Jump to content

Internet censorship: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
GreenC bot (talk | contribs)
Rescued 1 archive link; remove 1 link. Wayback Medic 2.5 per WP:URLREQ#en.rsf.org
clean up, added bracket template + fixed see also section for approaches
Line 2: Line 2:
{{Use dmy dates|date=November 2020}}
{{Use dmy dates|date=November 2020}}
{{Internet}}
{{Internet}}
'''Internet censorship''' is the legal [[censorship|control or suppression]] of what can be accessed, published, or viewed on the [[Internet]]. [[Censorship]] is most often applied to specific [[Network domain|internet domain]]s (such as ''Wikipedia.org'', for example) but exceptionally may extend to all Internet resources located outside the [[jurisdiction]] of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible.<ref>{{Cite web |url=https://www.iplocation.net/internet-censorship |access-date=2021-05-01 |title=What is Internet Censorship? |archive-date=1 May 2021 |website=www.iplocation.net |archive-url=https://web.archive.org/web/20210501213345/https://www.iplocation.net/internet-censorship|url-status=live}}</ref> Organizations providing internet access{{snd}}such as schools and libraries{{snd}} may choose to preclude access to material that they consider undesirable, offensive, [[age appropriate|age-inappropriate]] or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in [[self-censorship]] of material they publish, for moral, religious, or business reasons, to conform to [[social norm|societal norms]], political views, due to intimidation, or out of fear of legal or other consequences.<ref name="NYT-20181015">{{cite news |author=The Editorial Board |title=There May Soon Be Three Internets. America's Won't Necessarily Be the Best. - A breakup of the web grants privacy, security and freedom to some, and not so much to others. |url=https://www.nytimes.com/2018/10/15/opinion/internet-google-china-balkanization.html |date=15 October 2018 |work=[[The New York Times]] |access-date=16 October 2018 |archive-date=9 July 2021 |archive-url=https://web.archive.org/web/20210709190555/https://www.nytimes.com/2018/10/15/opinion/internet-google-china-balkanization.html |url-status=live |url-access=subscription}}</ref><ref name="NYT-20140311">{{cite news |last1=Schmidt |first1=Eric E. |last2=Cohen |first2=Jared |author-link1=Eric Schmidt |author-link2=Jared Cohen |title=The Future of Internet Freedom |url=https://www.nytimes.com/2014/03/12/opinion/the-future-of-internet-freedom.html |date=11 March 2014 |work=[[The New York Times]] |access-date=11 March 2014 |archive-url=https://web.archive.org/web/20201212132407/https://www.nytimes.com/2014/03/12/opinion/the-future-of-internet-freedom.html |archive-date=12 December 2020 |url-status=live }}</ref>
'''Internet censorship''' is the legal [[censorship|control or suppression]] of what can be accessed, published, or viewed on the [[Internet]]. [[Censorship]] is most often applied to specific [[Network domain|internet domain]]s (such as ''Wikipedia.org'', for example) but exceptionally may extend to all Internet resources located outside the [[jurisdiction]] of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible.<ref>{{Cite web |url=https://www.iplocation.net/internet-censorship |access-date=2021-05-01 |title=What is Internet Censorship? |archive-date=1 May 2021 |website=www.iplocation.net |archive-url=https://web.archive.org/web/20210501213345/https://www.iplocation.net/internet-censorship|url-status=live}}</ref> Organizations providing internet access{{snd}}such as schools and libraries{{snd}} may choose to preclude access to material that they consider undesirable, offensive, [[age appropriateness|age-inappropriate]] or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in [[self-censorship]] of material they publish, for moral, religious, or business reasons, to conform to [[social norm|societal norms]], political views, due to intimidation, or out of fear of legal or other consequences.<ref name="NYT-20181015">{{cite news |author=The Editorial Board |title=There May Soon Be Three Internets. America's Won't Necessarily Be the Best. - A breakup of the web grants privacy, security and freedom to some, and not so much to others. |url=https://www.nytimes.com/2018/10/15/opinion/internet-google-china-balkanization.html |date=15 October 2018 |work=[[The New York Times]] |access-date=16 October 2018 |archive-date=9 July 2021 |archive-url=https://web.archive.org/web/20210709190555/https://www.nytimes.com/2018/10/15/opinion/internet-google-china-balkanization.html |url-status=live |url-access=subscription}}</ref><ref name="NYT-20140311">{{cite news |last1=Schmidt |first1=Eric E. |last2=Cohen |first2=Jared |author-link1=Eric Schmidt |author-link2=Jared Cohen |title=The Future of Internet Freedom |url=https://www.nytimes.com/2014/03/12/opinion/the-future-of-internet-freedom.html |date=11 March 2014 |work=[[The New York Times]] |access-date=11 March 2014 |archive-url=https://web.archive.org/web/20201212132407/https://www.nytimes.com/2014/03/12/opinion/the-future-of-internet-freedom.html |archive-date=12 December 2020 |url-status=live }}</ref>


The extent of Internet censorship varies on a country-to-country basis. While some countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress and silence discussion among citizens.<ref name="NYT-20140311" /> Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the [[Arab Spring]]. Other types of censorship include the [[censorship by copyright|use of copyrights]], [[defamation]], [[harassment]], and various obscene material claims as a way to deliberately suppress content.
The extent of Internet censorship varies on a country-to-country basis. While some countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress and silence discussion among citizens.<ref name="NYT-20140311" /> Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the [[Arab Spring]]. Other types of censorship include the [[censorship by copyright|use of copyrights]], [[defamation]], [[harassment]], and various obscene material claims as a way to deliberately suppress content.


Support for and opposition to Internet censorship also varies. In a [[#Internet Society's Global Internet User Survey|2012 Internet Society survey]] 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "[[freedom of expression]] should be guaranteed on the Internet". Perception of internet censorship in the US is largely based on the [[First Amendment to the United States Constitution|First Amendment]] and the right for expansive free speech and access to content without regard to the consequences.<ref>{{Cite journal |last=Goldberg|first=Erica|journal=Columbia Law Review|volume=116|issue=3|pages=687–694|jstor=43783393 |year=2016|title=Free Speech Consequentialism}}</ref> According to [[GlobalWebIndex]], over 400 million people use [[virtual private network]]s to [[Internet censorship circumvention|circumvent censorship]] or for increased user [[privacy]].<ref name="Guardian 5 December 2014"/>
Support for and opposition to Internet censorship also varies. In a [[#Internet Society's Global Internet User Survey|2012 Internet Society survey]], 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey, 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "[[freedom of speech|freedom of expression]] should be guaranteed on the Internet". Perception of internet censorship in the US is largely based on the [[First Amendment to the United States Constitution|First Amendment]] and the right for expansive free speech and access to content without regard to the consequences.<ref>{{Cite journal |last=Goldberg|first=Erica|journal=Columbia Law Review|volume=116|issue=3|pages=687–694|jstor=43783393 |year=2016|title=Free Speech Consequentialism}}</ref> According to [[GWM (company)|GlobalWebIndex]], over 400&nbsp;million people use [[virtual private network]]s to [[Internet censorship circumvention|circumvent censorship]] or for increased user [[privacy]].<ref name="Guardian 5 December 2014"/>


==Overview==
==Overview==
Line 14: Line 14:
* A 1993 ''[[Time (magazine)|Time Magazine]]'' article quotes computer scientist [[John Gilmore (activist)|John Gilmore]], one of the founders of the [[Electronic Frontier Foundation]], as saying "The Net interprets censorship as damage and routes around it."<ref>[https://content.time.com/time/subscriber/article/0,33009,979768-1,00.html "First Nation in Cyberspace"], Philip Elmer-Dewitt, ''Time'', 6 December 1993, No.49</ref>
* A 1993 ''[[Time (magazine)|Time Magazine]]'' article quotes computer scientist [[John Gilmore (activist)|John Gilmore]], one of the founders of the [[Electronic Frontier Foundation]], as saying "The Net interprets censorship as damage and routes around it."<ref>[https://content.time.com/time/subscriber/article/0,33009,979768-1,00.html "First Nation in Cyberspace"], Philip Elmer-Dewitt, ''Time'', 6 December 1993, No.49</ref>
* In November 2007, "Father of the Internet" [[Vint Cerf]] stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.<ref>[https://www.reuters.com/article/reutersEdge/idUSN1420689320071114?sp=true "Cerf sees government control of Internet failing"] {{Webarchive|url=https://web.archive.org/web/20201103032125/https://www.reuters.com/article/reutersEdge/idUSN1420689320071114?sp=true |date=3 November 2020 }}, Pedro Fonseca, Reuters, 15 November 2006</ref>
* In November 2007, "Father of the Internet" [[Vint Cerf]] stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.<ref>[https://www.reuters.com/article/reutersEdge/idUSN1420689320071114?sp=true "Cerf sees government control of Internet failing"] {{Webarchive|url=https://web.archive.org/web/20201103032125/https://www.reuters.com/article/reutersEdge/idUSN1420689320071114?sp=true |date=3 November 2020 }}, Pedro Fonseca, Reuters, 15 November 2006</ref>
* A report of research conducted in 2007 and published in 2009 by the [[Berkman Center for Internet & Society]] at Harvard University stated that: "We are confident that the [ [[censorship circumvention]] ] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools."<ref>[http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2007_Circumvention_Landscape.pdf ''2007 Circumvention Landscape Report: Methods, Uses, and Tools''] {{Webarchive|url=https://web.archive.org/web/20111111152457/http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2007_Circumvention_Landscape.pdf |date=11 November 2011 }}, Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009</ref>
* A report of research conducted in 2007 and published in 2009 by the [[Berkman Klein Center for Internet & Society]] at Harvard University stated that: "We are confident that the {{bracket|[[internet censorship circumvention|censorship circumvention]]}} tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools."<ref>[http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2007_Circumvention_Landscape.pdf ''2007 Circumvention Landscape Report: Methods, Uses, and Tools''] {{Webarchive|url=https://web.archive.org/web/20111111152457/http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2007_Circumvention_Landscape.pdf |date=11 November 2011 }}, Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009</ref>
* In contrast, a 2011 report by researchers at the [[Oxford Internet Institute]] published by [[UNESCO]] concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."<ref name=UNESCO-2011/>
* In contrast, a 2011 report by researchers at the [[Oxford Internet Institute]] published by [[UNESCO]] concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."<ref name=UNESCO-2011/>


