Intellectual Property and the Internet/Internet censorship< Intellectual Property and the Internet
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations either at the behest of government or on their own initiative. Individuals and organizations may engage in self-censorship on their own or due to intimidation and fear.
Opinions on the topic of Internet censorship vary, with arguments being made both for and against censorship. Moreover, the extent of Internet censorship varies on a country-to-country basis. While some counties have little Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship can also come about due to events such as the Arab Spring, which led to instances of censorship in an attempt to undermine the protesters.
The issues associated with Internet censorship are similar to those for offline censorship of more traditional media such as newspapers, magazines, books, music, radio, television, and films. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.
Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:
- A 1993 Time Magazine article quotes computer scientist John Gillmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."
- In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.
- A report of research conducted in 2007 and published in 2009 by the Berkman Center for Internet & Society at Harvard University stated that: "We are confident that the [censorship circumvention] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".
- In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."
Blocking and filtering can be based on relatively static blacklists or be determined dynamically based on an examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to the public. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or Internet cafes. Blocking and filtering may also vary within a country across different ISPs. Countries may filter sensitive content on an on-going basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may block content while leading the public to believe that censorship has not been applied. This is done by causing a fake "Not Found" error message to be displayed when an attempt to access a blocked web page is made (see 404 error for details).
Unless the censor has total control over all Internet-connected computers, such as in North Korea or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Never-the-less, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.
Many Internet experts use the term "splinternet" to describe some of the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.
Around the worldEdit
As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using more sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle East/North Africa. A few countries in other regions also practice certain forms of filtering. In the United States state-mandated Internet filtering occurs on some computers in libraries and K-12 schools. Content related to Nazism or Holocaust denial is blocked in France and Germany. Child pornography, hate speech, and sites that encourage the theft of intellectual property are blocked in many countries throughout the world. In fact, most countries throughout the world, including many democracies with long traditions of strong support for freedom of expression and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.
Reports, ratings, and trendsEdit
Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports. The ratings produced by several of these organizations are summarized in the Internet censorship by country and the Censorship by country articles.
OpenNet Initiative reportsEdit
Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide. The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Egypt, France, Germany, India, the Ukraine, the United Kingdom, and the United States), while one was found to engage in pervasive filtering in all three areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).
Freedom on the Net reportsEdit
In the 2011 edition of Freedom House's report Freedom on the Net, of the 37 countries surveyed, 8 were rated as "free" (22%), 18 as "partly free" (49%), and 11 as "not free" (30%). In their 2009 report, of the 15 countries surveyed, 4 were rated as "free" (27%), 7 as "partly free" (47%), and 4 as "not free" (27%). And of the 15 countries surveyed in both 2009 and 2011, 5 were seen to be moving in the direction of more network freedom (33%), 9 moved toward less freedom (60%), and one was unchanged (7%).
"Internet enemies" and countries under surveillance listsEdit
In 2006, Reporters without Borders (Reporters sans frontières, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet". The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users." In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added. Both lists are updated annually.
- File:Flag of Burma.svg
- File:Flag of China.svg (excluding Hong Kong and Macau)
- File:Flag of Cuba.svg
- File:Flag of Iran.svg
- File:Flag of North Korea.svg
- File:Flag of Saudi Arabia.svg
- File:Flag of Syria.svg
- File:Flag of Turkmenistan.svg
- File:Flag of Uzbekistan.svg
- File:Flag of Vietnam.svg
- File:Flag of Azusa Pacific University.svg
- File:Flag of Australia.svg
- File:Flag of Bahrain.svg
- File:Flag of Belarus.svg
- File:Flag of Egypt.svg
- File:Flag of Eritrea.svg
- File:Flag of France.svg
- File:Flag of Libya.svg
- File:Flag of Malaysia.svg
- File:Flag of the Netherlands.svg
- File:Flag of Russia.svg
- File:Flag of South Korea.svg
- File:Flag of Sri Lanka.svg
- File:Flag of Thailand.svg
- File:Flag of Tunisia.svg
- File:Flag of Turkey.svg
- File:Flag of United Arab Emirates.svg
- File:Flag of Venezuela.svg
When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. By 2011 the number of countries listed had fallen to 10 with the move of Belarus, Egypt, and Tunisia to the "Countries under surveillance." Belarus was moved to surveillance status in 2009 and Egypt and Tunisia were moved after their revolutions in 2011. No new countries have been added to the list since it was established. When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. By 2011 the number of countries listed had grown to 16 after Jordan in 2009, Tajikistan in 2009, and Yemen in 2010 were dropped from the list; Australia in 2009, France in 2011, Russia in 2010, South Korea in 2009, Turkey in 2010, and Venezuela in 2011 were added; and with the three moves from the "Enemies of the Internet" list noted earlier. Bahrain, Eritrea, Malaysia, and Sri Lanka dropped from the list in 2010, but were added again in 2011. Libya dropped from the list in 2009, but was added again in 2011.
