Changes

Internet Censorship

77 bytes added, 9 years ago
Varying in costs and point of installation, all website censorship systems operate on a similar principle. Requests made by the user for a particular website or content are checked against a list of banned addresses or keywords. Five common methods to block Internet content are practised today and described below. Methods to bypass these restrictions, also known as circumvention are discussed in 'the following module.
'''Exercise: ''' Take a look at blocked website's around the world at this moment from https://www.herdict.org/#
'''Media: ''' The Berkman Center for Internet and Society describe the various way to filter content request or delivery
<vid>{{#ev:youtube|LAUH5MbXc94}}
===How websites are blocked===
This section requires that you have read and understood Lesson 1. The Internet and its Pitfalls, in particular the bits on Internet Protocol (IP) and the Domain Name System (DNS).
These blocklists contain forbidden website addresses, for example www.hrw.org or www.tol.org A request for websites found in this list will be denied.
'''URL Blocking'''
The most common way to block access to a particular website is by adding its name (the universal resource locator) to the banned list.
<img>
'''IP Banning'''
Every website is associated with a unique IP of the computer it is hosted on. Should the censor wish to ban access to livejournal.com using the IP address of the server it is hosted on, a simple query on the Internet will show that it is 208.93.0.128. This address will be added to the banned list and interrupt connections destined for that IP.
'''Keyword Filtering'''
Often, the censor is interested in blocking particular content on the Internet and all websites bearing this content should be added to the blocklists. For example, this may relate to recent news or topics identified by particular keywords (e.g. Tienanmen Square massacre). The most efficient way (from the censor's point of view) to achieve this is through keyword filtering. On the routers at the ISP or the national gateway, content is filtered as it passes through the infrastructure. As soon as a particular string of characters (keywords) is noticed, the system raises a flag and either terminates the connection or simply reports the user's IP address. Keyword filtering may be activated on outgoing connections (you searching for something on Google) or incoming data (accessing a website that contains the keywords in its text).
<img>
'''DNS tampering'''
Another method to prevent users visiting websites is to tamper with the local (ISP or national gateway) copy of the DNS record. This results in requests for “www.livejournal.com” being forwarded to an unrelated (sometimes especially prepared) website. The caveat is that the user's computer (and often the user himself) is not aware of this redirection as the website's URL appears correctly in their browser.
<img>
'''Protocol, port filtering & bandwidth restrctionsrestrictions'''
A recent addition to the censor's toolkit is filtering requests according to a particular protocol (e.g. SSL) or to the port number used by a particular protocol (e.g. 443). Countries that want to ban secure communications on the Internet sometimes implement this type of filtering even at the expense of not being able to use it themselves. During a recent election period in Belarus, connections to foreign websites were restricted by limiting the capacity (bandwidth) of the channel connecting the national gateway to the Internet. All it took was a few users in the country to fill-up the reduced channel completely, making everyone else's access impossible.
On this screenshot you can see the computer's IP requesting the domain e.mail.ru
'''Media: ''' Staff from the Berkman Center for Internet and Society talk about the reasons and politics behind Internet censorship
<vid>
252
edits