Blocking and filtering can be based on relatively static [[blacklist]]s or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or [[Internet cafes]].<ref name="NYT-20140311" /> Blocking and filtering may also vary within a country across different ISPs.<ref name=Chadwick-2009>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 332 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref> Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake [[404 error|"Not Found"]] error message when an attempt is made to access a blocked website.<ref name=Faris-2008/>
Blocking and filtering can be based on relatively static [[blacklisting|blacklist]]s or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, e.g., in libraries, universities or [[Internet café]]s.<ref name="NYT-20140311" /> Blocking and filtering may also vary within a country across different ISPs.<ref name=Chadwick-2009>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 332 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref> Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases, the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake [[HTTP 404|"Not Found"]] error message when an attempt is made to access a blocked website.<ref name=Faris-2008/>


Unless the censor has total control over all Internet-connected computers, such as in [[Internet censorship in North Korea|North Korea]] (who employs an [[intranet]] that only privileged citizens can access), or [[Internet censorship in cuba|Cuba]], total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. [[Pseudonymity]] and [[data haven]]s (such as [[Freenet]]) protect [[free speech]] using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in [[Internet censorship in the People's Republic of China|China]], are able to devote significant resources to building and maintaining a comprehensive censorship system.<ref name=UNESCO-2011/>
Unless the censor has total control over all Internet-connected computers, such as in [[censorship in North Korea#Internet policies|North Korea]] (who employs an [[intranet]] that only privileged citizens can access), or [[Internet censorship in cuba|Cuba]], total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. [[pseudonym|Pseudonymity]] and [[data haven]]s (such as [[Hyphanet]]) protect [[freedom of speech|free speech]] using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in [[Internet censorship in China|China]], are able to devote significant resources to building and maintaining a comprehensive censorship system.<ref name=UNESCO-2011/>


The term "[[splinternet]]" is sometimes used to describe the effects of national [[Firewall (computing)|firewalls]]. The verb "[[River crab (Internet slang)|rivercrab]]" colloquially refers to censorship of the Internet, particularly in Asia.<ref name="RC">{{Cite web |author=Lao Wai|title=I've Been Rivercrabbed! |work=An American in Beijing|date=21 October 2007 |url=http://americaninbeijing.blogspot.com/2007/10/ive-been-rivercrabbed.html|access-date=28 May 2011 |archive-date=11 August 2011|archive-url=https://web.archive.org/web/20110811103536/http://americaninbeijing.blogspot.com/2007/10/ive-been-rivercrabbed.html|url-status=live}}</ref>
The term "[[splinternet]]" is sometimes used to describe the effects of national [[Firewall (computing)|firewalls]]. The verb "[[euphemisms for Internet censorship in China|rivercrab]]" colloquially refers to censorship of the Internet, particularly in Asia.<ref name="RC">{{Cite web |author=Lao Wai|title=I've Been Rivercrabbed! |work=An American in Beijing|date=21 October 2007 |url=http://americaninbeijing.blogspot.com/2007/10/ive-been-rivercrabbed.html|access-date=28 May 2011 |archive-date=11 August 2011|archive-url=https://web.archive.org/web/20110811103536/http://americaninbeijing.blogspot.com/2007/10/ive-been-rivercrabbed.html|url-status=live}}</ref>


== Content suppression methods ==
== Content suppression methods ==
Line 32: Line 32:
Entities mandating and implementing the censorship usually identify them by one of the following items: keywords, [[domain name]]s and [[IP address]]es. Lists are populated from different sources, ranging from private supplier through courts to specialized government agencies ([[Ministry of Industry and Information Technology]] of China, Islamic Guidance in Iran).<ref name=":0">{{Cite web |url=https://tools.ietf.org/html/draft-irtf-pearg-censorship-00.html|title=A Survey of Worldwide Censorship Techniques|last1=Jones |first1=Ben|last2=Feamster|first2=Nick |publisher=IETF|language=en |access-date=2019-09-30|last3=Hall|first3=Joseph|last4=Adams |first4=Stan|last5=Aaron|first5=Michael |date=23 August 2019 |archive-date=19 September 2020|archive-url=https://web.archive.org/web/20200919111121/https://tools.ietf.org/html/draft-irtf-pearg-censorship-00.html |url-status=live}}</ref>
Entities mandating and implementing the censorship usually identify them by one of the following items: keywords, [[domain name]]s and [[IP address]]es. Lists are populated from different sources, ranging from private supplier through courts to specialized government agencies ([[Ministry of Industry and Information Technology]] of China, Islamic Guidance in Iran).<ref name=":0">{{Cite web |url=https://tools.ietf.org/html/draft-irtf-pearg-censorship-00.html|title=A Survey of Worldwide Censorship Techniques|last1=Jones |first1=Ben|last2=Feamster|first2=Nick |publisher=IETF|language=en |access-date=2019-09-30|last3=Hall|first3=Joseph|last4=Adams |first4=Stan|last5=Aaron|first5=Michael |date=23 August 2019 |archive-date=19 September 2020|archive-url=https://web.archive.org/web/20200919111121/https://tools.ietf.org/html/draft-irtf-pearg-censorship-00.html |url-status=live}}</ref>


As per Hoffmann, different methods are used to block certain websites or pages including [[DNS poisoning]], blocking access to [[IP address|IPs]], analyzing and [[URL|filtering URLs]], inspecting filter packets and resetting connections.<ref name="howto">{{cite web |last1=Hoffman |first1=Chris |title=How the "Great Firewall of China" Works to Censor China's Internet |url=https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/ |website=www.howtogeek.com |date=22 September 2016 |publisher=How to geek |access-date=15 August 2018 |archive-date=15 August 2018 |archive-url=https://web.archive.org/web/20180815131540/https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/ |url-status=live }}</ref>
As per Hoffmann, different methods are used to block certain websites or pages including [[DNS spoofing]], blocking access to [[IP address|IPs]], analyzing and [[URL|filtering URLs]], inspecting filter packets and resetting connections.<ref name="howto">{{cite web |last1=Hoffman |first1=Chris |title=How the "Great Firewall of China" Works to Censor China's Internet |url=https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/ |website=www.howtogeek.com |date=22 September 2016 |publisher=How to geek |access-date=15 August 2018 |archive-date=15 August 2018 |archive-url=https://web.archive.org/web/20180815131540/https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/ |url-status=live }}</ref>


==== Points of control ====
==== Points of control ====
Line 42: Line 42:
* Personal devices, whose manufacturers or vendors may be required by law to install censorship software.
* Personal devices, whose manufacturers or vendors may be required by law to install censorship software.
* Application service providers (e.g. social media companies), who may be legally required to remove particular content. Foreign providers with business presence in given country may be also coerced into restricting access to specific contents for visitors from the requesting country.
* Application service providers (e.g. social media companies), who may be legally required to remove particular content. Foreign providers with business presence in given country may be also coerced into restricting access to specific contents for visitors from the requesting country.
* [[Certificate authority|Certificate authorities]] may be required to issue counterfeit [[X.509 certificate]]s controlled by the government, allowing [[Man-in-the-middle attack|man-in-the-middle]] surveillance of [[Transport Layer Security|TLS]] encrypted connections.
* [[Certificate authority|Certificate authorities]] may be required to issue counterfeit [[X.509]] certificates controlled by the government, allowing [[Man-in-the-middle attack|man-in-the-middle]] surveillance of [[Transport Layer Security|TLS]] encrypted connections.
* [[Content delivery network|Content Delivery Network]] providers who tend to aggregate large amounts of content (e.g. images) may be also an attractive target for censorship authorities.
* [[Content delivery network|Content Delivery Network]] providers who tend to aggregate large amounts of content (e.g. images) may be also an attractive target for censorship authorities.


