We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Internet Filtering

Formal Metadata

Title
Internet Filtering
Subtitle
A work in progress talk
Title of Series
Number of Parts
3
Author
License
CC Attribution - NonCommercial - NoDerivatives 3.0 Unported:
You are free to use, copy, distribute and transmit the work or content in unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Many countries in the world perform extensive network surveillance, filtering in the form of website blocking or protocol specific censorship; recently many networked authoritarian events in the Middle East/North Africa and across most of the world have come to light. During some specific political uprisings came increased invasive filtering events. I've run a series of tests in many of these countries, during these events with the specific purpose of identifying specific hardware and software in use. Some of the technical details are not novel but their application certainly makes a positive contribution. In some contexts, it's possible to identify specific network links that flag, drop, or inject data at the country level. I intend to show real world data such as block pages, network traces, scans of filters, interesting network blocks and I will discuss techniques for gathering useful data.