Voice for the Voiceless Cameron Purdy @cpurdy Software Developer - - PowerPoint PPT Presentation

voice for the voiceless
SMART_READER_LITE
LIVE PREVIEW

Voice for the Voiceless Cameron Purdy @cpurdy Software Developer - - PowerPoint PPT Presentation

Voice for the Voiceless Cameron Purdy @cpurdy Software Developer 1989: Tiananmen When I started grade school and opened my text book, the first page Before Internet (BI) had the following sentence: I love Tiananmen in Beijing. [..] If


slide-1
SLIDE 1

Voice for the Voiceless

Cameron Purdy

slide-2
SLIDE 2

@cpurdy

Software Developer

slide-3
SLIDE 3

When I started grade school and

  • pened my text book, the first page

had the following sentence: “I love Tiananmen in Beijing.” [..] If you have been to Tiananmen, you may notice that the place cannot be “loved.” If you happen to be a college student, you may even be terrified by the place. [..] The reason I mention this example is not just to criticize Tiananmen. It is to make my point, that our education about “love” was off since its very

  • beginning. They have never

explained what is “love.” In this example, their motivation is to create a psychology of worshiping the people who are in power. They also expanded such logic to other

1989: Tiananmen Before Internet (BI)

4 May 2005 @ Hong Kong University

slide-4
SLIDE 4

Orange Revolution

Centered in Kiev, Ukraine Nov 2004 - Jan 2005 Texting and Internet were critical to the success of the popular movement

slide-5
SLIDE 5

The Internet Evolution

cnn.com: ’95 Google: ’98 Facebook: ’04 YouTube: ’05 Twitter: ’06

slide-6
SLIDE 6

The Twitter Revolution

Centered in Chisinau, Moldova April 2009 #pman - Piata Marii Adunari Nationale From flashmob to 10k people in one morning

slide-7
SLIDE 7

Social Graphs

Degrees of Separation don’ t apply to web sites “Social sites” created a new Freedom of Assembly for those with access to technology

slide-8
SLIDE 8

Connectivity Graphs

Internet and mobile phone networks are state-owned or tightly regulated, enabling states to control access Proactive: Filtering Reactive: Kill Switch

slide-9
SLIDE 9

Iran’ s Green Revolution

June 2009 Twitter, Facebook, YouTube The government blocked YouTube and filtered facebook Cat & Mouse with

  • pen proxy servers
slide-10
SLIDE 10

Tunisia

January 2011 Mohamed Bouazizi died three weeks after setting himself

  • n fire
slide-11
SLIDE 11

Tunisia

He just wanted to sell vegetables from a wheelbarrow, which had been confiscated by the government Within ten days of his death, the government fell

slide-12
SLIDE 12

The beginning of the Arab Spring

“They called it the jasmine revolt, Sidi Bouzid revolt, Tunisian revolt… but there is only one name that does justice to what is happening in the homeland: Social media revolution. ” - Bechir Blagui

slide-13
SLIDE 13

Egypt

February 2011 The government shut down the Internet Five ISPs, but the fiber-optic links all came into one spot: 26 Ramses St, Cairo

slide-14
SLIDE 14

It Backfired

“If Egypt taught the world one thing, it is that turning off the Internet isn’ t a good way to squash protests. ”

  • Robert Scoble
slide-15
SLIDE 15

... or maybe it is

slide-16
SLIDE 16

Libya

March 2011 Government shut off the Internet and evicted the press

slide-17
SLIDE 17

Syria

Ongoing today! Government shut off the Internet and evicted the press

slide-18
SLIDE 18

Why?

slide-19
SLIDE 19

Media

“Whoever controls the media controls the mind. ”

  • Jim Morrison
slide-20
SLIDE 20

A Pattern of Control

Iran, Libya and Syria evicted journalists, shut off the Internet and phone networks The Internet enables Freedom of Assembly Repressive regimes cannot last if they cannot suppress truth

slide-21
SLIDE 21

A Pattern of Control

Iran, Libya, Syria and China use Internet content to identify and hunt down the regime’ s opponents Iran supplied Syria with technology to track down satellite phones

slide-22
SLIDE 22

Great Firewall of China

“Golden Shield” 162,000,000 Internet users 50,000 employees to monitor emails and web content Twitter and thousands

  • f other sites blocked
slide-23
SLIDE 23

Deny existence: DNS reports no addresses or incorrect addresses for banned sites Close the road: IP packets to addresses of banned sites are blocked completely Filter what’ s left: Requests (URLs) and responses (web content) are scanned and filtered Collateral damage: Anything triggering any

  • f the above creates a new temporary ban
slide-24
SLIDE 24

"We -- even we here -- hold the power, and bear the responsibility. In giving freedom to the slave, we assure freedom to the free -- honorable alike in what we give, and what we preserve. We shall nobly save, or meanly lose, the last best hope of earth." - Abraham Lincoln

Protecting that next great hope

slide-25
SLIDE 25

Requirements & Constraints

slide-26
SLIDE 26

Both short & long term

Solutions have to be deployable instantly, such as in countries with active military action against citizens (Syria, Libya) Solutions must work for the long term for citizens of countries with draconian controls

slide-27
SLIDE 27

Undetectable & Untraceable

People should not be putting their lives at risk by communicating Communication must be anonymous and locally difficult to trace Vocal opponents often grow into future leaders

slide-28
SLIDE 28

Resiliency

Most critical when situations are the craziest Infrastructure will likely be unreliable Must survive both physical and cyber attacks

slide-29
SLIDE 29

Abuse-Limiting

Goal: Freedom of information and assembly, but not an enabler for crime May require limiting sites, content types

slide-30
SLIDE 30

Technologies

slide-31
SLIDE 31

Satellite

Satellite phones and data connectivity allow “anywhere anytime” deployment No dependency on local infrastructure, including reliable power Supports micro-cells

slide-32
SLIDE 32

Mesh Networks

Self-organizing wireless infrastructure Utilizes any/all routes to the Internet; complements satellite Could easily be built into every device (wireless routers, notebooks and phones!)

slide-33
SLIDE 33

Tunneling

Existing technology, but easily blocked in the long term Use the public web as a carrier wave, so blocking anything means blocking everything Encode traffic in images if secure connection is unavailable

slide-34
SLIDE 34

Existing Infrastructure

For short-term crisis scenarios Re-use existing telco infrastructure Viral repurposing Emergency mode? Likely requires state sanctioning

slide-35
SLIDE 35

Remember

slide-36
SLIDE 36

Liu Xiaobo

Imprisoned, most recently for Charter 08 http:/ /www.charter08.com/

slide-37
SLIDE 37

Ai Wei Wei

Artist, twitterer. Imprisoned during the recent crackdown on pro-democracy movements in China.

slide-38
SLIDE 38

Anonymous

One person can make a difference.

slide-39
SLIDE 39

Voice for the Voiceless

Cameron Purdy