====Approaches====
====Approaches====
Internet content is subject to technical censorship methods, including:<ref name="NYT-20140311" /><ref name=UNESCO-2011>[http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ''Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet''] {{Webarchive|url=https://web.archive.org/web/20110928033105/http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ |date=28 September 2011 }}, Dutton, March 2003</ref>
Internet content is subject to technical censorship methods, including:<ref name="NYT-20140311" /><ref name=UNESCO-2011>[http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ''Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet''] {{Webarchive|url=https://web.archive.org/web/20110928033105/http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ |date=28 September 2011 }}, Dutton, March 2003</ref>
* '''Internet Protocol (IP) address blocking''': Access to a certain [[IP address]] is denied. If the target Web site is hosted in a [[Shared web hosting service|shared hosting server]], all websites on the same server will be blocked. This affects IP-based protocols such as [[Hypertext Transfer Protocol|HTTP]], [[File Transfer Protocol|FTP]] and [[Post Office Protocol|POP]]. A typical circumvention method is to find [[Proxy server|proxies]] that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as [[Google]] have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses{{Citation needed|date=April 2022|reason=Who extended the block? When is later? How do I know that happened?}}. Due to challenges with [[geolocation]], [[geo-blocking]] is normally implemented via IP address blocking.
* '''Internet Protocol (IP) address blocking''': Access to a certain [[IP address]] is denied. If the target Web site is hosted in a [[Shared web hosting service|shared hosting server]], all websites on the same server will be blocked. This affects IP-based protocols such as [[HTTP]], [[File Transfer Protocol|FTP]] and [[Post Office Protocol|POP]]. A typical circumvention method is to find [[Proxy server|proxies]] that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as [[Google]] have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses{{Citation needed|date=April 2022|reason=Who extended the block? When is later? How do I know that happened?}}. Due to challenges with [[geopositioning]], [[geo-blocking]] is normally implemented via IP address blocking.
* '''Domain name system (DNS) filtering and redirection''': Connections to blocked [[domain name]]s are not resolved, or an incorrect IP address is returned via [[DNS hijacking]] or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative [[DNS resolver]] that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the [[Hosts file]] or typing the IP address instead of the domain name as part of a URL given to a [[Web browser]].
* '''Domain name system (DNS) filtering and redirection''': Connections to blocked [[domain name]]s are not resolved, or an incorrect IP address is returned via [[DNS hijacking]] or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative [[Domain Name System|DNS resolver]] that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the [[hosts (file)|Hosts file]] or typing the IP address instead of the domain name as part of a URL given to a [[Web browser]].
* '''Uniform Resource Locator (URL) filtering''': [[Uniform Resource Locator|URL]] strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the [[Hypertext Transfer Protocol|HTTP]] protocol. Typical circumvention methods are to use [[percent-encoding|escaped characters]] in the URL, or to use encrypted protocols such as [[Virtual private network|VPN]] and [[Transport Layer Security|TLS/SSL]].<ref>For an example, see [[Wikipedia:Advice to users using Tor to bypass the Great Firewall]]</ref>
* '''Uniform Resource Locator (URL) filtering''': [[URL]] strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the [[HTTP]] protocol. Typical circumvention methods are to use [[percent-encoding|escaped characters]] in the URL, or to use encrypted protocols such as [[Virtual private network|VPN]] and [[Transport Layer Security|TLS/SSL]].<ref>For an example, see [[Wikipedia:Advice to users using Tor to bypass the Great Firewall]]</ref>
* '''Packet filtering''': Terminate [[Transmission Control Protocol|TCP]] [[Packet (information technology)|packet]] transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but [[Search engine results page]]s are more likely to be censored. Typical circumvention methods are to use encrypted connections – such as VPN and TLS/SSL – to escape the HTML content, or by reducing the [[Internet protocol suite|TCP/IP]] [[Protocol stack|stack]]'s [[Maximum transmission unit|MTU]]/[[Maximum segment size|MSS]] to reduce the amount of text contained in a given packet.
* '''Packet filtering''': Terminate [[Transmission Control Protocol|TCP]] [[network packet|packet]] transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but [[Search engine results page]]s are more likely to be censored. Typical circumvention methods are to use encrypted connections – such as VPN and TLS/SSL – to escape the HTML content, or by reducing the [[Internet protocol suite|TCP/IP]] [[Protocol stack|stack]]'s [[Maximum transmission unit|MTU]]/[[Maximum segment size|MSS]] to reduce the amount of text contained in a given packet.
* '''Connection reset''': If a previous [[Transmission Control Protocol|TCP]] connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is [[Routing|routed]] through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.<ref>{{cite web|author=Tom Espiner|date=July 4, 2006 |url=http://www.zdnetasia.com/news/security/0,39044215,39372326,00.htm|title=Academics break the Great Firewall of China|access-date=5 April 2015 |archive-date=8 October 2009 |archive-url=https://web.archive.org/web/20091008214629/http://www.zdnetasia.com/news/security/0,39044215,39372326,00.htm|url-status=dead|work=ZDNet}}</ref>
* '''Connection reset''': If a previous [[Transmission Control Protocol|TCP]] connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is [[Routing|routed]] through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.<ref>{{cite web|author=Tom Espiner|date=July 4, 2006 |url=http://www.zdnetasia.com/news/security/0,39044215,39372326,00.htm|title=Academics break the Great Firewall of China|access-date=5 April 2015 |archive-date=8 October 2009 |archive-url=https://web.archive.org/web/20091008214629/http://www.zdnetasia.com/news/security/0,39044215,39372326,00.htm|url-status=dead|work=ZDNet}}</ref>
* '''Network disconnection''': A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). A circumvention method could be to use a satellite ISP to access Internet.<ref>{{Cite magazine |url=https://www.wired.com/2016/04/ingenious-way-iranians-using-satellite-tv-beam-banned-data/ |title=The Ingenious Way Iranians Are Using Satellite TV to Beam in Banned Internet |last=Greenberg |first=Andy |magazine=WIRED |access-date=2018-01-25 |language=en-US |archive-date=8 November 2020 |archive-url=https://web.archive.org/web/20201108132433/http://www.wired.com/2016/04/ingenious-way-iranians-using-satellite-tv-beam-banned-data/ |url-status=live}}</ref>
* '''Network disconnection''': A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). A circumvention method could be to use a satellite ISP to access Internet.<ref>{{Cite magazine |url=https://www.wired.com/2016/04/ingenious-way-iranians-using-satellite-tv-beam-banned-data/ |title=The Ingenious Way Iranians Are Using Satellite TV to Beam in Banned Internet |last=Greenberg |first=Andy |magazine=WIRED |access-date=2018-01-25 |language=en-US |archive-date=8 November 2020 |archive-url=https://web.archive.org/web/20201108132433/http://www.wired.com/2016/04/ingenious-way-iranians-using-satellite-tv-beam-banned-data/ |url-status=live}}</ref>
* '''Portal censorship''' and '''search result removal''': Major portals, including [[search engine]]s, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect to censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove [[Neo-Nazism|Neo-Nazi]] and other listings in compliance with German and French law.<ref>[http://www.cnet.com/news/google-excluding-controversial-sites/ Google excluding controversial sites] {{Webarchive|url=https://web.archive.org/web/20201123064639/http://www.cnet.com/news/google-excluding-controversial-sites/ |date=23 November 2020 }}, Declan McCullagh, CNET News, 23 October 2002, 8:55&nbsp;pm PDT. Retrieved 22 April 2007 00:40 UTC</ref>
* '''Portal censorship''' and '''search result removal''': Major portals, including [[search engine]]s, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect to censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove [[Neo-Nazism|Neo-Nazi]] and other listings in compliance with German and French law.<ref>[http://www.cnet.com/news/google-excluding-controversial-sites/ Google excluding controversial sites] {{Webarchive|url=https://web.archive.org/web/20201123064639/http://www.cnet.com/news/google-excluding-controversial-sites/ |date=23 November 2020 }}, Declan McCullagh, CNET News, 23 October 2002, 8:55&nbsp;pm PDT. Retrieved 22 April 2007 00:40 UTC</ref>
* '''Computer network attacks''': [[Denial-of-service attack]]s and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.<ref>[http://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army"] {{Webarchive |url=https://web.archive.org/web/20200514223923/http://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army |date=14 May 2020 }}, Helmi Noman, OpenNet Initiative, May 2011</ref>
* '''Computer network attacks''': [[Denial-of-service attack]]s and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.<ref>[http://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army"] {{Webarchive |url=https://web.archive.org/web/20200514223923/http://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army |date=14 May 2020 }}, Helmi Noman, OpenNet Initiative, May 2011</ref>
* See also: [[Internet censorship circumvention]], [[Internet forum#Word censor]] and [[Anti-spam techniques#Detecting spam]]
{{See also|Internet censorship circumvention|Internet forum#Word censor|Anti-spam techniques#Detecting spam}}


====Over and under blocking====
====Over and under blocking====
Line 61: Line 61:


==== Use of commercial filtering software ====
==== Use of commercial filtering software ====
[[File:Websense blocking Facebook.png|thumb|right|Screenshot of [[Websense]] blocking Facebook in an organization where it has been configured to block a category named "Personals and Dating"]]
[[File:Websense blocking Facebook.png|thumb|right|Screenshot of [[forcepoint#Websense|Websense]] blocking Facebook in an organization where it has been configured to block a category named "Personals and Dating"]]
{{Main |Content-control software}}
{{Main |Content-control software}}


Writing in 2009 [[Ronald Deibert]], professor of political science at the [[University of Toronto]] and co-founder and one of the principal investigators of the [[OpenNet Initiative]], and, writing in 2011, Evgeny Morzov, a visiting scholar at [[Stanford University]] and an Op-Ed contributor to the ''[[New York Times]]'', explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf [[filtering software]] sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.<ref name=Chadwick2009-1>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 330–331 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref><ref>[https://www.nytimes.com/2011/09/02/opinion/political-repression-2-0.html "Political Repression 2.0"] {{Webarchive|url=https://web.archive.org/web/20201112021347/https://www.nytimes.com/2011/09/02/opinion/political-repression-2-0.html |date=12 November 2020 }}, Evgeny Morzov, Op-Ed Contributor to the ''New York Times'', 1 September 2011</ref>
Writing in 2009, [[Ronald Deibert]], professor of political science at the [[University of Toronto]] and co-founder and one of the principal investigators of the [[OpenNet Initiative]], and, writing in 2011, Evgeny Morzov, a visiting scholar at [[Stanford University]] and an op-ed contributor to ''[[The New York Times]]'', explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf [[internet filter|filtering software]] sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.<ref name=Chadwick2009-1>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 330–331 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref><ref>[https://www.nytimes.com/2011/09/02/opinion/political-repression-2-0.html "Political Repression 2.0"] {{Webarchive|url=https://web.archive.org/web/20201112021347/https://www.nytimes.com/2011/09/02/opinion/political-repression-2-0.html |date=12 November 2020 }}, Evgeny Morzov, Op-Ed Contributor to the ''New York Times'', 1 September 2011</ref>


