Lessons On Censorship From Syria's Internet Filter Machines

from the https-matters dept

Norwegian writer Mette Newth once wrote that: “Censorship has followed the free expressions of men and women like a shadow throughout history.” As we develop new means to gather and create information, new means to control, erase and censor that information evolve alongside it. Today, that means access to information through the internet, which motivates us to study internet censorship.

Organizations such as Reporters Without Borders, Freedom House, or the Open Net Initiative periodically report on the extent of censorship worldwide. But as countries that are fond of censorship are not particularly keen to share details, we must resort to probing filtered networks, that is, generating requests from within them to see what gets blocked and what gets through. We cannot hope to record all the possible censorship-triggering events, so our understanding of what is or isn’t acceptable to the censor will only ever be partial. And of course it’s risky, even outright illegal, to probe the censor’s limits within countries with strict censorship and surveillance programs.

This is why the leak of 600GB of logs from hardware appliances used to filter internet traffic in and out of Syria is a unique opportunity to examine the workings of a real-world internet censorship apparatus.

Leaked by the hacktivist group Telecomix, the logs cover a period of nine days in 2011, drawn from seven SG-9000 internet proxies. The sale of equipment like this to countries like Syria is banned by the US and EU. California-based manufacturer Blue Coat Systems denied making the sales but confirmed the authenticity of the logs – and Dubai-based firm Computerlinks FZCO later settled on a US$2.8 million fine for unlawful export. In 2013, researchers at the University of Toronto’s Citizen Lab demonstrated how authoritarian regimes in Saudi Arabia, UAE, Qatar, Yemen, Egypt and Kuwait all
rely on US-made equipment like those from Blue Coat or McAfee’s SmartFilter software to perform filtering.

This technology is extremely powerful as it can perform deep-packet inspection, that is, examining in detail the contents of network traffic. They provide censors with a simple interface to fine-tune filtering policies, practically in real time.

Inside a censor’s mind

At the recent ACM Internet Measurement Conference, we presented our paper detailing the relatively stealthy but targeted censorship system that we’d found from examining the logs.

Internet traffic in Syria was filtered in several ways. IP addresses (the unique addresses of web servers on the internet) and domain names (the URL typed into the address bar) were filtered to block single websites such as badoo.com or amazon.com, entire network regions (including a few Israeli subnets), or keywords to target specific content. Instant messaging, tools such as Skype, and content-sharing sites such as Metacafe or Reddit were heavily censored. Social media censoring was limited to specific content and pages, such as the “Syrian Revolution” facebook page.



The appliances were sometimes misconfigured, meaning the filter caused some collateral damage – for instance, all requests with the keyword “proxy” were blocked, probably in an effort to curb the use of censorship-evading proxies, but this also had the effect of blocking adverts and certain plug-ins that had no relation to banned content.

We found that Syrian users did try to get around the filters, using tools such as Tor, or virtual private networks (encrypted tunnels between two computers using the public internet), and that these were fairly effective. We also noticed that some tools not necessarily designed with circumventing censorship in mind could also be used to access blocked content – for example using peer-to-peer programs such as BitTorrent to download blocked software (such as Skype) and using Google Cache to access (over HTTPS) cached and mirrored versions of blocked web pages.

Avoiding the censor’s knife

What emerges is the importance of encrypting web traffic by using secure (HTTPS) rather than standard (HTTP) web browsing. Many requests caught by the filter were only possible because keywords in the content of unencrypted network traffic could be read by the appliances. If traffic is encrypted, the page requested from the target domain, or a specific keyword in the request are not accessible. Through their efforts to enforce HTTPS by default, providers like Google and Facebook are taking steps in the right direction. They also serve a double purpose: protecting users’ privacy against mass-surveillance, while also making it harder to implement fine-grained censorship policies.

We did consider that our work might help organizations on both sides of the censorship line. But we decided to publish because we believe that evidence-based analysis of censorship practices can help understand the underlying technologies, policies, strengths and weaknesses – and can inform the design of tools designed to evade the censor’s knife.

While Western countries rely on export regulations and sanctions to restrict the worldwide availability of surveillance and censorship technologies – while apparently deploying them for their own use, as the Snowden files have revealed – it is time we had an open debate about their effectiveness and what can be done to limit their proliferation.

The Conversation

Emiliano De Cristofaro does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.

This article was originally published on The Conversation.
Read the original article
.

Filed Under: , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Lessons On Censorship From Syria's Internet Filter Machines”

Subscribe: RSS Leave a comment
17 Comments
Anonymoussays:

Re:

I can give you a partial answer/guess to that.

It’ll be done inside so-called “social media”. The corporations running those sites will be told that if they wish to do business in country X, they will need to cooperate with country X’s censorship/espionage requirements…and they’ll do it because of course they don’t give a damn about the privacy or security of their users: they care about profit, always profit and only profit.