BBC World Service global public opinion pollEdit
A poll of 27,973 adults in 26 countries, including 14,306 Internet users, was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that:
- Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most don’t want governments to regulate it.
Findings from the poll include:
- Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
- Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
- Opinion was evenly split between Internet users who felt that “the internet is a safe place to express my opinions” (48%) and those who disagreed (49%). Somewhat surprisingly users in Germany and France agreed the least, followed by users in highly filtered countries such as China and South Korea, while users in Egypt, India and Kenya agreed more strongly.
- The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%).
- Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion). And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).
Transparency of filtering or blocking activitiesEdit
Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information. For example:
- Saudi Arabia and the United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display an acknowledgment to the user when accessing a blocked website.
- In contrast, countries such as China and Tunisia send users a false error indication. China blocks requests by users for a banned website at the router level and an error message is sent, effectively preventing the user's IP address from making further http requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
- In Uzbekistan users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.
- See also: 2011 Egyptian Internet shutdown and Free speech in the media during the 2011 Libyan civil war
During the Arab Spring of 2011 media jihad (media struggle) was extensive. Most observers believe that the Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, “we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world”.
This successful use of digital media in turn lead to increased censorship including the complete loss of Internet access for periods of time in Egypt and Libya in 2011. In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian regime. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based al-Arabia TV.
The success of several Arab Spring revolutions offers a chance to establish greater freedom of expression in countries that were previously subject to very strict censorship, especially online. At the same time success in this effort is not certain. In response to these dramatic events and opportunities, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance". At the same time there are warnings that Internet censorship might increase following the events of the Arab Spring.
There are three primary motives or rationales for Internet censorship: politics and power, social norms and morals, and security concerns. Protecting intellectual property rights and existing economic interests are two additional motives for Internet censorship. In addition, networking tools and applications that allow the sharing of information related to these motives are often targeted. And while there is considerable variation from country to country, the blocking of Web sites in a local language is roughly twice that of Web sites available only in English or other international languages.
Politics and powerEdit
Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block Web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.
- Political blogs and Web sites
- Lèse majesté sites, sites with content that offends the dignity of or challenges the authority of a reigning sovereign or of a state
- Falun Gong and Tibetan exile group sites in China or Buddist, Cao Dai faith, and indigenous hill tribes sites in Vietnam
- Sites aimed at religious conversion from Islam to Christianity
Social norms and moralsEdit
Social filtering is censorship of topics that are held to be antithetical to accepted societal norms. In particular censorship of child pornography and to protect children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries.
- Sex and erotic, fetishism, prostitution, and pornographic sites
- Child pornography and pedophile related sites (see also CIRCAMP)
- Gay and Lesbian sites
- Sites seen as promoting illegal drug use (Erowid)
- Gambling sites
- Sites encouraging or inciting violence
- Sites promoting criminal activity
- Sites that include hate speech
- Nazi and similar websites — particularly in France and Germany
- Sites that contain blasphemous content, particularly when directed at a majority or state supported religion
- Sites that contain defamatory, slanderous, or libelous content
- Sites that include political satire
Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.
- Blocking of pro–North Korean sites by South Korea
- Blocking sites of groups that foment domestic conflict in India
- Blocking of sites devoted to the Balochi independence movement by Pakistan
- Blocking of sites of the Muslim Brotherhood in some countries in the Middle East
- Blocking Wikileaks
- Blocking sites such as 4chan thought to be related to the group Anonymous
Protection of intellectual property and existing economic interestsEdit
Sites that share content that violates copyright or other intellectual property rights are often blocked, particularly in western Europe and North America. In addition the protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.
- Filesharing and Peer-to-peer (P2P) related websites such as The Pirate Bay
Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.