Among the most popular filtering software programs is [[SmartFilter]] by [[Secure Computing]] in California, which was bought by [[McAfee]] in 2008. SmartFilter has been used by [[Tunisia]], Saudi Arabia, [[Sudan]], the [[UAE]], Kuwait, [[Bahrain]], Iran, and [[Oman]], as well as the United States and the UK.<ref name="guardian.co.uk">{{cite news |url=https://www.theguardian.com/commentisfree/2008/nov/17/censorship-internet |title=The big business of net censorship |last=Glanville |first=Jo |date=17 November 2008 |work=The Guardian |location=London |access-date=11 December 2016 |archive-date=28 January 2013 |archive-url=https://web.archive.org/web/20130128195629/http://www.guardian.co.uk/commentisfree/2008/nov/17/censorship-internet |url-status=live }}</ref> [[Myanmar]] and [[Yemen]] have used filtering software from [[Websense]]. The [[Canada|Canadian-made]] commercial filter Netsweeper<ref>[http://www.netsweeper.com/index.php?page=netsw_prod_content_filtering "Internet content filtering"] {{Webarchive|url=https://web.archive.org/web/20131217224810/http://www.netsweeper.com/index.php?page=netsw_prod_content_filtering |date=17 December 2013 }}, Netsweeper, Inc. web site. Retrieved 1 September 2011</ref> is used in [[Qatar]], the [[UAE]], and [[Yemen]].<ref name=Noman-2011>[http://opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011 "West Censoring East: The Use of Western Technologies by Middle East Censors, 2010–2011"] {{Webarchive|url=https://web.archive.org/web/20180918231144/http://opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011 |date=18 September 2018 }}, Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011</ref> The Canadian organization CitizenLab has reported that [[Sandvine]] and [[Procera Networks|Procera]] products are used in Turkey and Egypt.<ref>{{Cite news|url=https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/|title=BAD TRAFFIC: Sandvine's PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?|date=2018-03-09|work=The Citizen Lab|access-date=2018-05-10|language=en-US|archive-date=10 December 2020|archive-url=https://web.archive.org/web/20201210231719/https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/|url-status=live}}</ref>
Among the most popular filtering software programs is [[Secure Computing Corporation|SmartFilter]] by [[Secure Computing Corporation|Secure Computing]] in California, which was bought by [[McAfee]] in 2008. SmartFilter has been used by [[Tunisia]], Saudi Arabia, [[Sudan]], the [[United Arab Emirates|UAE]], Kuwait, [[Bahrain]], Iran, and [[Oman]], as well as the United States and the UK.<ref name="guardian.co.uk">{{cite news |url=https://www.theguardian.com/commentisfree/2008/nov/17/censorship-internet |title=The big business of net censorship |last=Glanville |first=Jo |date=17 November 2008 |work=The Guardian |location=London |access-date=11 December 2016 |archive-date=28 January 2013 |archive-url=https://web.archive.org/web/20130128195629/http://www.guardian.co.uk/commentisfree/2008/nov/17/censorship-internet |url-status=live }}</ref> [[Myanmar]] and [[Yemen]] have used filtering software from [[forcepoint#Websense|Websense]]. The [[Canada|Canadian-made]] commercial filter Netsweeper<ref>[http://www.netsweeper.com/index.php?page=netsw_prod_content_filtering "Internet content filtering"] {{Webarchive|url=https://web.archive.org/web/20131217224810/http://www.netsweeper.com/index.php?page=netsw_prod_content_filtering |date=17 December 2013 }}, Netsweeper, Inc. web site. Retrieved 1 September 2011</ref> is used in [[Qatar]], the [[United Arab Emirates|UAE]], and [[Yemen]].<ref name=Noman-2011>[http://opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011 "West Censoring East: The Use of Western Technologies by Middle East Censors, 2010–2011"] {{Webarchive|url=https://web.archive.org/web/20180918231144/http://opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011 |date=18 September 2018 }}, Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011</ref> The Canadian organization CitizenLab has reported that [[Sandvine]] and [[Procera Networks|Procera]] products are used in Turkey and Egypt.<ref>{{Cite news|url=https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/|title=BAD TRAFFIC: Sandvine's PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?|date=2018-03-09|work=The Citizen Lab|access-date=2018-05-10|language=en-US|archive-date=10 December 2020|archive-url=https://web.archive.org/web/20201210231719/https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/|url-status=live}}</ref>


On 12 March 2013 in a ''Special report on Internet Surveillance'', Reporters Without Borders named five "Corporate Enemies of the Internet": [[Amesys]] (France), [[Blue Coat Systems]] (U.S.), [[FinFisher|Gamma]] (UK and Germany), [[Hacking Team]] (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.<ref name="RSFSRS-March2013"/>
On 12 March 2013, in a ''Special Report on Internet Surveillance'', Reporters Without Borders named five "Corporate Enemies of the Internet": [[groupe Bull#Amesys controversy|Amesys]] (France), [[Blue Coat Systems]] (U.S.), [[FinFisher|Gamma]] (UK and Germany), [[HackingTeam]] (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.<ref name="RSFSRS-March2013"/>


In a U.S. lawsuit filed in May 2011, [[Cisco Systems]] is accused of helping the [[People's Republic of China|Chinese Government]] build a firewall, known widely as the [[Golden Shield]], to censor the Internet and keep tabs on dissidents.<ref>{{Cite web |url=https://www.socialstudies.org/publications/socialeducation/april2007/the-great-firewall-of-china |title=The Great Firewall of China|date=2016-05-27|website=National Council for the Social Studies |language=en|access-date=2020-03-29|archive-date=29 March 2020|archive-url=https://web.archive.org/web/20200329012734/https://www.socialstudies.org/publications/socialeducation/april2007/the-great-firewall-of-china|url-status=live}}</ref> Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned [[Falun Gong]] group.<ref>{{cite web |url=https://www.nytimes.com/2011/09/03/technology/group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china.html |title=Group Says It Has New Evidence of Cisco's Misdeeds in China |archive-date=12 November 2020 |archive-url=https://web.archive.org/web/20201112041653/https://www.nytimes.com/2011/09/03/technology/group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china.html |author=Somini Sengupta |work=The New York Times |date=2 September 2011}}</ref>
In a U.S. lawsuit filed in May 2011, [[Cisco]] is accused of helping the [[government of China|Chinese government]] build a firewall, known widely as the [[Golden Shield Project|Golden Shield]], to censor the Internet and keep tabs on dissidents.<ref>{{Cite web |url=https://www.socialstudies.org/publications/socialeducation/april2007/the-great-firewall-of-china |title=The Great Firewall of China|date=2016-05-27|website=National Council for the Social Studies |language=en|access-date=2020-03-29|archive-date=29 March 2020|archive-url=https://web.archive.org/web/20200329012734/https://www.socialstudies.org/publications/socialeducation/april2007/the-great-firewall-of-china|url-status=live}}</ref> Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned [[Falun Gong]] group.<ref>{{cite web |url=https://www.nytimes.com/2011/09/03/technology/group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china.html |title=Group Says It Has New Evidence of Cisco's Misdeeds in China |archive-date=12 November 2020 |archive-url=https://web.archive.org/web/20201112041653/https://www.nytimes.com/2011/09/03/technology/group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china.html |author=Somini Sengupta |work=The New York Times |date=2 September 2011}}</ref>


Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....<ref name=Noman-2011/> The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.<ref name=Chadwick2009-1/> The blocking of [[Dailymotion]] in early 2007 by Tunisian authorities was, according to the [[OpenNet Initiative]], due to Secure Computing wrongly categorizing Dailymotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked Dailymotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to Dailymotion was gradually restored in Tunisia.<ref>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 323–324 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref>
Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....<ref name=Noman-2011/> The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.<ref name=Chadwick2009-1/> The blocking of [[Dailymotion]] in early 2007 by Tunisian authorities was, according to the [[OpenNet Initiative]], due to Secure Computing wrongly categorizing Dailymotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked Dailymotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to Dailymotion was gradually restored in Tunisia.<ref>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| pages = 323–324 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref>


Organizations such as the [[Global Network Initiative]], the [[Electronic Frontier Foundation]], [[Amnesty International]], and the [[American Civil Liberties Union]] have successfully lobbied some vendors such as [[Websense]] to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.<ref name="riaclu">{{cite press release |publisher=ACLU |url=http://www.riaclu.org/20050418.html |archive-url=https://web.archive.org/web/20081205070114/http://www.riaclu.org/20050418.html |title=R.I. ACLU releases report on "troubling" internet censorship in public libraries |date=18 April 2005 |archive-date=5 December 2008}} {{cite report |author=((The Rhode Island affiliate, American Civil Liberties Union)) |date=April 2005 |title=Reader's block: Internet censorship in Rhode Island public libraries |url=http://www.riaclu.org/friendly/documents/2005libraryinternetreport.pdf |archive-url= https://web.archive.org/web/20050906002316/http://www.riaclu.org/friendly/documents/2005libraryinternetreport.pdf |archive-date=2005-09-06 |url-status=dead}}</ref><ref>{{cite web |url=https://www.eff.org/deeplinks/2011/11/week-internet-censorship%20|access-date=27 March 2012 |publisher=[[Electronic Frontier Foundation]] |date=7 November 2011|title=This Week in Internet Censorship Egypt Imprisons Alaa, Other Pro-democracy Bloggers |first1=Maira |last1=Sutton|first2=Trevor|last2=Timm |archive-url=https://web.archive.org/web/20200812105306/https://www.eff.org/deeplinks/2011/11/week-internet-censorship%20|archive-date=12 August 2020|url-status=live}}</ref><ref name="amnesty china">[https://www.amnesty.org/en/documents/asa17/001/2004/en/ China: Controls tighten as Internet activism grows] {{Webarchive |url=https://web.archive.org/web/20200925141537/https://www.amnesty.org/en/documents/asa17/001/2004/en/ |date=25 September 2020 }} "[[Cisco Systems]], [[Microsoft]], [[Nortel Networks]], Websense and [[Sun Microsystems]]", citing Amnesty International: People's Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002.</ref> Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.<ref name=Noman-2011/>
Organizations such as the [[Global Network Initiative]], the [[Electronic Frontier Foundation]], [[Amnesty International]], and the [[American Civil Liberties Union]] have successfully lobbied some vendors such as [[forcepoint#Websense|Websense]] to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.<ref name="riaclu">{{cite press release |publisher=ACLU |url=http://www.riaclu.org/20050418.html |archive-url=https://web.archive.org/web/20081205070114/http://www.riaclu.org/20050418.html |title=R.I. ACLU releases report on "troubling" internet censorship in public libraries |date=18 April 2005 |archive-date=5 December 2008}} {{cite report |author=((The Rhode Island affiliate, American Civil Liberties Union)) |date=April 2005 |title=Reader's block: Internet censorship in Rhode Island public libraries |url=http://www.riaclu.org/friendly/documents/2005libraryinternetreport.pdf |archive-url= https://web.archive.org/web/20050906002316/http://www.riaclu.org/friendly/documents/2005libraryinternetreport.pdf |archive-date=2005-09-06 |url-status=dead}}</ref><ref>{{cite web |url=https://www.eff.org/deeplinks/2011/11/week-internet-censorship%20|access-date=27 March 2012 |publisher=[[Electronic Frontier Foundation]] |date=7 November 2011|title=This Week in Internet Censorship Egypt Imprisons Alaa, Other Pro-democracy Bloggers |first1=Maira |last1=Sutton|first2=Trevor|last2=Timm |archive-url=https://web.archive.org/web/20200812105306/https://www.eff.org/deeplinks/2011/11/week-internet-censorship%20|archive-date=12 August 2020|url-status=live}}</ref><ref name="amnesty china">[https://www.amnesty.org/en/documents/asa17/001/2004/en/ China: Controls tighten as Internet activism grows] {{Webarchive |url=https://web.archive.org/web/20200925141537/https://www.amnesty.org/en/documents/asa17/001/2004/en/ |date=25 September 2020 }} "[[Cisco Systems]], [[Microsoft]], [[Nortel Networks]], Websense and [[Sun Microsystems]]", citing Amnesty International: People's Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002.</ref> Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.<ref name=Noman-2011/>


