI, OONI, Spookyscan) Measuring censorship around the world (Iran, China, Pakistan)

WHAT’S NEXT? Today: Last bit of measurement – how to identify specifically which product is used for censorship Next few lectures … How to protect against online information controls Anonymization tools Circumvention tools Today is the last day of eligible material for Midterm 1!

FILTERING PRODUCTS… Dual use technology … Keep employees off Facebook, keep schoolchildren safe from inappropriate content …but in the wrong hands Human rights violations Surveillance Censorship …

EXAMPLES OF FILTERING PRODUCTS …

US has similar sanctions in place for Iran + Syria

HOW TO ENFORCE RESTRICTIONS? … and monitor emerging issues … Need techniques to identify installations of these products in regions around the world AND confirm that they are used for censorship Related reading presentation.