- Media sharing websites (e.g. Flickr and YouTube)
- Social networks (e.g. Facebook and MySpace)
- Translation sites and tools
- E-mail providers
- Web hosting sites
- Blog hosting sites such as Blogspot
- Microblogging sites such as Twitter and Weibo
- Censorship circumvention sites
- Proxy avoidance sites
- Search engines such as Bing and Google - particularly in China and Cuba
Content suppression methodsEdit
Internet content is subject to censorship methods similar to those used with more traditional media. For example:
- Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
- Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
- Publishers and authors may accept bribes to include, withdraw, or slant the information they present.
- Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
- Publishers, authors, and ISPs may be subject to civil lawsuits.
- Equipment may be confiscated and/or destroyed.
- Publishers and ISPs may be closed or required licenses may be withheld or revoked.
- Publishers, authors, and ISPs may be subject to boycotts.
- Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.
- Publishers, authors, and their families may be threatened with or actually lose their jobs.
- Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.
- Censors may create their own online publications and Web sites to guide online opinion.
- Access to the Internet may be limited due to restrictive licensing policies or high costs.
- Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.
- Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses.
- Domain name system (DNS) filtering and redirection: Blocked domain names are not resolved or an incorrect IP address is returned. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find a Alternative DNS root that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser.
- Uniform Resource Locator filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.
- Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections - such as VPN and TLS/SSL - to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.
- Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.
- Full block: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). This appears to have been the case on 27/28 January 2011 during the 2011 Egyptian protests, in what has been widely described as an "unprecedented" internet block. About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January. This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now." Full blocks also occurred in Myanmar/Burma in 2007 and Libya in 2011.
- Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect as censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example Google.de and Google.fr remove Neo-Nazi and other listings in compliance with German and French law.
- Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This techniques might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.
Over- and under-blockingEdit
Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired. An example is that automatic censorship against sexual words in matter for children, set to block the word "cunt", has been known to block the Lincolnshire (UK) placename Scunthorpe. Another example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.
Major web portal official statements on site and content removalEdit
Most major web service operators reserve to themselves broad rights to remove or pre-screen content, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of Service agreements.
- Facebook: Among other things the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".
- Google Search: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."
- Twitter: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be [copyright] infringing without prior notice and at our sole discretion".
- YouTube: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".
- Wikipedia: Content within a Wikipedia article may be modified or deleted by any editor as part of the normal process of editing and updating articles. All editing decisions are open to discussion and review. The Wikipedia Deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in an encyclopedia can propose its deletion. Such a page can be deleted by any administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for the deletion of articles without discussion and is used to remove pages that are so obviously inappropriate for Wikipedia that they have no chance of surviving a deletion discussion. All deletion decisions may be reviewed, either informally or formally.
- Yahoo!: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."
Use of commercial filtering softwareEdit
Writing in 2009 Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an Op-Ed contributor to the New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf filtering software sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.
Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK. Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper is used in Qatar, the UAE, and Yemen.
In a U.S. lawsuit filed in May 2011, Cisco Systems is accused of helping China build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.
Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), .... The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites. The blocking of DailyMotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing DailyMotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked DailyMotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to DailyMotion was gradually restored in Tunisia.
Regulations and accountability related to the use of commercial filters and services are typically non-existent, and there is no or little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech has been outsourced to the commercial vendors.
Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet and as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However, circumvention may not be very useful to non tech-savvy users and so blocking and filtering remain effective means of censoring the Internet for many users.
Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws.
There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.
In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."