===Non-technical censorship===
===Non-technical censorship===
Line 83: Line 83:
* Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
* Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
* Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
* Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
* Publishers and authors may accept [[bribe]]s to include, withdraw, or slant the information they present.
* Publishers and authors may accept [[bribery|bribe]]s to include, withdraw, or slant the information they present.
* Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
* Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
* Publishers, authors, and ISPs may be subject to [[civil lawsuit]]s.
* Publishers, authors, and ISPs may be subject to [[lawsuit|civil lawsuit]]s.
* Equipment may be [[confiscation|confiscated]] and/or destroyed.
* Equipment may be [[confiscation|confiscated]] and/or destroyed.
* Publishers and ISPs may be closed or required licenses may be withheld or revoked.
* Publishers and ISPs may be closed or required licenses may be withheld or revoked.
Line 100: Line 100:
====Removal of user accounts based on controversial content====
====Removal of user accounts based on controversial content====
{{Main|Deplatforming}}
{{Main|Deplatforming}}
[[Deplatforming]] is a form of Internet censorship in which controversial speakers or speech are suspended, banned, or otherwise shut down by [[social media]] platforms and other service providers that generally provide a venue for free speech or expression.<ref name=Reynolds/> Banking and financial service providers, among other companies, have also denied services to controversial activists or organizations, a practice known as "[[financial deplatforming]]".
[[Deplatforming]] is a form of Internet censorship in which controversial speakers or speech are suspended, banned, or otherwise shut down by [[social media]] platforms and other service providers that generally provide a venue for free speech or expression.<ref name=Reynolds/> Banking and financial service providers, among other companies, have also denied services to controversial activists or organizations, a practice known as "[[deplatforming|financial deplatforming]]".


Law professor [[Glenn Reynolds]] dubbed 2018 the "Year of Deplatforming", in an August 2018 article in ''[[The Wall Street Journal]]''.<ref name=Reynolds/> According to Reynolds, in 2018 "the internet giants decided to slam the gates on a number of people and ideas they don't like."<ref name=Reynolds>{{cite news |title=When Digital Platforms Become Censors |first=Glenn Harlan |last=Reynolds |date=18 August 2018 |newspaper=The Wall Street Journal |url=https://www.wsj.com/articles/when-digital-platforms-become-censors-1534514122?mod=rsswn |url-status=live |archive-url=https://web.archive.org/web/20190330045941/https://www.wsj.com/articles/when-digital-platforms-become-censors-1534514122?mod=rsswn |archive-date=2019-03-30 }}</ref> On 6 August 2018, for example, several major platforms, including [[YouTube]] and [[Facebook]], executed a coordinated, permanent ban on all accounts and media associated with conservative talk show host [[Alex Jones]] and his media platform [[InfoWars]], citing "[[hate speech]]" and "glorifying violence."<ref name=NPR>{{cite news |first1=Bill |last1=Chappell |first2=Anastasia |last2=Tsioulcas |website=NPR |title=YouTube, Apple and Facebook Ban Infowars, Which Decries 'Mega Purge' |date=6 August 2018 |url=https://www.npr.org/2018/08/06/636030043/youtube-apple-and-facebook-ban-infowars-which-decries-mega-purge |access-date=2 September 2018 |archive-date=3 May 2019 |archive-url=https://web.archive.org/web/20190503221538/https://www.npr.org/2018/08/06/636030043/youtube-apple-and-facebook-ban-infowars-which-decries-mega-purge |url-status=live }}</ref>
Law professor [[Glenn Reynolds]] dubbed 2018 the "Year of Deplatforming", in an August 2018 article in ''[[The Wall Street Journal]]''.<ref name=Reynolds/> According to Reynolds, in 2018 "the internet giants decided to slam the gates on a number of people and ideas they don't like."<ref name=Reynolds>{{cite news |title=When Digital Platforms Become Censors |first=Glenn Harlan |last=Reynolds |date=18 August 2018 |newspaper=The Wall Street Journal |url=https://www.wsj.com/articles/when-digital-platforms-become-censors-1534514122?mod=rsswn |url-status=live |archive-url=https://web.archive.org/web/20190330045941/https://www.wsj.com/articles/when-digital-platforms-become-censors-1534514122?mod=rsswn |archive-date=2019-03-30 }}</ref> On 6 August 2018, for example, several major platforms, including [[YouTube]] and [[Facebook]], executed a coordinated, permanent ban on all accounts and media associated with conservative talk show host [[Alex Jones]] and his media platform [[InfoWars]], citing "[[hate speech]]" and "glorifying violence."<ref name=NPR>{{cite news |first1=Bill |last1=Chappell |first2=Anastasia |last2=Tsioulcas |website=NPR |title=YouTube, Apple and Facebook Ban Infowars, Which Decries 'Mega Purge' |date=6 August 2018 |url=https://www.npr.org/2018/08/06/636030043/youtube-apple-and-facebook-ban-infowars-which-decries-mega-purge |access-date=2 September 2018 |archive-date=3 May 2019 |archive-url=https://web.archive.org/web/20190503221538/https://www.npr.org/2018/08/06/636030043/youtube-apple-and-facebook-ban-infowars-which-decries-mega-purge |url-status=live }}</ref>


====Official statements regarding site and content removal====
====Official statements regarding site and content removal====
{{See also|Twitter suspensions|Terms of Service}}
{{See also|Twitter suspensions|Terms of service}}
Most major web service operators reserve to themselves broad rights to remove or pre-screen content, and to suspend or terminate user accounts, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in [[Terms of Service]] agreements.
Most major web service operators reserve to themselves broad rights to remove or pre-screen content, and to suspend or terminate user accounts, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in [[Terms of service]] agreements.
* [[Facebook]]: Among other things, the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".<ref>[https://www.facebook.com/terms.php "Statement of Rights and Responsibilities"] {{Webarchive|url=https://web.archive.org/web/20181226015301/https://www.facebook.com/legal/terms |date=26 December 2018 }}, Facebook, 26 April 2011. Retrieved 18 August 2011</ref>
* [[Facebook]]: Among other things, the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".<ref>[https://www.facebook.com/terms.php "Statement of Rights and Responsibilities"] {{Webarchive|url=https://web.archive.org/web/20181226015301/https://www.facebook.com/legal/terms |date=26 December 2018 }}, Facebook, 26 April 2011. Retrieved 18 August 2011</ref>
* [[Criticism of Google#China|Google]]: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. [[Digital Millennium Copyright Act]]".<ref>[http://www.google.com/intl/en/policies/terms/ "Google Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20201215063934/http://www.google.com/intl/en/policies/terms/ |date=15 December 2020 }}, Policies & Principles, Google, Inc.. Retrieved 1 April 2012</ref>
* [[Criticism of Google#China|Google]]: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. [[Digital Millennium Copyright Act]]".<ref>[http://www.google.com/intl/en/policies/terms/ "Google Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20201215063934/http://www.google.com/intl/en/policies/terms/ |date=15 December 2020 }}, Policies & Principles, Google, Inc.. Retrieved 1 April 2012</ref>
Line 112: Line 112:
* [[Twitter]]: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be copyright infringing without prior notice and at our sole discretion".<ref>[https://twitter.com/tos "Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20201215170628/https://twitter.com/Tos |date=15 December 2020 }}, Twitter, 1 June 2011. Retrieved 18 August 2011</ref>
* [[Twitter]]: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be copyright infringing without prior notice and at our sole discretion".<ref>[https://twitter.com/tos "Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20201215170628/https://twitter.com/Tos |date=15 December 2020 }}, Twitter, 1 June 2011. Retrieved 18 August 2011</ref>
* [[YouTube]]: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".<ref>[https://www.youtube.com/static?gl=US&template=terms "Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20161226062628/https://www.youtube.com/static?gl=US&template=terms |date=26 December 2016 }}, YouTube, 9 June 2010. Retrieved 18 August 2011</ref>
* [[YouTube]]: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".<ref>[https://www.youtube.com/static?gl=US&template=terms "Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20161226062628/https://www.youtube.com/static?gl=US&template=terms |date=26 December 2016 }}, YouTube, 9 June 2010. Retrieved 18 August 2011</ref>
* [[Wikipedia]]<span class="anchor" id="Wikipedia"></span>: The site's content may be modified or [[Deletion of articles on Wikipedia|deleted]] by any editor as part of the normal process of editing and updating articles. Wikipedia's deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in the encyclopedia can propose its deletion. Such a page can be deleted by any [[Wikipedia administrators|administrator]] if, after seven days, no one objects to the [[proposed deletion]]. [[Speedy deletion]] allows for outright deletion of articles that are so clearly in violation of rules of the website that they do not need to undergo a [[Articles for deletion|full deletion discussion]]. All deletion decisions may be [[Deletion review|reviewed]], either informally or formally. An additional means of hiding specific content within Wikipedia articles is revision deletion, or RevDel, by which an administrator can perform [[Sanitization (classified information)|sanitization/redaction]] of specific revisions of an article, thereby hiding certain information from the view of non-administrators.<ref>{{cite book | first1=Andrew Granville | last1=West | first2=Insup | last2=Lee | chapter=What Wikipedia deletes: Characterizing dangerous collaborative content | chapter-url= https://www.researchgate.net/publication/221367712 | title=Proceedings of the 7th International Symposium on Wikis and Open Collaboration | date=October 2011 | pages=25–28 | doi= 10.1145/2038558.2038563| isbn=978-1-4503-0909-7 | s2cid=10396423 }}</ref><ref name="Jemielniak">{{cite book | last=Jemielniak | first=Dariusz | title=Common Knowledge?: An Ethnography of Wikipedia | year=2014 | publisher=Stanford University Press}}</ref>{{rp|216}}
* [[Wikipedia]]<span class="anchor" id="Wikipedia"></span>: The site's content may be modified or [[Deletion of articles on Wikipedia|deleted]] by any editor as part of the normal process of editing and updating articles. Wikipedia's deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in the encyclopedia can propose its deletion. Such a page can be deleted by any [[Wikipedia administrators|administrator]] if, after seven days, no one objects to the [[deletion of articles on Wikipedia#Proposed deletion|proposed deletion]]. [[deletion of articles on Wikipedia#Speedy deletion|Speedy deletion]] allows for outright deletion of articles that are so clearly in violation of rules of the website that they do not need to undergo a [[deletion of articles on Wikipedia#Articles for deletion|full deletion discussion]]. All deletion decisions may be [[deletion of articles on Wikipedia#Deletion review and undeletion|reviewed]], either informally or formally. An additional means of hiding specific content within Wikipedia articles is revision deletion, or RevDel, by which an administrator can perform [[redaction|sanitization/redaction]] of specific revisions of an article, thereby hiding certain information from the view of non-administrators.<ref>{{cite book | first1=Andrew Granville | last1=West | first2=Insup | last2=Lee | chapter=What Wikipedia deletes: Characterizing dangerous collaborative content | chapter-url= https://www.researchgate.net/publication/221367712 | title=Proceedings of the 7th International Symposium on Wikis and Open Collaboration | date=October 2011 | pages=25–28 | doi= 10.1145/2038558.2038563| isbn=978-1-4503-0909-7 | s2cid=10396423 }}</ref><ref name="Jemielniak">{{cite book | last=Jemielniak | first=Dariusz | title=Common Knowledge?: An Ethnography of Wikipedia | year=2014 | publisher=Stanford University Press}}</ref>{{rp|216}}
* [[Yahoo!]]: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."<ref>[http://info.yahoo.com/legal/us/yahoo/utos/utos-173.html "Yahoo! Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20140718103831/https://info.yahoo.com/legal/us/yahoo/utos/utos-173.html |date=18 July 2014 }}, Yahoo!, 24 November 2008. Retrieved 18 August 2011</ref>
* [[Yahoo]]: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."<ref>[http://info.yahoo.com/legal/us/yahoo/utos/utos-173.html "Yahoo! Terms of Service"] {{Webarchive|url=https://web.archive.org/web/20140718103831/https://info.yahoo.com/legal/us/yahoo/utos/utos-173.html |date=18 July 2014 }}, Yahoo!, 24 November 2008. Retrieved 18 August 2011</ref>