The UK is already doing this: https://firstlook.org/theintercept/2014/11/26/campaign-shame-social-media-companies-acting-spy-agents-national-security-state/

They’re not the only one, of course. And most of it will happen in private and never be reported. But quietly, over time, the infrastructure will be built to allow countries to monitor and control the activities of their citizens on “social media” sites. So it won’t matter how they reach those sites: https, VPN? Irrelevant. Everything will be dutifully logged and compiled, then reported back to the country in question.

Publicly, those companies will continue to prattle — as they have — about “respecting users” and “improving the experience” and so on. Privately, they will give any country anything they want — particularly if they get paid for it — because they lack both the ethics and the courage to say no.

And countries will be, as always, silent about where they get their information from. (Parallel construction is not a uniquely US thing, you know.) And the idiots, the profoundly stupid and incredibly naive idiots, who think they can organize a “Syrian revolution” or whatever on Facebook, will actually be surprised when they’re rounded up and shot — because every single thing they’ve ever done on Facebook has been transmitted to the Syrian government’s intelligence agencies in real time.

Anonymoussays:

Re: Re: Re:

These days the only people who want the “revolution” in syria are working with either al-quaida or IS.

and if they succeed then they will inherit this technology and use it to censor any reasonable criticism of (their brand of?) Islam. Come to think of it several of the other states mentioned already do this – which is a big part of the problem.

Kevinsays:

Re: SSL

The same BlueCoat Proxy technology that Syria was caught using can Man-In-The-Middle (MITM) SSL interception, so https everywhere is not a panacea against hostile regimes! Even without breaking SSL, a firewall can still detect the website being accessed (through lookup tables or TLS+SNI), so when everything goes to https, blocking by domain will still succeed.

For more granular blocking, Syria would need to break SSL/TLS through MITM. Browsers detect these privacy breaking proxies, so for users to not see warning messages, the “attacker” needs a Certificate Authority (CA) signing certificate that the user trusts, either control of a CA that is in the default key set shipped with the OS or browser, or the ability to push a key down to the client.

As a measure of security, the latest Firefox includes “Public key pinning” which limits which signing certificates will be trusted for a small set of very popular and often-targeted HTTPS sites, including Twitter.

Realistically, hostile environments with no need to stealth will just force MITM on all sessions and block anything that looks like encrypted traffic (e.g. Tor). It’s not like Syria has to worry about their reputation getting any worse.

Aaronsays:

The top allowed sites

So just for giggles, I looked at what IS allowed in Syria – as far as URLs that we’re not censored. Google- ok I know that one. xVideos.com – probably just another YouTube clone- DOH! It’s a pretty graphic porn site. Glad they allow porn, but not Facebook.
Gstatic- doesn’t come up. Ok XVideos again..just kidding.

Anonymoussays:

Re: The top allowed sites

This isn’t surprising. While the overt purpose of the filters might be cultural or religious or legal, the covert purpose is of course to address anything perceived as a danger to the state. Thus news, education, communication, science, politics — anything that creates a more informed citizenry and allows them to communicate (especially with outsiders) is a potential target.

So while they may make public noises about the horrors of exposed boobies, they don’t really care. That’s just a smokescreen for the real agenda.

Anonymoussays:

Re: Re: The top allowed sites

“a more informed citizenry”
Oh please, people will always just ignore things that arent in line with their opinions. #GG is a great example of this, despite the massive censorship and hypocrisy there are still people who fail to see what its about and actually want to ruin peoples life for wanting a non-biased press. Even jimbo of wikipedia weighted in on the issue…

Even if people have access to all the information, they will still refuse to use it and will just parrot the same bullshit they hear from their favorite celebrities.

Anonymoussays:

Re: Re: Re: The top allowed sites

I presume you’re referring to the “crusade” called “GamerGate”, for which I have zero sympathy. (And not, by the way, because I pay attention to media or celebrities: because I’ve read the original source material and decided for myself.) If you want to advocate for unbiased journalism, it would probably be best NOT to do it under the same banner waved by bigots, misogynists and rapists. (e.g., if tomorrow you discover an actual real live working cure for cancer, you probably shouldn’t try to promote it with a swastika.)

Richardsays:

Re: Re: Re: Re: The top allowed sites

) If you want to advocate for unbiased journalism, it would probably be best NOT to do it under the same banner waved by bigots, misogynists and rapists.

That can be a difficult balancing act – especially when your opponents will try very hard to conflate your opinions with those of people who are easy targets for an ad hom.

Disclaimer; I’m talking in general terms here – and not specifically (in fact specifically NOT) about #GG – about which I only have “wikipedia” knowledge.