- Chilling Effects - A joint project of the Electronic Frontier Foundation and several U.S. university law schools and clinics
- CIRCAMP, Cospol Internet Related Child Abusive Material Project, a project of the European Chiefs of Police Task Force to combat commercial and organized distribution of child pornography
- Electronic Frontier Foundation - An international non-profit digital rights advocacy and legal organization
- Financial Coalition Against Child Pornography - A coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that fund these operations
- Global Internet Freedom Consortium (GIFC) - A consortium of organizations that develop and deploy anti-censorship technologies
- International Freedom of Expression Exchange (IEFX) - A global network of non-governmental organizations that promotes and defends the right to freedom of expression
- Tunisia Monitoring Group - A coalition within IFEX that monitors free expression in Tunisia
- Internet Governance Forum (IGF) - A United Nations multi-stakeholder policy dialogue initiative
- OpenNet Initiative - A joint project to monitor and report on Internet filtering and surveillance practices by nations
- Peacefire, a U.S.-based website dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18"
- The Pirate Party - a political movement that aims to reform laws regarding copyright and patents, strengthen the right to privacy, and increase the transparency of state administration
- Reporters sans frontières (Reporters Without Borders) - A France-based international non-governmental organization that advocates freedom of the press
- Accountability software
- Cleanfeed, a content blocking system in use in the UK and Canada
- Computer surveillance
- Content-control software
- For the children (politics)
- Great Firewall of China
- Internet police
- Internet safety
- List of content-control software
- Parental controls
- Political repression of cyber-dissidents
- River crab (Internet slang)
- Scientology versus the Internet
- Sociology of the Internet
- Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet, Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4
- "First Nation in Cyberspace", Philip Elmer-Dewitt, Time, 6 December 1993, No.49
- "Cerf sees government control of Internet failing", Pedro Fonseca, Reuters, 14 November 2007
- 2007 Circumvention Landscape Report: Methods, Uses, and Tools, Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009
- ed. Chadwick, Andrew (2009). Routledge handbook of Internet politics. Routledge international handbooks. Taylor and Francis. pp. 332. ISBN 9780415429146. http://books.google.com/books/about/Routledge_handbook_of_Internet_politics.html?id=GJdfuGSa1xUC.
- "Measuring Global Internet Filtering", Robert Faris and Nart Villeneuve, in Access Denied: The Practice and Policy of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
- Lao Wai (October 21, 2007). "I've Been Rivercrabbed!". An American In Beijing. http://americaninbeijing.blogspot.com/2007/10/ive-been-rivercrabbed.html. Retrieved May 28, 2011.
- "Introduction", Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
- "Internet Filtering: The Politics and Mechanisms of Control", Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
- "2010 Country Reports on Human Rights Practices", Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011
- "West Censoring East: The Use of Western Technologies by Middle East Censors, 2010-2011", Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011
- Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship.
- Freedom on the Net 2011, Freedom House, accessed 1 September 2011
- Freedom on the Net 2009, Freedom House, accessed 1 September 2011
- List of the 13 Internet enemies Reporters Without Borders (Paris), 11 July 2006.
- "Internet enemies", Reporters Without Borders (Paris), 12 March 2009.
- Web 2.0 versus Control 2.0. Reporters Without Borders (Paris), 18 March 2010.
- Internet Enemies, Reporters Without Borders (Paris), 12 March 2011
- nu.nl, Ziggo en XS4ALL moeten toegang The Pirate Bay blokkeren (Dutch news website)
- For the BBC poll Internet users are those who used the Internet within the previous six months.
- "BBC Internet Poll: Detailed Findings", BBC World Service, 8 March 2010
- "Internet access is 'a fundamental right'", BBC News, 8 March 2010
- ed. Chadwick (2009). pp. 331.
- "The Arab Spring’s Cascading Effects", Philip N. Howard, Miller-McCune, 23 February 2011
- "Middle East Political Protest And Internet Traffic Report: February 12-20, 2011", Craig Labovitz, Arbor Networks
- Cowie, James. "Egypt Leaves the Internet". Renesys. Archived from the original on 2011-01-28. http://www.webcitation.org/5w51j0pga. Retrieved 2011-01-28.
- Kirk, Jeremy (2011-01-28). "With Wired Internet Locked, Egypt Looks to the Sky". IDG News/PC World. Archived from the original on 2011-01-28. http://www.webcitation.org/5w518Yu9B. Retrieved 2011-01-28.
- "Journalists confined to their hotels, Internet disconnected". Journalists confined to their hotels, Internet disconnected. Reporters Without Borders. http://en.rsf.org/journalists-confined-to-their-04-03-2011,39681.html. Retrieved 21 March 2011.
- "Syrian Electronic Army: Disruptive Attacks and Hyped Targets", OpenNet Initative, 25 June 2011
- "Countries under surveillance: Egypt", Reporters Without Borders, March 2011
- "Censorship fallout from the Arab Spring?", Juliette Terzieff, The Future 500, 29 June 2011
- "Insight: Social media - a political tool for good or evil?", Peter Apps, Reuters Canada, 28 September 2011
- Blog censorship gains support | CNET News.com
- "Erowid Interview". http://erowidethnography.files.wordpress.com/2011/05/erowid-interview.pdf. Retrieved 26 May 2011.