==Circumvention==
==Circumvention==
Line 120: Line 120:
Internet censorship circumvention is one of the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.<ref name=UNESCO-2011/>
Internet censorship circumvention is one of the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.<ref name=UNESCO-2011/>


Different techniques and resources are used to bypass Internet censorship, including [[Proxy server|proxy websites]], [[virtual private network]]s, [[sneakernet]]s, the [[dark web]] and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to [[GlobalWebIndex]], over 400 million people use virtual private networks to circumvent censorship or for an increased level of privacy.<ref name="Guardian 5 December 2014"/> The majority of circumvention techniques are not suitable for day to day use.<ref>Roberts, H., Zuckerman, E., & Palfrey, J. (2009, March). 2007 Circumvention Landscape Report: Methods, Uses, and Tools (Rep.). Retrieved 18 March 2016, from The Berkman Center for Internet & Society at Harvard University.
Different techniques and resources are used to bypass Internet censorship, including [[Proxy server|proxy websites]], [[virtual private network]]s, [[sneakernet]]s, the [[dark web]] and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to [[GWI (company)|GlobalWebIndex]], over 400&nbsp;million people use virtual private networks to circumvent censorship or for an increased level of privacy.<ref name="Guardian 5 December 2014"/> The majority of circumvention techniques are not suitable for day to day use.<ref>Roberts, H., Zuckerman, E., & Palfrey, J. (2009, March). 2007 Circumvention Landscape Report: Methods, Uses, and Tools (Rep.). Retrieved 18 March 2016, from The Berkman Center for Internet & Society at Harvard University.
</ref>
</ref>


There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries, individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.<ref name="NYT-20140311" /><ref>[http://en.cship.org/wiki/Risks "Risks"] {{Webarchive|url=https://web.archive.org/web/20110908041315/http://en.cship.org/wiki/Risks |date=8 September 2011 }}, ''Internet censorship wiki''. Retrieved 2 September 2011</ref>
There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries, individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.<ref name="NYT-20140311" /><ref>[http://en.cship.org/wiki/Risks "Risks"] {{Webarchive|url=https://web.archive.org/web/20110908041315/http://en.cship.org/wiki/Risks |date=8 September 2011 }}, ''Internet censorship wiki''. Retrieved 2 September 2011</ref>


In June 2011 the ''New York Times'' reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."<ref>[https://www.nytimes.com/2011/06/12/world/12internet.html?pagewanted=all "U.S. Underwrites Internet Detour Around Censors"] {{Webarchive|url=https://web.archive.org/web/20201111175637/http://www.nytimes.com/2011/06/12/world/12internet.html?pagewanted=all |date=11 November 2020 }}, James Glanz and John Markoff, ''The New York Times'', 12 June 2011</ref>
In June 2011, ''The New York Times'' reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."<ref>[https://www.nytimes.com/2011/06/12/world/12internet.html?pagewanted=all "U.S. Underwrites Internet Detour Around Censors"] {{Webarchive|url=https://web.archive.org/web/20201111175637/http://www.nytimes.com/2011/06/12/world/12internet.html?pagewanted=all |date=11 November 2020 }}, James Glanz and John Markoff, ''The New York Times'', 12 June 2011</ref>


Another way to circumvent Internet censorship is to physically go to an area where the Internet is not censored. In 2017 a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where the Internet is regularly blocked.<ref>{{Cite web |url=https://qz.com/africa/942879/an-internet-shutdown-in-cameroon-has-forced-startups-to-create-an-internet-refugee-camp-in-bonako-village/|title=Reeling from an internet shutdown, startups in Cameroon have created an "internet refugee camp"|first=Abdi Latif|last=Dahir|website=Quartz Africa|date=28 March 2017 |access-date=30 January 2020|archive-date=12 November 2020|archive-url=https://web.archive.org/web/20201112015837/https://qz.com/africa/942879/an-internet-shutdown-in-cameroon-has-forced-startups-to-create-an-internet-refugee-camp-in-bonako-village/|url-status=live}}</ref><ref>{{Cite web|url=https://www.aljazeera.com/news/2018/01/cameroon-internet-shutdowns-cost-anglophones-millions-180123202824701.html|title=Cameroon internet shutdowns cost Anglophones millions |website=Al Jazeera |date=26 Jan 2018 |first1=Yarno |last1=Ritzen |access-date=30 January 2020|archive-date=22 September 2020|archive-url=https://web.archive.org/web/20200922042211/https://www.aljazeera.com/news/2018/01/cameroon-internet-shutdowns-cost-anglophones-millions-180123202824701.html|url-status=live}}</ref>
Another way to circumvent Internet censorship is to physically go to an area where the Internet is not censored. In 2017, a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where the Internet is regularly blocked.<ref>{{Cite web |url=https://qz.com/africa/942879/an-internet-shutdown-in-cameroon-has-forced-startups-to-create-an-internet-refugee-camp-in-bonako-village/|title=Reeling from an internet shutdown, startups in Cameroon have created an "internet refugee camp"|first=Abdi Latif|last=Dahir|website=Quartz Africa|date=28 March 2017 |access-date=30 January 2020|archive-date=12 November 2020|archive-url=https://web.archive.org/web/20201112015837/https://qz.com/africa/942879/an-internet-shutdown-in-cameroon-has-forced-startups-to-create-an-internet-refugee-camp-in-bonako-village/|url-status=live}}</ref><ref>{{Cite web|url=https://www.aljazeera.com/news/2018/01/cameroon-internet-shutdowns-cost-anglophones-millions-180123202824701.html|title=Cameroon internet shutdowns cost Anglophones millions |website=Al Jazeera |date=26 Jan 2018 |first1=Yarno |last1=Ritzen |access-date=30 January 2020|archive-date=22 September 2020|archive-url=https://web.archive.org/web/20200922042211/https://www.aljazeera.com/news/2018/01/cameroon-internet-shutdowns-cost-anglophones-millions-180123202824701.html|url-status=live}}</ref>


=== Increased use of HTTPS ===
=== Increased use of HTTPS ===
The use of [[HTTPS]] versus what originally was [[Hypertext Transfer Protocol|HTTP]] in web searches created greater accessibility to most sites originally blocked or heavily monitored. Many social media sites including, Facebook, Google, and Twitter have added an automatic redirection to HTTPS as of 2017.<ref name="Connolly">{{Cite web|url=https://thenextweb.com/media/2016/01/27/medium-stands-by-investigative-journalists-as-malaysia-blocks-the-site/|title=Medium stands by journalists as Malaysia blocks the site|last=Connolly|first=Amanda|date=2016-01-27|website=The Next Web|language=en-us|access-date=2020-04-26|archive-date=29 November 2020|archive-url=https://web.archive.org/web/20201129195843/https://thenextweb.com/media/2016/01/27/medium-stands-by-investigative-journalists-as-malaysia-blocks-the-site/|url-status=live}}</ref> With the added adoption of HTTPS use, "censors" are left with limited options of either completely blocking all content or none of it.<ref name=":02">{{Cite web |url=https://dash.harvard.edu/bitstream/handle/1/33084425/The%20Shifting%20Landscape%20of%20Global%20Internet%20Censorship-%20Internet%20Monitor%202017.pdf|title=The Shifting Landscape of Global Internet Censorship|last1=Zittrain |last2=Faris |last3=Noman |last4=Clark |last5=Tilton |last6=Morrison-Westphal |first1=Jonathan |first2=Robert |first3=Helmi |first4=Justin |first5=Casey |first6=Ryan |date=June 2017 |website=Dash.Harvard.Edu|url-status=live|archive-url=https://web.archive.org/web/20181206170555/https://dash.harvard.edu/bitstream/handle/1/33084425/The%20Shifting%20Landscape%20of%20Global%20Internet%20Censorship-%20Internet%20Monitor%202017.pdf|archive-date=6 December 2018|access-date=25 April 2020}}</ref>
The use of [[HTTPS]] versus what originally was [[HTTP]] in web searches created greater accessibility to most sites originally blocked or heavily monitored. Many social media sites including, Facebook, Google, and Twitter have added an automatic redirection to HTTPS as of 2017.<ref name="Connolly">{{Cite web|url=https://thenextweb.com/media/2016/01/27/medium-stands-by-investigative-journalists-as-malaysia-blocks-the-site/|title=Medium stands by journalists as Malaysia blocks the site|last=Connolly|first=Amanda|date=2016-01-27|website=The Next Web|language=en-us|access-date=2020-04-26|archive-date=29 November 2020|archive-url=https://web.archive.org/web/20201129195843/https://thenextweb.com/media/2016/01/27/medium-stands-by-investigative-journalists-as-malaysia-blocks-the-site/|url-status=live}}</ref> With the added adoption of HTTPS use, "censors" are left with limited options of either completely blocking all content or none of it.<ref name=":02">{{Cite web |url=https://dash.harvard.edu/bitstream/handle/1/33084425/The%20Shifting%20Landscape%20of%20Global%20Internet%20Censorship-%20Internet%20Monitor%202017.pdf|title=The Shifting Landscape of Global Internet Censorship|last1=Zittrain |last2=Faris |last3=Noman |last4=Clark |last5=Tilton |last6=Morrison-Westphal |first1=Jonathan |first2=Robert |first3=Helmi |first4=Justin |first5=Casey |first6=Ryan |date=June 2017 |website=Dash.Harvard.Edu|url-status=live|archive-url=https://web.archive.org/web/20181206170555/https://dash.harvard.edu/bitstream/handle/1/33084425/The%20Shifting%20Landscape%20of%20Global%20Internet%20Censorship-%20Internet%20Monitor%202017.pdf|archive-date=6 December 2018|access-date=25 April 2020}}</ref>


