Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data

@article{Gill2015CharacterizingWC,
  title={Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data},
  author={Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman},
  journal={ACM Trans. Web},
  year={2015},
  volume={9},
  pages={4:1-4:29}
}
In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that… 
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
TLDR
This work developed various techniques and heuristics to correctly assess censorship and study the underlying mechanism used by nine major ISPs in India, and demonstrated that existing censorship detection tools like OONI are grossly inaccurate.
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
TLDR
ICLab, an Internet measurement platform specialized for censorship research, is presented, which achieves a new balance between breadth of coverage and detail of measurements, by using commercial VPNs as vantage points distributed around the world.
Internet Censorship detection: A survey
Analyzing internet censorship in Pakistan
TLDR
This is the first study in literature analyzing and comparing the behaviour of five ISPs in Pakistan using automated detection methods based on active probing measurements, providing both qualitative and quantitative results to gauge how major ISPs are censoring web content in Pakistan.
A Case for Marrying Censorship Measurements with Circumvention
TLDR
C-Saw is a browser-based platform set up as a lightweight client-side proxy that adapts its circumvention approach to the particular censorship mechanism deployed by a user's ISP, achieving a better balance of circumvention effectiveness and performance.
Your state is not mine: a closer look at evading stateful internet censorship
TLDR
This paper undertake, arguably, the most extensive measurement study on TCP-level GFW evasion techniques, with several vantage points within and outside China, and with clients subscribed to multiple ISPs, finding that the state-of-the art evasion techniques are no longer very effective on the GFW.
Incentivizing censorship measurements via circumvention
TLDR
C-Saw is presented, a system that measures Internet censorship by offering data-driven censorship circumvention to users, and it is shown that it is effective at collecting and disseminating censorship measurements, selecting circumvention approaches, and optimizing user experience.
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
TLDR
Analysis of content and longevity of 758,191 webpages drawn from 22 different probe lists, of which 15 are alleged to be actual blacklists of censored webpages in particular countries, three were compiled using a priori criteria for selecting pages with an elevated chance of being censored, and four are controls, finds that the lists have very little overlap.
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
TLDR
This work analyzes the DNS injection behavior of the Great Firewall of China over a period of nine months using the Alexa top 1M domains as a test list and observes a sharp decline in public IPs injected by the GFW in November 2019.
Decentralized Control: A Case Study of Russia
TLDR
An in-depth investigation of the mechanisms underlying decentralized information control in Russia shows that large-scale censorship can be achieved in decentralized networks through inexpensive commodity equipment and suggests that data centers block differently from the residential ISPs both in quantity and in method of blocking, resulting in different experiences of the Internet for residential network perspectives and data center perspectives.
...
...

References

SHOWING 1-10 OF 104 REFERENCES
CensMon: A Web Censorship Monitor
TLDR
The design and implemention of a web censorship monitor, called CensMon, which can successfully detect censored content and spot the filtering technique used by the censor is presented.
Analysis of country-wide internet outages caused by censorship
TLDR
This paper detected what it believes were Libya's attempts to test firewall-based blocking before they executed more aggressive BGP-based disconnection during censorship episodes in Egypt and Libya.
Making sense of internet censorship: a new frontier for internet measurement
TLDR
It is argued that, although it may not always be feasible to guarantee free and open access to information, citizens have the right to know when their access has been obstructed, restricted, or tampered with, so they can make informed decisions on information access.
ConceptDoppler: a weather tracker for internet censorship
TLDR
ConceptDoppler, an architecture for maintaining a censorship “weather report” about what keywords are filtered over time is proposed, and it is shown that LSA can effectively pare down a corpus of text and cluster filtered keywords for efficient probing.
A method for identifying and confirming the use of URL filtering products for censorship
TLDR
The results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms.
A Taxonomy of Internet Censorship Resistance Strategies
TLDR
A taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems is presented to form the CORDON taxonomy, and future work needed to solve the fundamental problems facing all systems today is identified.
The collateral damage of internet censorship by DNS injection
TLDR
It is found that most collateral damage arises from resolvers querying TLD name servers who’s transit passes through China rather than effects due to root servers (F, I, J) located in China.
Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace
TLDR
Access Controlled offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.
Netalyzr: illuminating the edge network
TLDR
A detailed study of 130,000 measurement sessions that the service has recorded since it was made publicly available in June 2009 is presented, along with describing Netalyzr 's architecture and system implementation.
Inferring Mechanics of Web Censorship Around the World
TLDR
Through a combination of personal contacts and Planet-Lab nodes, this work conducts experiments to explore the mechanics of Web censorship in 11 countries around the world, including China, providing insights into the diversity of modus operandi of censorsAround the world.
...
...