Kevinsays:

Re: twitter was caught?

twitter was caught scanning peoples hard-drives for ‘unlicensed’ software but then tried pathetically to claim it was doing this for the good of it’s users.

That’s news to me. I know Steam was caught scanning users HDs for cheat tools, maybe that’s what you are thinking of?

Specifically, I’ve never heard of any social platform that scanned user hard-drives for ‘unlicensed’ software, only gaming platforms.

William O. B'Livionsays:

Made in the US? I doubt it.

…all rely on US-made equipment like those from Blue Coat or McAfee’s SmartFilter software.

The hardware might be designed in the US, and certain more technical parts of the OS (IIRC Bluecoat is owned by sidewinder, and last time I ran one Sidewinder was running on top of BSDI) and filtering layers might be written in the US, but most of the hardware is built and assembled in China, and large bits of the application layer are (probably) written in India.

Not that this changes things much–other than “we” have found counterfeit cisco gear running hacked IOS (the original IOS, not this Johnny come lately on your cellphone), so it’s not impossible that some of these dirtball regiemes are buying either QA rejects or “second shift” hardware.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...
Older Stuff
13:40 It's Great That Winnie The Pooh Is In The Public Domain; But He Should Have Been Free In 1982 (Or Earlier) (35)
12:06 Norton 360 Now Comes With Crypto Mining Capabilities And Sketchy Removal Process (28)
10:45 Chinese Government Dragnet Now Folding In American Social Media Platforms To Silence Dissent (14)
10:40 Daily Deal: The 2022 Ultimate Cybersecurity Analyst Preparation Bundle (0)
09:29 A Fight Between Facebook And The British Medical Journal Highlights The Difficulty Of Moderating 'Medical Misinformation' (9)
06:29 Court Ruling Paves The Way For Better, More Reliable Wi-Fi (4)
20:12 Eighth Circuit (Again) Says There's Nothing Wrong With Detaining Innocent Minors At Gunpoint (15)
15:48 China's Regulatory War On Its Gaming Industry Racks Up 14k Casualties (10)
13:31 Chinese Government Fines Local Car Dealerships For Surveilling While Not Being The Government (5)
12:08 Eric Clapton Pretends To Regret The Decision To Sue Random German Woman Who Listed A Bootleg Of One Of His CDs On Ebay (29)
10:44 ICE Is So Toxic That The DHS's Investigative Wing Is Asking To Be Completely Separated From It (29)
10:39 Daily Deal: The 2022 Complete Raspberry Pi And Arduino Developer Bundle (0)
09:31 Google Blocked An Article About Police From The Intercept... Because The Title Included A Phrase That Was Also A Movie Title (24)
06:22 Wireless Carriers Balk At FAA Demand For 5G Deployment Delays Amid Shaky Safety Concerns (16)
19:53 Tenth Circuit Denies Qualified Immunity To Social Worker Who Fabricated A Mother's Confession Of Child Abuse (35)
15:39 Sci-Hub's Creator Thinks Academic Publishers, Not Her Site, Are The Real Threat To Science, And Says: 'Any Law Against Knowledge Is Fundamentally Unjust' (34)
13:32 Federal Court Tells Proud Boys Defendants That Raiding The Capitol Building Isn't Covered By The First Amendment (25)
12:14 US Courts Realizing They Have A Judge Alan Albright Sized Problem In Waco (17)
10:44 Boston Police Department Used Forfeiture Funds To Hide Purchase Of Surveillance Tech From City Reps (16)
10:39 Daily Deal: The Ultimate Microsoft Excel Training Bundle (0)
09:20 NY Senator Proposes Ridiculously Unconstitutional Social Media Law That Is The Mirror Opposite Of Equally Unconstitutional Laws In Florida & Texas (25)
06:12 Telecom Monopolies Are Exploiting Crappy U.S. Broadband Maps To Block Community Broadband Grant Requests (7)
12:00 Funniest/Most Insightful Comments Of 2021 At Techdirt (17)
10:00 Gaming Like It's 1926: Join The Fourth Annual Public Domain Game Jam (6)
09:00 New Year's Message: The Arc Of The Moral Universe Is A Twisty Path (33)
19:39 DHS, ICE Begin Body Camera Pilot Program With Surprisingly Good Policies In Place (7)
15:29 Remembering Techdirt Contributors Sherwin And Elliot (1)
13:32 DC Metro PD's Powerful Review Panel Keeps Giving Bad Cops Their Jobs Back (6)
12:11 Missouri Governor Still Expects Journalists To Be Prosecuted For Showing How His Admin Leaked Teacher Social Security Numbers (39)
10:48 Oversight Board Overturning Instagram Takedown Of Ayahuasca Post Demonstrates The Impossibility Of Content Moderation (10)
More arrow
This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it