The use of [[HTTPS]] does not inherently prevent the censorship of an entire domain, as the domain name is left unencrypted in the ClientHello of the [[Transport Layer Security|TLS]] handshake. The [[Server Name Indication#Encrypted Client Hello|Encrypted Client Hello]] TLS extension expands on HTTPS and encrypts the entire ClientHello but this depends on both client and server support.<ref>{{Cite web|date=24 September 2018|title=Encrypting SNI: Fixing One of the Core Internet Bugs |url=https://blog.cloudflare.com/esni/|access-date=22 August 2020|website=The Cloudflare Blog|language=en |archive-date=12 December 2020|archive-url=https://web.archive.org/web/20201212025956/https://blog.cloudflare.com/esni/|url-status=live}}</ref><ref>{{Cite web|last1=Oku|first1=Kazuho |last2=Wood|first2=Christopher|last3=Rescorla |first3=Eric |last4=Sullivan|first4=Nick |title=Encrypted Server Name Indication for TLS 1.3 |publisher=IETF |date=June 2020 |url=https://tools.ietf.org/html/draft-ietf-tls-esni-07.html|access-date=22 August 2020 |language=en |archive-date=16 July 2020|archive-url=https://web.archive.org/web/20200716061945/https://tools.ietf.org/html/draft-ietf-tls-esni-07.html |url-status=live}}</ref>
The use of [[HTTPS]] does not inherently prevent the censorship of an entire domain, as the domain name is left unencrypted in the ClientHello of the [[Transport Layer Security|TLS]] handshake. The [[Server Name Indication#Encrypted Client Hello|Encrypted Client Hello]] TLS extension expands on HTTPS and encrypts the entire ClientHello but this depends on both client and server support.<ref>{{Cite web|date=24 September 2018|title=Encrypting SNI: Fixing One of the Core Internet Bugs |url=https://blog.cloudflare.com/esni/|access-date=22 August 2020|website=The Cloudflare Blog|language=en |archive-date=12 December 2020|archive-url=https://web.archive.org/web/20201212025956/https://blog.cloudflare.com/esni/|url-status=live}}</ref><ref>{{Cite web|last1=Oku|first1=Kazuho |last2=Wood|first2=Christopher|last3=Rescorla |first3=Eric |last4=Sullivan|first4=Nick |title=Encrypted Server Name Indication for TLS 1.3 |publisher=IETF |date=June 2020 |url=https://tools.ietf.org/html/draft-ietf-tls-esni-07.html|access-date=22 August 2020 |language=en |archive-date=16 July 2020|archive-url=https://web.archive.org/web/20200716061945/https://tools.ietf.org/html/draft-ietf-tls-esni-07.html |url-status=live}}</ref>
Line 143: Line 143:
* Political blogs and websites<ref>{{cite web |url=http://www.news.com/Blog-censorship-gains-support/2100-1028_3-5670096.html |archive-url=https://archive.today/20120529125713/http://www.news.com/Blog-censorship-gains-support/2100-1028_3-5670096.html |url-status=dead |archive-date=29 May 2012 |title=Blog censorship gains support |work=CNET |access-date=5 April 2015 }}</ref>
* Political blogs and websites<ref>{{cite web |url=http://www.news.com/Blog-censorship-gains-support/2100-1028_3-5670096.html |archive-url=https://archive.today/20120529125713/http://www.news.com/Blog-censorship-gains-support/2100-1028_3-5670096.html |url-status=dead |archive-date=29 May 2012 |title=Blog censorship gains support |work=CNET |access-date=5 April 2015 }}</ref>
* ''[[Lèse-majesté]]'' sites, sites with content that offends the dignity of or challenges the authority of a reigning [[Sovereignty|sovereign]] or of a [[Sovereign state|state]]
* ''[[Lèse-majesté]]'' sites, sites with content that offends the dignity of or challenges the authority of a reigning [[Sovereignty|sovereign]] or of a [[Sovereign state|state]]
* [[Falun Gong]] and [[Tibetan exile]] group sites in [[Internet censorship in the People's Republic of China|China]] or [[Buddhist]], [[Cao Dai]] faith, and indigenous [[Hill tribes#South-East Asia|hill tribes]] sites in [[Internet censorship in Vietnam|Vietnam]]
* [[Falun Gong]] and [[tibetan diaspora|Tibetan exile]] group sites in [[Internet censorship in China|China]] or [[buddhism|Buddhist]], [[caodaism|Cao Dai]] faith, and indigenous [[Hill people|hill tribes]] sites in [[Internet censorship in Vietnam|Vietnam]]
* [[50 Cent Party]], or "50 Cent Army" that worked to sway negative public opinion on the [[Chinese Communist Party]]<ref>{{Cite web|url=http://feer.com:80/essays/2008/august/chinas-guerrilla-war-for-the-web|archive-url=https://web.archive.org/web/20090225113222/http://feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web|url-status=dead|archive-date=25 February 2009|title=Far Eastern Economic Review {{!}} China's Guerrilla War for the Web|date=2009-02-25|access-date=2020-04-25}}</ref>
* [[50 Cent Party]], or "50 Cent Army" that worked to sway negative public opinion on the [[Chinese Communist Party]]<ref>{{Cite web|url=http://feer.com:80/essays/2008/august/chinas-guerrilla-war-for-the-web|archive-url=https://web.archive.org/web/20090225113222/http://feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web|url-status=dead|archive-date=25 February 2009|title=Far Eastern Economic Review {{!}} China's Guerrilla War for the Web|date=2009-02-25|access-date=2020-04-25}}</ref>
* [[Russian web brigades]]
* [[Russian web brigades]]
Line 150: Line 150:
* Sites that comment on political parties that oppose the current government of a country<ref name=time20151123/>
* Sites that comment on political parties that oppose the current government of a country<ref name=time20151123/>
* Sites that accuse authorities of corruption<ref name=time20151123/>
* Sites that accuse authorities of corruption<ref name=time20151123/>
* Sites that comment on minorities or [[LGBTQ+]] issues<ref name=time20151123/>
* Sites that comment on minorities or [[LGBTQ]] issues<ref name=time20151123/>
* [[Communist]] symbols and imagery in [[Poland]], [[Lithuania]], [[Ukraine]], [[Georgia (country)|Georgia]], [[Latvia]], [[Moldova]], [[Hungary]], and [[Indonesia]]
* [[Communist]] symbols and imagery in [[Poland]], [[Lithuania]], [[Ukraine]], [[Georgia (country)|Georgia]], [[Latvia]], [[Moldova]], [[Hungary]], and [[Indonesia]]
* [[Neo-Nazism|Neo-Nazi]] and similar websites, particularly in [[Internet censorship in France|France]] and [[Internet censorship in Germany|Germany]]<ref>{{cite news |url=http://www.theaustralian.news.com.au/story/0,25197,22885402-12335,00.html |title=Latest Stories From News.Com.Au |access-date=8 December 2007 |archive-url=https://web.archive.org/web/20081211175806/http://www.theaustralian.news.com.au/story/0,25197,22885402-12335,00.html |archive-date=11 December 2008 |url-status=dead }}</ref>
* [[Neo-Nazism|Neo-Nazi]] and similar websites, particularly in [[Internet censorship in France|France]] and [[Internet censorship in Germany|Germany]]<ref>{{cite news |url=http://www.theaustralian.news.com.au/story/0,25197,22885402-12335,00.html |title=Latest Stories From News.Com.Au |access-date=8 December 2007 |archive-url=https://web.archive.org/web/20081211175806/http://www.theaustralian.news.com.au/story/0,25197,22885402-12335,00.html |archive-date=11 December 2008 |url-status=dead }}</ref>
Line 160: Line 160:
* Sites that include [[hate speech]] inciting [[racism]], [[sexism]], [[homophobia]], or other forms of bigotry
* Sites that include [[hate speech]] inciting [[racism]], [[sexism]], [[homophobia]], or other forms of bigotry
* Sites seen as promoting [[Substance abuse|illegal drug use]] (such as [[Erowid]])<ref>[http://www.thefix.com/content/russia-blacklists-drug-wikipedia-erowid91343 Russia Bans the Wikipedia of Drugs] {{Webarchive|url=https://web.archive.org/web/20201111213509/http://www.thefix.com/content/russia-blacklists-drug-wikipedia-erowid91343 |date=11 November 2020 }} The Fix 2013-02-28</ref>
* Sites seen as promoting [[Substance abuse|illegal drug use]] (such as [[Erowid]])<ref>[http://www.thefix.com/content/russia-blacklists-drug-wikipedia-erowid91343 Russia Bans the Wikipedia of Drugs] {{Webarchive|url=https://web.archive.org/web/20201111213509/http://www.thefix.com/content/russia-blacklists-drug-wikipedia-erowid91343 |date=11 November 2020 }} The Fix 2013-02-28</ref>
* [[Eroticism|Sex and erotic]], [[fetishism]], prostitution, and [[Anti-pornography movement|pornographic]] sites
* [[Eroticism|Sex and erotic]], [[fetishism]], prostitution, and [[pornography|pornographic]] sites
* [[Child pornography]] and [[pedophile]] related sites (see also [[CIRCAMP]])
* [[Child pornography]] and [[pedophilia|pedophile]]-related sites (see also [[CIRCAMP]])
* Gambling sites
* Gambling sites
* Sites encouraging or inciting violence<ref name="time20151123">{{cite magazine |date=2015-11-23 |title=Which Countries Censor the Internet? |url=https://time.com/4109882/which-countries-censor-the-internet/ |url-status=live |magazine=[[Time Magazine]] |page=36 |archive-url=https://web.archive.org/web/20151112231055/https://time.com/4109882/which-countries-censor-the-internet/ |archive-date=2015-11-12 |access-date=2023-08-05 |url-access=subscription}}</ref>
* Sites encouraging or inciting violence<ref name="time20151123">{{cite magazine |date=2015-11-23 |title=Which Countries Censor the Internet? |url=https://time.com/4109882/which-countries-censor-the-internet/ |url-status=live |magazine=[[Time Magazine]] |page=36 |archive-url=https://web.archive.org/web/20151112231055/https://time.com/4109882/which-countries-censor-the-internet/ |archive-date=2015-11-12 |access-date=2023-08-05 |url-access=subscription}}</ref>
Line 176: Line 176:


