Lessons On Censorship From Syria's Internet Filter Machines
from the https-matters dept
Norwegian writer Mette Newth once wrote that: "Censorship has followed the free expressions of men and women like a shadow throughout history." As we develop new means to gather and create information, new means to control, erase and censor that information evolve alongside it. Today, that means access to information through the internet, which motivates us to study internet censorship.Organizations such as Reporters Without Borders, Freedom House, or the Open Net Initiative periodically report on the extent of censorship worldwide. But as countries that are fond of censorship are not particularly keen to share details, we must resort to probing filtered networks, that is, generating requests from within them to see what gets blocked and what gets through. We cannot hope to record all the possible censorship-triggering events, so our understanding of what is or isn't acceptable to the censor will only ever be partial. And of course it's risky, even outright illegal, to probe the censor's limits within countries with strict censorship and surveillance programs.
This is why the leak of 600GB of logs from hardware appliances used to filter internet traffic in and out of Syria is a unique opportunity to examine the workings of a real-world internet censorship apparatus.
Leaked by the hacktivist group Telecomix, the logs cover a period of nine days in 2011, drawn from seven SG-9000 internet proxies. The sale of equipment like this to countries like Syria is banned by the US and EU. California-based manufacturer Blue Coat Systems denied making the sales but confirmed the authenticity of the logs – and Dubai-based firm Computerlinks FZCO later settled on a US$2.8 million fine for unlawful export. In 2013, researchers at the University of Toronto's Citizen Lab demonstrated how authoritarian regimes in Saudi Arabia, UAE, Qatar, Yemen, Egypt and Kuwait all rely on US-made equipment like those from Blue Coat or McAfee's SmartFilter software to perform filtering.
This technology is extremely powerful as it can perform deep-packet inspection, that is, examining in detail the contents of network traffic. They provide censors with a simple interface to fine-tune filtering policies, practically in real time.
Inside a censor's mind
At the recent ACM Internet Measurement Conference, we presented our paper detailing the relatively stealthy but targeted censorship system that we'd found from examining the logs.
Internet traffic in Syria was filtered in several ways. IP addresses (the unique addresses of web servers on the internet) and domain names (the URL typed into the address bar) were filtered to block single websites such as badoo.com or amazon.com, entire network regions (including a few Israeli subnets), or keywords to target specific content. Instant messaging, tools such as Skype, and content-sharing sites such as Metacafe or Reddit were heavily censored. Social media censoring was limited to specific content and pages, such as the "Syrian Revolution" facebook page.
The appliances were sometimes misconfigured, meaning the filter caused some collateral damage – for instance, all requests with the keyword "proxy" were blocked, probably in an effort to curb the use of censorship-evading proxies, but this also had the effect of blocking adverts and certain plug-ins that had no relation to banned content.
We found that Syrian users did try to get around the filters, using tools such as Tor, or virtual private networks (encrypted tunnels between two computers using the public internet), and that these were fairly effective. We also noticed that some tools not necessarily designed with circumventing censorship in mind could also be used to access blocked content – for example using peer-to-peer programs such as BitTorrent to download blocked software (such as Skype) and using Google Cache to access (over HTTPS) cached and mirrored versions of blocked web pages.
Avoiding the censor's knife
What emerges is the importance of encrypting web traffic by using secure (HTTPS) rather than standard (HTTP) web browsing. Many requests caught by the filter were only possible because keywords in the content of unencrypted network traffic could be read by the appliances. If traffic is encrypted, the page requested from the target domain, or a specific keyword in the request are not accessible. Through their efforts to enforce HTTPS by default, providers like Google and Facebook are taking steps in the right direction. They also serve a double purpose: protecting users' privacy against mass-surveillance, while also making it harder to implement fine-grained censorship policies.
We did consider that our work might help organizations on both sides of the censorship line. But we decided to publish because we believe that evidence-based analysis of censorship practices can help understand the underlying technologies, policies, strengths and weaknesses – and can inform the design of tools designed to evade the censor's knife.
While Western countries rely on export regulations and sanctions to restrict the worldwide availability of surveillance and censorship technologies – while apparently deploying them for their own use, as the Snowden files have revealed – it is time we had an open debate about their effectiveness and what can be done to limit their proliferation.
Emiliano De Cristofaro does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations. This article was originally published on The Conversation. Read the original article.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: censorship, https, syria, telecomix
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
It'll be done inside so-called "social media". The corporations running those sites will be told that if they wish to do business in country X, they will need to cooperate with country X's censorship/espionage requirements...and they'll do it because of course they don't give a damn about the privacy or security of their users: they care about profit, always profit and only profit.
The UK is already doing this: https://firstlook.org/theintercept/2014/11/26/campaign-shame-social-media-companies-acting-spy-agent s-national-security-state/
They're not the only one, of course. And most of it will happen in private and never be reported. But quietly, over time, the infrastructure will be built to allow countries to monitor and control the activities of their citizens on "social media" sites. So it won't matter how they reach those sites: https, VPN? Irrelevant. Everything will be dutifully logged and compiled, then reported back to the country in question.
Publicly, those companies will continue to prattle -- as they have -- about "respecting users" and "improving the experience" and so on. Privately, they will give any country anything they want -- particularly if they get paid for it -- because they lack both the ethics and the courage to say no.
And countries will be, as always, silent about where they get their information from. (Parallel construction is not a uniquely US thing, you know.) And the idiots, the profoundly stupid and incredibly naive idiots, who think they can organize a "Syrian revolution" or whatever on Facebook, will actually be surprised when they're rounded up and shot -- because every single thing they've ever done on Facebook has been transmitted to the Syrian government's intelligence agencies in real time.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
and if they succeed then they will inherit this technology and use it to censor any reasonable criticism of (their brand of?) Islam. Come to think of it several of the other states mentioned already do this - which is a big part of the problem.
[ link to this | view in chronology ]
Re: Re: Re:
Extreme authoritarianism defines what people can think, and so use censorship to try and control what ideas are in circulation. A watchlist approach does NOT prevent banned ideas from being circulated.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: SSL
For more granular blocking, Syria would need to break SSL/TLS through MITM. Browsers detect these privacy breaking proxies, so for users to not see warning messages, the "attacker" needs a Certificate Authority (CA) signing certificate that the user trusts, either control of a CA that is in the default key set shipped with the OS or browser, or the ability to push a key down to the client.
As a measure of security, the latest Firefox includes "Public key pinning" which limits which signing certificates will be trusted for a small set of very popular and often-targeted HTTPS sites, including Twitter.
Realistically, hostile environments with no need to stealth will just force MITM on all sessions and block anything that looks like encrypted traffic (e.g. Tor). It's not like Syria has to worry about their reputation getting any worse.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The top allowed sites
Gstatic- doesn't come up. Ok XVideos again..just kidding.
[ link to this | view in chronology ]
Re: The top allowed sites
So while they may make public noises about the horrors of exposed boobies, they don't really care. That's just a smokescreen for the real agenda.
[ link to this | view in chronology ]
Re: Re: The top allowed sites
Oh please, people will always just ignore things that arent in line with their opinions. #GG is a great example of this, despite the massive censorship and hypocrisy there are still people who fail to see what its about and actually want to ruin peoples life for wanting a non-biased press. Even jimbo of wikipedia weighted in on the issue...
Even if people have access to all the information, they will still refuse to use it and will just parrot the same bullshit they hear from their favorite celebrities.
[ link to this | view in chronology ]
Re: Re: Re: The top allowed sites
[ link to this | view in chronology ]
Re: Re: Re: Re: The top allowed sites
That can be a difficult balancing act - especially when your opponents will try very hard to conflate your opinions with those of people who are easy targets for an ad hom.
Disclaimer; I'm talking in general terms here - and not specifically (in fact specifically NOT) about #GG - about which I only have "wikipedia" knowledge.
[ link to this | view in chronology ]
Hell twitter was caught scanning peoples hard-drives for 'unlicensed' software but then tried pathetically to claim it was doing this for the good of it's users...and NOT because it receives hefty monthy fees from various governments for the data...
[ link to this | view in chronology ]
Re: twitter was caught?
That's news to me. I know Steam was caught scanning users HDs for cheat tools, maybe that's what you are thinking of?
Specifically, I've never heard of any social platform that scanned user hard-drives for 'unlicensed' software, only gaming platforms.
[ link to this | view in chronology ]
resistance is futile...
[ link to this | view in chronology ]
Made in the US? I doubt it.
The hardware might be designed in the US, and certain more technical parts of the OS (IIRC Bluecoat is owned by sidewinder, and last time I ran one Sidewinder was running on top of BSDI) and filtering layers might be written in the US, but most of the hardware is built and assembled in China, and large bits of the application layer are (probably) written in India.
Not that this changes things much--other than "we" have found counterfeit cisco gear running hacked IOS (the original IOS, not this Johnny come lately on your cellphone), so it's not impossible that some of these dirtball regiemes are buying either QA rejects or "second shift" hardware.
[ link to this | view in chronology ]