ABSTRACT
In this work we present a detailed study of the Internet censorship mechanism in India. We consolidated a list of potentially blocked websites from various public sources to assess censorship mechanisms used by nine major ISPs. To begin with, we demonstrate that existing censorship detection tools like OONI are grossly inaccurate. We thus developed various techniques and heuristics to correctly assess censorship and study the underlying mechanism used by these ISPs. At every step we corroborated our finding manually to test the efficacy of our approach, an exercise largely ignored by several others. We fortify our findings by adjudging the coverage and consistency of censorship infrastructure, broadly in terms of average number of network paths and requested domains the infrastructure censors. Our results indicate a clear disparity among the ISPs, on how they install censorship infrastructure. For instance, in Idea network we observed the censorious middleboxes in over 90% of our tested intra-AS paths, whereas for Vodafone, it is as low as 2.5%. We conclude our research by devising our own novel anti-censorship strategies, that does not depend on third party tools (like proxies, Tor and VPNs etc.). We managed to access all blocked websites in all ISPs under test.
- Bogon ip addresses. https://ipinfo.io/bogon.Google Scholar
- Cidr report. https://www.cidr-report.org/as2.0/.Google Scholar
- Dna india. http://www.dnaindia.com/india/report-government-orders-blocking-of\-857-pornographic-websites-2110545.Google Scholar
- Facebook transparency report 2017. https://transparency.facebook.com/country/India/2017-H1/.Google Scholar
- Google transparency report 2017. https://transparencyreport.google.com/government-removals/by-country/IN.Google Scholar
- Herdict:Help Spot Web Blockages. http://herdict.org/.Google Scholar
- How ooni detects http filtering? https://ooni.torproject.org/nettest/web-connectivity/.Google Scholar
- Http 1.1 rfc 2616. https://tools.ietf.org/html/rfc2616.Google Scholar
- Instances of internet censorship in india. https://opennet.net/research/profiles/india.Google Scholar
- List of potentially blocked websites in india --- citizen labs. https://github.com/citizenlab/test-lists/blob/master/lists/in.csv.Google Scholar
- Ministry of it orders isp to ban sexual abuse material. http://www.meity.gov.in/content/order-issued-meity-isps-adopt-and-implement\-iwf-resources-prevent-distribution-and.Google Scholar
- Ooni source code. https://github.com/TheTorProject/ooni-probe/blob/master/ooni/nettests/blocking/web_connectivity.py.Google Scholar
- Porn websites blocked in india: Government plans ombudsman for online content. http://gadgets.ndtv.com/internet/news/porn-websites-blocked-in-india-government\-plans-ombudsman-for-online-content-723485.Google Scholar
- Rediff. http://www.rediff.com/computer/1999/jul05dawn.htm.Google Scholar
- Right to information, a citizen gateway. http://rti.gov.in/.Google Scholar
- Shodan-search engine for internet-connected devices. https://www.shodan.io/.Google Scholar
- How the great firewall of china is blocking tor. In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet (Berkeley, CA, 2012), USENIX.Google Scholar
- Ooni: Open observatory of network interference. In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet (Berkeley, CA, 2012), USENIX.Google Scholar
- Aceto, G., Montieri, A., and Pescapé, A. Internet censorship in italy: An analysis of 3g/4g networks. In Communications (ICC), 2017 IEEE International Conference on (2017), IEEE, pp. 1--6.Google ScholarCross Ref
- Acharya, H., Chakravarty, S., and Gosain, D. Few throats to choke: On the current structure of the internet. In Local Computer Networks (LCN), 2017 IEEE 42nd Conference on (2017), IEEE, pp. 339--346.Google ScholarCross Ref
- Acharya, H., Chakravarty, S., and Gosain, D. Mending wall: On the implementation of censorship in india. In SecureComm 2018 - 13th EAI International Conference on Security and Privacy in Communication Networks (2017), Springer.Google Scholar
- Anonymous. The collateral damage of internet censorship by dns injection. SIGCOMM Comput. Commun. Rev. 42, 3 (June 2012), 21--27. Google ScholarDigital Library
- Aryan, S., Aryan, H., and Halderman, J. A. Internet censorship in iran: A first look. In FOCI (2013).Google Scholar
- Burnett, S., and Feamster, N. Encore: Lightweight measurement of web censorship with cross-origin requests. ACM SIGCOMM Computer Communication Review 45, 4 (2015), 653--667. Google ScholarDigital Library
- Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., and Kaafar, M. A. Censorship in the wild: Analyzing internet filtering in syria. In Proceedings of the 2014 Conference on Internet Measurement Conference (2014), ACM, pp. 285--298. Google ScholarDigital Library
- Clayton, R., Murdoch, S. J., and Watson, R. N. Ignoring the great firewall of china. In International Workshop on Privacy Enhancing Technologies (2006), Springer, pp. 20--35. Google ScholarDigital Library
- Crandall, J. R., Zinn, D., Byrd, M., Barr, E. T., and East, R. Conceptdoppler: a weather tracker for internet censorship. In ACM Conference on Computer and Communications Security (2007), pp. 352--365. Google ScholarDigital Library
- Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., and Pescapé, A. Analysis of country-wide internet outages caused by censorship. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (2011), ACM, pp. 1--18. Google ScholarDigital Library
- Dalek, J., Haselton, B., Noman, H., Senft, A., Crete-Nishihata, M., Gill, P., and Deibert, R. J. A method for identifying and confirming the use of url filtering products for censorship. In Proceedings of the 2013 conference on Internet measurement conference (2013), ACM, pp. 23--30. Google ScholarDigital Library
- Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N., and Paxson, V. Examining how the great firewall discovers hidden circumvention servers. In Proceedings of the 2015 Internet Measurement Conference (2015), ACM, pp. 445--458. Google ScholarDigital Library
- Ensafi, R., Winter, P., Mueen, A., and Crandall, J. R. Analyzing the great firewall of china over space and time. Proceedings on privacy enhancing technologies 2015, 1 (2015), 61--76.Google ScholarCross Ref
- Gao, L., and Wang, F. The extent of as path inflation by routing policies. In Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE (2002), vol. 3, IEEE, pp. 2180--2184.Google Scholar
- Gill, P., Crete-Nishihata, M., Dalek, J., Goldberg, S., Senft, A., and Wiseman, G. Characterizing web censorship worldwide: Another look at the opennet initiative data. ACM Transactions on the Web (TWEB) 9, 1 (2015), 4. Google ScholarDigital Library
- Guo, S., and Feng, G. Understanding support for internet censorship in china: An elaboration of the theory of reasoned action. Journal of Chinese Political Science 17, 1 (2012), 33--52.Google ScholarCross Ref
- Internet censorship in iran.Google Scholar
- Jermyn, J., and Weaver, N. Autosonda: Discovering rules and triggers of censorship devices. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association, Vancouver, BC. https://www.usenix.org/conference/foci17/workshop-program/presentation/jermyn (2017).Google Scholar
- Khattak, S., Jayed, M., Anderson, P. D., and Paxson, V. Towards illuminating a censorship monitor's model to facilitate evasion. In FOCI (2013).Google Scholar
- Knockel, J., Ruan, L., and Crete-Nishihata, M. Measuring decentralization of chinese keyword censorship via mobile games. In 7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 17) (2017), USENIX Association.Google Scholar
- Levis, P. The collateral damage of internet censorship by dns injection. ACM SIGCOMM CCR 42, 3 (2012). Google ScholarDigital Library
- MacKinnon, R. Flatter world and thicker walls? blogs, censorship and civic discourse in china. Public Choice 134, 1--2 (2008), 31--46.Google Scholar
- Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., and Paxson, V. ChinaâĂŹs great cannon. Citizen Lab 10 (2015).Google Scholar
- Nabi, Z. The anatomy of web censorship in pakistan. In FOCI (2013).Google Scholar
- Pearce, P., Ensafi, R., Li, F., Feamster, N., and Paxson, V. Augur: Internet-wide detection of connectivity disruptions. In Security and Privacy (SP), 2017 IEEE Symposium on (2017), IEEE, pp. 427--443.Google ScholarCross Ref
- Pearce, P., Jones, B., Li, F., Ensafi, R., Feamster, N., Weaver, N., and Paxson, V. Global measurement of dns manipulation. In Proceedings of the 26th USENIX Security Symposium (SecurityâĂŹ17) (2017). Google ScholarDigital Library
- Sfakianakis, A., Athanasopoulos, E., and Ioannidis, S. Censmon: A web censorship monitor. In USENIX Workshop on Free and Open Communication on the Internet (FOCI) (2011).Google Scholar
- Son, S., and Shmatikov, V. The hitchhikerâĂŹs guide to dns cache poisoning. In International Conference on Security and Privacy in Communication Systems (2010), Springer, pp. 466--483.Google Scholar
- Verkamp, J.-P., and Gupta, M. Inferring mechanics of web censorship around the world. In FOCI (2012).Google Scholar
- Ververis, V., Kargiotakis, G., Filasto, A., Fabian, B., and Alexandros, A. Understanding internet censorship policy: The case of greece. In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2015).Google Scholar
- Wang, Z., Cao, Y., Qian, Z., Song, C., and Krishnamurthy, S. V. Your state is not mine: a closer look at evading stateful internet censorship. In Proceedings of the 2017 Internet Measurement Conference (2017), ACM, pp. 114--127. Google ScholarDigital Library
- West, D. M. Internet shutdowns cost countries $2.4 billion last year. Center for Technological Innovation at Brookings, Washington, DC (2016).Google Scholar
- Wright, J. Regional variation in chinese internet filtering. Information, Communication & Society 17, 1 (2014), 121--141.Google Scholar
- Xu, X., Mao, Z. M., and Halderman, J. A. Internet censorship in china: Where does the filtering occur? In International Conference on Passive and Active Network Measurement (2011), Springer, pp. 133--142. Google ScholarDigital Library
- Yang, Q., and Liu, Y. WhatâĂŹs on the other side of the great firewall? chinese web usersâĂŹ motivations for bypassing the internet censorship. Computers in human behavior 37 (2014), 249--257. Google ScholarDigital Library
- Zittrain, J., Budish, R., and Faris, R. Herdict: Help spot web blockages, 2014.Google Scholar
- Zittrain, J., and Edelman, B. Internet filtering in china. IEEE Internet Computing 7, 2 (2003), 70--77. Google ScholarDigital Library
Recommendations
A tool for liberty or oppression? A cross-national study of the Internets influence on democracy
This study tackles the inquiry of whether the Internet is a tool for democracy or oppression.E-participation did not significantly mediate political evolution from electoral democracy to liberal democracy.Online filtering or censorship significantly ...
ICT-Enabled Grievance Redressal in Central India: A Comparative Analysis
ICTD '16: Proceedings of the Eighth International Conference on Information and Communication Technologies and DevelopmentHelping citizens to resolve grievances is an important part of many e-governance initiatives. In this paper, we examine two contemporary initiatives that use ICTs to help citizens resolve grievances in central India. One system is a state-run call ...
IT in Governance in the 21st Century
Can IT and the Internet promote and strengthen global civil society and democracy? How does the Internet create conditions for improving the delivery of services to the common public? Reviewing ICT initiatives in India leads to a set of recommendations ...
Comments