skip to main content
10.1145/2663716.2663720acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Censorship in the Wild: Analyzing Internet Filtering in Syria

Published:05 November 2014Publication History

ABSTRACT

Internet censorship is enforced by numerous governments worldwide, however, due to the lack of publicly available information, as well as the inherent risks of performing active measurements, it is often hard for the research community to investigate censorship practices in the wild. Thus, the leak of 600GB worth of logs from 7 Blue Coat SG-9000 proxies, deployed in Syria to filter Internet traffic at a country scale, represents a unique opportunity to provide a detailed snapshot of a real-world censorship ecosystem.

This paper presents the methodology and the results of a measurement analysis of the leaked Blue Coat logs, revealing a relatively stealthy, yet quite targeted, censorship. We find that traffic is filtered in several ways: using IP addresses and domain names to block subnets or websites, and keywords or categories to target specific content. We show that keyword-based censorship produces some collateral damage as many requests are blocked even if they do not relate to sensitive content. We also discover that Instant Messaging is heavily censored, while filtering of social media is limited to specific pages. Finally, we show that Syrian users try to evade censorship by using web/socks proxies, Tor, VPNs, and BitTorrent. To the best of our knowledge, our work provides the first analytical look into Internet filtering in Syria.

References

  1. Blue Coat ProxySG -- Configuration and Management Guide. http://wikileaks.org/spyfiles/files/0/226_BLUECOATSGOS_CMG_4.1.4.pdf.Google ScholarGoogle Scholar
  2. C. Anderson. The Hidden Internet of Iran: Private Address Allocations on a National Network. ArXiv 1209.6398, 2012.Google ScholarGoogle Scholar
  3. Arabic Network for Human Rights Information. Online Syria, Offline Syrians. http://old.openarab.net/en/node/1625, 2013.Google ScholarGoogle Scholar
  4. S. Aryan, H. Aryan, and J. A. Halderman. Internet Censorship in Iran: A First Look. In FOCI, 2013.Google ScholarGoogle Scholar
  5. BBC News. Syrian jailed for Internet usage. http://news.bbc.co.uk/1/hi/world/middle_east/3824595.stm.Google ScholarGoogle Scholar
  6. Blue Coat. https://www.bluecoat.com/company/news/updateblue-coat-devices-syria, 2011.Google ScholarGoogle Scholar
  7. A. Chaabane, T. Chen, M. Cunche, E. De Cristofaro, A. Friedman, and M. A. Kafaar. Censorship in the Wild: Analyzing Internet Filtering in Syria (Full Version). http://arxiv.org/pdf/1402.3401.Google ScholarGoogle Scholar
  8. J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. ConceptDoppler: A Weather Tracker for Internet Censorship. In CCS, 2007.Google ScholarGoogle Scholar
  9. A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, and A. Pescapé. Analysis of country-wide internet outages caused by censorship. In IMC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship. In IMC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Danezis and R. Anderson. The Economics of Censorship Resistance. In WEIS, 2004.Google ScholarGoogle Scholar
  12. S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. E. Schechter. It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. In Financial Cryptography, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Jain. The art of computer systems performance analysis: Techniques for experimental design, measurements, simulation, and modeling. Wiley, April 1991.Google ScholarGoogle Scholar
  14. G. King, J. Pan, and M. Roberts. How censorship in China allows government criticism but silences collective expression. In APSA Annual Meeting, 2012.Google ScholarGoogle Scholar
  15. J. Knockel, J. R. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. In FOCI, 2011.Google ScholarGoogle Scholar
  16. C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A Taxonomy of Internet Censorship and Anti-Censorship. Princeton Tech Report, http://www.princeton.edu/~chiangm/anticensorship.pdf, 2012.Google ScholarGoogle Scholar
  17. M. Marquis-Boire et al. Planet Blue Coat: Mapping Global Censorship and Surveillance Tools. https://citizenlab.org/wpcontent/uploads/2013/01/Planet-Blue-Coat.pdf, 2013.Google ScholarGoogle Scholar
  18. Z. Nabi. The Anatomy of Web Censorship in Pakistan. In FOCI, 2013.Google ScholarGoogle Scholar
  19. Open Net Initiative. Internet Filtering in Syria. https://opennet.net/research/profiles/syria, 2009.Google ScholarGoogle Scholar
  20. J. C. Park and J. R. Crandall. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-level Filtering of HTML Responses in China. In ICDCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Reporters Without Borders. Syria. http://en.rsf.org/syria-syria-12-03-2012,42053.html, 2012.Google ScholarGoogle Scholar
  22. V. Silver. H-P Computers Underpin Syria Surveillance. http://www.bloomberg.com/news/2011-11-18/hewlettpackard-computers-underpin-syria-electonic-surveillanceproject.html, 2011.Google ScholarGoogle Scholar
  23. Telecomix. #OpSyria: Syrian Censorship Logs (Season 3). http://reflets.info/opsyria-syrian-censoship-log/, 2011.Google ScholarGoogle Scholar
  24. The Tor Project. Tor's Censorship Wiki -- Syria. https://trac.torproject.org/projects/tor/wiki/doc/OONI/censorshipwiki/CensorshipByCountry/Syria, 2013.Google ScholarGoogle Scholar
  25. J. Valentino-Devries, P. Sonne, and N. Malas. U.S. Firm Acknowledges Syria Uses Its Gear to Block Web. http://preview.tinyurl.com/kvpkeos, 2011.Google ScholarGoogle Scholar
  26. J.-P. Verkamp and M. Gupta. Inferring Mechanics of Web Censorship Around the World. In FOCI, 2012.Google ScholarGoogle Scholar
  27. VFM Systems & Services Ltd. Blue Coat ProxySG Solution with Web Filter and Reporter. http://www.slideshare.net/vfmindia/vfm-bluecoat-proxy-sgsolution-with-web-filter-and-reporter, 2013.Google ScholarGoogle Scholar
  28. Whittaker, Z. Surveillance and censorship: Inside Syria's Internet. http://www.cbsnews.com/news/surveillance-andcensorship-inside-syrias-internet/, 2013.Google ScholarGoogle Scholar
  29. P. Winter and S. Lindskog. How the Great Firewall of China is Blocking Tor. In FOCI, 2012.Google ScholarGoogle Scholar
  30. X. Xu, Z. M. Mao, and J. A. Halderman. Internet censorship in China: Where does the filtering occur? In PAM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. T.-F. Yen, Y. Xie, F. Yu, R. Yu, and M. Abadi. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Censorship in the Wild: Analyzing Internet Filtering in Syria

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
          November 2014
          524 pages
          ISBN:9781450332132
          DOI:10.1145/2663716

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 November 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          IMC '14 Paper Acceptance Rate32of103submissions,31%Overall Acceptance Rate277of1,083submissions,26%

          Upcoming Conference

          IMC '24
          ACM Internet Measurement Conference
          November 4 - 6, 2024
          Madrid , AA , Spain

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader