fine grained censorship mapping information sources
play

Fine-Grained Censorship Mapping - Information Sources, Legality and - PowerPoint PPT Presentation

Introduction Information Sources Legality and Ethics Early Results Questions Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics Joss Wright joss.wright@oii.ox.ac.uk Oxford Internet Institute University of Oxford


  1. Introduction Information Sources Legality and Ethics Early Results Questions Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics Joss Wright joss.wright@oii.ox.ac.uk Oxford Internet Institute University of Oxford joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 1/19

  2. Introduction Information Sources Legality and Ethics Early Results Questions 1 Introduction 2 Information Sources 3 Legality and Ethics 4 Early Results 5 Questions joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 2/19

  3. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet filtering. China’s “Golden Shield” is the classic example. Saudi Arabia presents perhaps the most extreme filtering regime. (OpenNet Initiative) Many different technologies; many different filtering targets; many different rationales and justifications. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/19

  4. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet filtering. China’s “Golden Shield” is the classic example. Saudi Arabia presents perhaps the most extreme filtering regime. (OpenNet Initiative) Many different technologies; many different filtering targets; many different rationales and justifications. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/19

  5. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet filtering. China’s “Golden Shield” is the classic example. Saudi Arabia presents perhaps the most extreme filtering regime. (OpenNet Initiative) Many different technologies; many different filtering targets; many different rationales and justifications. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/19

  6. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet filtering. China’s “Golden Shield” is the classic example. Saudi Arabia presents perhaps the most extreme filtering regime. (OpenNet Initiative) Many different technologies; many different filtering targets; many different rationales and justifications. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/19

  7. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Almost every country engages in some form of Internet filtering. China’s “Golden Shield” is the classic example. Saudi Arabia presents perhaps the most extreme filtering regime. (OpenNet Initiative) Many different technologies; many different filtering targets; many different rationales and justifications. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 3/19

  8. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  9. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  10. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  11. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  12. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  13. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  14. Introduction Information Sources Legality and Ethics Early Results Questions Censorship Technologies We can classify filtering according to their focus: DNS Tampering IP Header Filtering (address or protocol) IP Content Filtering (keyword or protocol) Proxy Filtering We might also consider takedown, social pressure, legislation as means of filtering, but will focus on technological approaches. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 4/19

  15. Introduction Information Sources Legality and Ethics Early Results Questions Limitations There are limitations to filtering technologies. A rough tradeoff between subtlety of approach and computational requirements. In general, more sophisticated methods require greater computational resources. At a national scale, these can become severe. Centralization of filtering can cause a variety of problems, as seen with the CleanFeed filter implemented by BT in the UK. Centrally managing filtering can also raise significant administrative and organizational burdens. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/19

  16. Introduction Information Sources Legality and Ethics Early Results Questions Limitations There are limitations to filtering technologies. A rough tradeoff between subtlety of approach and computational requirements. In general, more sophisticated methods require greater computational resources. At a national scale, these can become severe. Centralization of filtering can cause a variety of problems, as seen with the CleanFeed filter implemented by BT in the UK. Centrally managing filtering can also raise significant administrative and organizational burdens. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/19

  17. Introduction Information Sources Legality and Ethics Early Results Questions Limitations There are limitations to filtering technologies. A rough tradeoff between subtlety of approach and computational requirements. In general, more sophisticated methods require greater computational resources. At a national scale, these can become severe. Centralization of filtering can cause a variety of problems, as seen with the CleanFeed filter implemented by BT in the UK. Centrally managing filtering can also raise significant administrative and organizational burdens. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/19

  18. Introduction Information Sources Legality and Ethics Early Results Questions Limitations There are limitations to filtering technologies. A rough tradeoff between subtlety of approach and computational requirements. In general, more sophisticated methods require greater computational resources. At a national scale, these can become severe. Centralization of filtering can cause a variety of problems, as seen with the CleanFeed filter implemented by BT in the UK. Centrally managing filtering can also raise significant administrative and organizational burdens. joss.wright@oii.ox.ac.uk Fine-Grained Censorship Mapping - Information Sources, Legality and Ethics: 5/19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend