cse 592 internet censorship (fall 2015) lecture 12

28
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

Upload: shanon-stevenson

Post on 14-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

CSE 592INTERNET CENSORSHIP

(FALL 2015)

LECTURE 12

Page 2: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WHERE WE ARE

Last time:

• Case study: China Case Study + Nick Weaver Surveillance Talk

• Questions?

Page 3: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

TEST YOUR KNOWLEDGE

1. What were the Green Dam and Blue Dam projects?

2. How did Concept Doppler test for blocking by the GFW?

3. How did Concept Doppler localize the Chinese censor?

4. How does LSA help Concept Doppler?

5. What are challenges/limitations of Concept Doppler?

6. What was the goal of the second reading?

7. What was a necessary first step that paper had to take?

8. How did they go about this?

9. Where did they find censors located?

10. Why would censors be distributed across the provinces?

11. Describe the Great Cannon and how it operates

Page 5: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

RELATED READING 1

• Adapting Social Spam Infrastructure for Political Censorship.

• Reading presentation.

Page 6: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

OTHER INCIDENTS

• Reading 2. PDF Slides. Five incidents, one theme. Slides

Page 7: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

SOCIAL MEDIA CENSORSHIP IN CHINA

• Western online social networks (OSNs) blocked

• …local alternatives provided• These local alternatives provide censors with a tighter rein on

the content that is posted

• …since these products are in their jurisdiction

Page 8: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

SOCIAL MEDIA IN CHINA

Page 9: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

SOCIAL MEDIA IN CHINA

Page 10: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WEIBO IS A POPULAR SUBJECT FOR RESEARCH

• Velocity of censorship

• Identifying “sensitive users”

• Users who post about 25 previously-banned keywords• Anyone these users retweet at least 5 times was potentially

sensitive• Monitored these users until they had 5 posts remove then

added them to the set of ``sensitive’’ users.

• 15 days of this process: 3.5K users

• 4.5K post deletions per day for these users• ~12% of posts from sensitive users deleted

• ~1 minute granularity on monitoring these users

• Weibo accounts + 300 Tor circuits needed to accomplish this

Page 11: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

TYPES OF DELETIONS

• “general deletion” – when a query for a post results in “post does not exist”

• “permission-denied deletion”/”system deletion” – when the query results in a “permission denied” error code

• Relation of posts: if A is a repost of B; A is the “Child post” and B is the “parent post”

• 82% of deletions are of child posts; 75% have pictures either in the child or parent post.

• Deletions happen fast: 30% within 30 minutes, 90% within a day.

Page 12: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

FACTORS THAT IMPACT THIS RATE

• Keyword lists of content to block

• Certain users targeted for blocking• Users with more

deletions are deleted faster

• Reposts of an original post deleted at the same time as the original

Page 13: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

SPEED OF CENSORSHIP

Less censorship when censorship workforce is likely off (nighttime)Early morning posts live longer as the censors catch up

Page 14: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WEIBO FILTERING MECHANISMS

Proactive filtering:

• Explicit filtering: user is notified that their post cannot be posted because of sensitive content

• Implicit filtering: user is notified that post is delayed because of “server data synchronization” seems to suggest post is delayed until it can be manually checked

• Camouflaged posts: user can see the post, but other users cannot

Retroactive filtering:

• Removing reposts

• Retroactive keyword filtering (spike in deletion of posts with a given keyword)

• User monitoring (users with many deletions get deleted fast)

• Account closures (10% of sensitive users had accounts closed)

• Search filtering (cannot search for certain words)

• Sensitive topics appear to be filtered fro the public timeline

Page 15: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

EVOLVING TOPICS AND WORD CHOICE ON WEIBO

• Gathering tweets from 280K politically active Weibo users for 44 days

• NLP for trending topics

• Censorship per topic varies with up to 82% censorship for some topics.

Page 16: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

USERS ARE RESOURCEFUL

Page 17: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

HANDS ON ACTIVITY

• Explore China Chats data

• Study done by U New Mexico + The Citizen Lab

• Monitoring keyword lists used by two Chinese Chat Clients

• TOM Skype ; SINA UC• https://china-chats.net/

Page 18: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WHERE WE ARE

Nearly finished!

So far, focus mainly on measurement of censorship

• Measuring censorship at different layers of the protocol stack

• Network layer (IP filtering)• Transport (RST injection)• Application (DNS injection, HTTP proxies, Online social

network censorship)• Measuring different information controls (traffic

differentiation)

• Challenges and proposed platforms (ONI, OONI, Spookyscan)

• Measuring censorship around the world (Iran, China, Pakistan)

Page 19: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

WHAT’S NEXT?

Today: Last bit of measurement – how to identify specifically which product is used for censorship

Next few lectures … How to protect against online information controls

• Anonymization tools

• Circumvention tools

• Today is the last day of eligible material for Midterm 1!

Page 20: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

FILTERING PRODUCTS…

• Dual use technology …

• Keep employees off Facebook, keep schoolchildren safe from inappropriate content

• …but in the wrong hands

• Human rights violations• Surveillance• Censorship• …

Page 21: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

EXAMPLES OF FILTERING PRODUCTS …

Page 22: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12
Page 23: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12
Page 24: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12
Page 25: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12
Page 26: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12
Page 27: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

US has similar sanctions in place for Iran + Syria

Page 28: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12

HOW TO ENFORCE RESTRICTIONS?

… and monitor emerging issues …

• Need techniques to identify installations of these products in regions around the world

• AND confirm that they are used for censorship

• Related reading presentation.