- "Latest Stories From News.Com.Au". http://www.theaustralian.news.com.au/story/0,25197,22885402-12335,00.html.
- "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites", OpenNet Initiative: Bulletin 009, 31 January 2005
- Press release from WIkileaks concerning Australian censorship
- "Federal authorities take on Anonymous hackers", Associated Press in the Washington Post, 12 September 2011
- YouTube Blocked in…Thailand
- "China struggles to tame microblogging masses", Agence France-Presse (AFP) in The Independent, 8 September 2011
- "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries", Helmi Noman, OpenNet Initiative, March 2010
- "Google Search & Cache Filtering Behind China's Great Firewall", OpenNet Initiative: Bulletin 006, 3 September 2004
- "Empirical Analysis of Google SafeSearch", Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003
- "China blocking Google". BBC News. 2 September 2002. http://news.bbc.co.uk/2/hi/technology/2231101.stm. Retrieved 5 May 2010.
- "In Mexico, Social Media Become a Battleground in the Drug War", J. David Goodman, The Lede, New York Times, 15 September 2011
- Provision of information in this fashion is in keeping with principles of freedom of expression, as long as it is done transparently and does not overwhelm alternative sources of information.
- "China’s growing army of paid internet commentators", Sarah Cook and Maggie Shum, Freedom House, 11 October 2011
- "Empirical Analysis of Internet Filtering in China: Technical Appendix", Jonathan Zittrain and Benjamin Edelman, Berkman Center for Internet & Society at Harvard Law School, 20 March 2003
- For an example, see Wikipedia:Advice to users using Tor to bypass the Great Firewall
- Academics break the Great Firewall of China
- "Pulling the Plug: A Technical Review of the Internet Shutdown in Burma", OpenNet Initiative, November 2007
- Google excluding controversial sites, Declan McCullagh, CNET News, 23 October 2002, 8:55 p.m. PDT, retrieved 22 April 2007 00:40 UTC
- "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army", Helmi Noman, OpenNet Initative, May 2011
- Declan McCullagh (23 April 2004). "Google's chastity belt too tight". http://news.cnet.com/2100-1032_3-5198125.html.
- "India blocks Yahoo! Groups", Andrew Orlowski, The Register, 24 September 2003
- "Statement of Rights and Responsibilities", Facebook, 26 April 2011, accessed 18 August 2011
- "Why does Google remove sites from the Google index?", Google Webmaster Tools Help, retrieved 22 April 2007 00:43 UTC
- "Terms of Service", Twitter, 1 June 2011, accessed 18 August 2011
- "Terms of Service", YouTube, 9 June 2010, accessed 18 August 2011
- "Deletion policy", Wikipedia, accessed 18 August 2011
- "Yahoo! Terms of Service", Yahoo!, 24 November 2008, accessed 18 August 2011
- ed. Chadwick (2009). pp. 330–331.
- "Political Repression 2.0", Evgeny Morzov, Op-Ed Contributor to the New York Times, 1 September 2011
- Glanville, Jo (17 November 2008). "The big business of net censorship". London: The Guardian. http://www.guardian.co.uk/commentisfree/2008/nov/17/censorship-internet.
- "Internet content filtering", Netsweeper, Inc. web site, accessed 1 September 2011
- "Group Says It Has New Evidence of Cisco’s Misdeeds in China", Somini Sengupta, New York Times, 2 September 2011
- ed. Chadwick (2009). pp. 323–324.
- "Risks", Internet censorship wiki, accessed 2 September 2011
- "U.S. Underwrites Internet Detour Around Censors", James Glanz and John Markoff, New York Times, 12 June 2011
- Creative Commons Attribution 3.0 Unported license, see the lower right corner of pages at the OpenNet Initiative web site
Wikimedia Commons has media related to: Intellectual Property and the Internet/Internet censorship
- Censorship Wikia, an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship.
- How to Bypass Internet Censorship, also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp.
- "Index on Censorship", web site for the London based organization and magazine that promotes freedom of expression.
- Internet censorship wiki, provides information about different methods of access filtering and ways to bypass them.
- "Media Freedom Internet Cookbook" by the OSCE Representative on Freedom of the Media, Vienna, 2004.