ABSTRACT
Internet censorship is enforced by numerous governments worldwide, however, due to the lack of publicly available information, as well as the inherent risks of performing active measurements, it is often hard for the research community to investigate censorship practices in the wild. Thus, the leak of 600GB worth of logs from 7 Blue Coat SG-9000 proxies, deployed in Syria to filter Internet traffic at a country scale, represents a unique opportunity to provide a detailed snapshot of a real-world censorship ecosystem.
This paper presents the methodology and the results of a measurement analysis of the leaked Blue Coat logs, revealing a relatively stealthy, yet quite targeted, censorship. We find that traffic is filtered in several ways: using IP addresses and domain names to block subnets or websites, and keywords or categories to target specific content. We show that keyword-based censorship produces some collateral damage as many requests are blocked even if they do not relate to sensitive content. We also discover that Instant Messaging is heavily censored, while filtering of social media is limited to specific pages. Finally, we show that Syrian users try to evade censorship by using web/socks proxies, Tor, VPNs, and BitTorrent. To the best of our knowledge, our work provides the first analytical look into Internet filtering in Syria.
- Blue Coat ProxySG -- Configuration and Management Guide. http://wikileaks.org/spyfiles/files/0/226_BLUECOATSGOS_CMG_4.1.4.pdf.Google Scholar
- C. Anderson. The Hidden Internet of Iran: Private Address Allocations on a National Network. ArXiv 1209.6398, 2012.Google Scholar
- Arabic Network for Human Rights Information. Online Syria, Offline Syrians. http://old.openarab.net/en/node/1625, 2013.Google Scholar
- S. Aryan, H. Aryan, and J. A. Halderman. Internet Censorship in Iran: A First Look. In FOCI, 2013.Google Scholar
- BBC News. Syrian jailed for Internet usage. http://news.bbc.co.uk/1/hi/world/middle_east/3824595.stm.Google Scholar
- Blue Coat. https://www.bluecoat.com/company/news/updateblue-coat-devices-syria, 2011.Google Scholar
- A. Chaabane, T. Chen, M. Cunche, E. De Cristofaro, A. Friedman, and M. A. Kafaar. Censorship in the Wild: Analyzing Internet Filtering in Syria (Full Version). http://arxiv.org/pdf/1402.3401.Google Scholar
- J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. ConceptDoppler: A Weather Tracker for Internet Censorship. In CCS, 2007.Google Scholar
- A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, and A. Pescapé. Analysis of country-wide internet outages caused by censorship. In IMC, 2011. Google ScholarDigital Library
- J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship. In IMC, 2013. Google ScholarDigital Library
- G. Danezis and R. Anderson. The Economics of Censorship Resistance. In WEIS, 2004.Google Scholar
- S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. E. Schechter. It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. In Financial Cryptography, 2012. Google ScholarDigital Library
- R. Jain. The art of computer systems performance analysis: Techniques for experimental design, measurements, simulation, and modeling. Wiley, April 1991.Google Scholar
- G. King, J. Pan, and M. Roberts. How censorship in China allows government criticism but silences collective expression. In APSA Annual Meeting, 2012.Google Scholar
- J. Knockel, J. R. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. In FOCI, 2011.Google Scholar
- C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A Taxonomy of Internet Censorship and Anti-Censorship. Princeton Tech Report, http://www.princeton.edu/~chiangm/anticensorship.pdf, 2012.Google Scholar
- M. Marquis-Boire et al. Planet Blue Coat: Mapping Global Censorship and Surveillance Tools. https://citizenlab.org/wpcontent/uploads/2013/01/Planet-Blue-Coat.pdf, 2013.Google Scholar
- Z. Nabi. The Anatomy of Web Censorship in Pakistan. In FOCI, 2013.Google Scholar
- Open Net Initiative. Internet Filtering in Syria. https://opennet.net/research/profiles/syria, 2009.Google Scholar
- J. C. Park and J. R. Crandall. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-level Filtering of HTML Responses in China. In ICDCS, 2010. Google ScholarDigital Library
- Reporters Without Borders. Syria. http://en.rsf.org/syria-syria-12-03-2012,42053.html, 2012.Google Scholar
- V. Silver. H-P Computers Underpin Syria Surveillance. http://www.bloomberg.com/news/2011-11-18/hewlettpackard-computers-underpin-syria-electonic-surveillanceproject.html, 2011.Google Scholar
- Telecomix. #OpSyria: Syrian Censorship Logs (Season 3). http://reflets.info/opsyria-syrian-censoship-log/, 2011.Google Scholar
- The Tor Project. Tor's Censorship Wiki -- Syria. https://trac.torproject.org/projects/tor/wiki/doc/OONI/censorshipwiki/CensorshipByCountry/Syria, 2013.Google Scholar
- J. Valentino-Devries, P. Sonne, and N. Malas. U.S. Firm Acknowledges Syria Uses Its Gear to Block Web. http://preview.tinyurl.com/kvpkeos, 2011.Google Scholar
- J.-P. Verkamp and M. Gupta. Inferring Mechanics of Web Censorship Around the World. In FOCI, 2012.Google Scholar
- VFM Systems & Services Ltd. Blue Coat ProxySG Solution with Web Filter and Reporter. http://www.slideshare.net/vfmindia/vfm-bluecoat-proxy-sgsolution-with-web-filter-and-reporter, 2013.Google Scholar
- Whittaker, Z. Surveillance and censorship: Inside Syria's Internet. http://www.cbsnews.com/news/surveillance-andcensorship-inside-syrias-internet/, 2013.Google Scholar
- P. Winter and S. Lindskog. How the Great Firewall of China is Blocking Tor. In FOCI, 2012.Google Scholar
- X. Xu, Z. M. Mao, and J. A. Halderman. Internet censorship in China: Where does the filtering occur? In PAM, 2011. Google ScholarDigital Library
- T.-F. Yen, Y. Xie, F. Yu, R. Yu, and M. Abadi. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS, 2012.Google Scholar
Index Terms
- Censorship in the Wild: Analyzing Internet Filtering in Syria
Recommendations
New Labor, new censorship? Politics, religion and internet filtering in Australia
This article examines the recent Australian Government decision to impose mandatory Internet service provider level filtering to home and school users. This policy has been championed by various religious groups suggesting that a particular set of ...
A Case for Marrying Censorship Measurements with Circumvention
HotNets-XIV: Proceedings of the 14th ACM Workshop on Hot Topics in NetworksExisting research on Internet censorship primarily focuses on either measurements or circumvention. Considering these two in isolation often leads to designs with limited capabilities: Circumvention is not driven by measurement data and end users find ...
Comments