Examples include:
Examples include:
* [[North Korean websites banned in South Korea|Blocking of pro–North Korean sites by South Korea]]<ref>[http://opennet.net/bulletins/009/ "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites"] {{Webarchive|url=https://web.archive.org/web/20201209213747/http://opennet.net/bulletins/009/ |date=9 December 2020 }}, OpenNet Initiative: Bulletin 009, 31 January 2005</ref>
* [[list of North Korean websites banned in South Korea|Blocking of pro–North Korean sites by South Korea]]<ref>[http://opennet.net/bulletins/009/ "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites"] {{Webarchive|url=https://web.archive.org/web/20201209213747/http://opennet.net/bulletins/009/ |date=9 December 2020 }}, OpenNet Initiative: Bulletin 009, 31 January 2005</ref>
* Blocking of sites of groups that foment domestic conflict in [[Internet censorship in India|India]]<ref name="Faris-2008" />
* Blocking of sites of groups that foment domestic conflict in [[Internet censorship in India|India]]<ref name="Faris-2008" />
* Blocking of sites of the [[Muslim Brotherhood]] in some countries in the Middle East
* Blocking of sites of the [[Muslim Brotherhood]] in some countries in the Middle East
* Blocking of sites such as [[4chan]] thought to be related to the internet hacker group [[Anonymous (group)|Anonymous]]<ref>[https://www.washingtonpost.com/politics/federal-authorities-take-on-anonymous-hackers/2011/09/11/gIQAYrhgMK_story.html "Federal authorities take on Anonymous hackers"] {{Webarchive|url=https://web.archive.org/web/20201209213950/https://www.washingtonpost.com/politics/federal-authorities-take-on-anonymous-hackers/2011/09/11/gIQAYrhgMK_story.html |date=9 December 2020 }}, Associated Press in the Washington Post, 12 September 2011</ref>
* Blocking of sites such as [[4chan]] thought to be related to the internet hacker group [[Anonymous ( hacker group)|Anonymous]]<ref>[https://www.washingtonpost.com/politics/federal-authorities-take-on-anonymous-hackers/2011/09/11/gIQAYrhgMK_story.html "Federal authorities take on Anonymous hackers"] {{Webarchive|url=https://web.archive.org/web/20201209213950/https://www.washingtonpost.com/politics/federal-authorities-take-on-anonymous-hackers/2011/09/11/gIQAYrhgMK_story.html |date=9 December 2020 }}, Associated Press in the Washington Post, 12 September 2011</ref>


===Protection of existing economic interests and copyright===
===Protection of existing economic interests and copyright===
The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use [[Voice over Internet Protocol]] (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.<ref name=Faris-2008/>
The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use [[Voice over Internet Protocol]] (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.<ref name=Faris-2008/>


[[Anti-copyright]] activists [[Christian Engström]], [[Rick Falkvinge]] and [[Oscar Swartz]] have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.<ref>{{cite web |url=https://torrentfreak.com/the-copyright-lobby-absolutely-loves-child-pornography-110709/ |title=The Copyright Lobby Absolutely Loves Child Pornography |author=Rick Falkvinge |date=9 July 2011 |work=[[TorrentFreak]] |access-date=26 July 2012 |author-link=Rick Falkvinge |archive-date=9 December 2020 |archive-url=https://web.archive.org/web/20201209214207/https://torrentfreak.com/the-copyright-lobby-absolutely-loves-child-pornography-110709/ |url-status=live }}</ref>
[[criticism of copyright|Anti-copyright]] activists [[Christian Engström]], [[Rick Falkvinge]] and [[Oscar Swartz]] have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.<ref>{{cite web |url=https://torrentfreak.com/the-copyright-lobby-absolutely-loves-child-pornography-110709/ |title=The Copyright Lobby Absolutely Loves Child Pornography |author=Rick Falkvinge |date=9 July 2011 |work=[[TorrentFreak]] |access-date=26 July 2012 |author-link=Rick Falkvinge |archive-date=9 December 2020 |archive-url=https://web.archive.org/web/20201209214207/https://torrentfreak.com/the-copyright-lobby-absolutely-loves-child-pornography-110709/ |url-status=live }}</ref>


Examples include:
Examples include:
* [[File sharing]] and [[peer-to-peer]] (P2P) related websites such as [[The Pirate Bay]]
* [[File sharing]] and [[peer-to-peer]] (P2P) related websites such as [[The Pirate Bay]]
* [[Skype]]
* [[Skype]]
* Sites that sell or distribute music, but are not 'approved' by rights holders, such as [[allofmp3]]
* Sites that sell or distribute music, but are not 'approved' by rights holders, such as [[AllOfMP3]]


===Network tools===
===Network tools===
Line 196: Line 196:
Examples include:
Examples include:
* Media sharing websites (e.g. [[Flickr]] and [[Censorship of YouTube|YouTube]])<ref>{{cite web |url=http://mashable.com/2007/03/11/youtube-blocked-inthailand/ |title=YouTube Blocked in...Thailand |date=11 March 2007 |work=Mashable |access-date=5 April 2015 |archive-date=9 August 2020 |archive-url=https://web.archive.org/web/20200809115202/https://mashable.com/2007/03/11/youtube-blocked-inthailand/ |url-status=live }}</ref>
* Media sharing websites (e.g. [[Flickr]] and [[Censorship of YouTube|YouTube]])<ref>{{cite web |url=http://mashable.com/2007/03/11/youtube-blocked-inthailand/ |title=YouTube Blocked in...Thailand |date=11 March 2007 |work=Mashable |access-date=5 April 2015 |archive-date=9 August 2020 |archive-url=https://web.archive.org/web/20200809115202/https://mashable.com/2007/03/11/youtube-blocked-inthailand/ |url-status=live }}</ref>
* [[Social network service|Social networks]] (e.g. [[Censorship of Facebook|Facebook]] and Instagram)
* [[Social networking service|Social networks]] (e.g. [[Censorship of Facebook|Facebook]] and Instagram)
* Translation sites and tools
* Translation sites and tools
* E-mail providers
* E-mail providers
* [[Web hosting]] sites
* [[web hosting service|Web hosting]] sites
* [[Blog hosting]] sites such as [[Blogspot]] and [[Medium (website)|Medium]]
* [[blog|Blog hosting]] sites such as [[Blogger (service)|Blogspot]] and [[Medium (website)|Medium]]
* [[Microblogging]] sites such as [[Censorship of Twitter|Twitter]] and [[Sina Weibo|Weibo]]<ref>[https://www.independent.co.uk/life-style/gadgets-and-tech/china-struggles-to-tame-microblogging-masses-2351509.html "China struggles to tame microblogging masses"] {{Webarchive|url=https://web.archive.org/web/20171104175518/https://www.independent.co.uk/life-style/gadgets-and-tech/china-struggles-to-tame-microblogging-masses-2351509.html |date=4 November 2017 }}, Agence France-Presse (AFP) in ''The Independent'', 8 September 2011</ref>
* [[Microblogging]] sites such as [[Censorship of Twitter|Twitter]] and [[Weibo]]<ref>[https://www.independent.co.uk/life-style/gadgets-and-tech/china-struggles-to-tame-microblogging-masses-2351509.html "China struggles to tame microblogging masses"] {{Webarchive|url=https://web.archive.org/web/20171104175518/https://www.independent.co.uk/life-style/gadgets-and-tech/china-struggles-to-tame-microblogging-masses-2351509.html |date=4 November 2017 }}, Agence France-Presse (AFP) in ''The Independent'', 8 September 2011</ref>
* [[Censorship of Wikipedia|Wikipedia]]
* [[Censorship of Wikipedia|Wikipedia]]
* [[Internet censorship circumvention|Censorship circumvention sites]]
* [[Internet censorship circumvention|Censorship circumvention sites]]
** [[Anonymizer]]s
** [[anonymous proxy|Anonymizer]]s
** [[Proxy server|Proxy avoidance sites]]
** [[Proxy server|Proxy avoidance sites]]
* [[Search engines]] such as [[Bing (search engine)|Bing]]<ref>[http://opennet.net/sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries] {{Webarchive|url=https://web.archive.org/web/20201213174600/http://opennet.net/sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries |date=13 December 2020 }}", Helmi Noman, OpenNet Initiative, March 2010</ref> and [[Internet censorship in the People's Republic of China|Google]]<ref>[http://opennet.net/bulletins/006/ "Google Search & Cache Filtering Behind China's Great Firewall"] {{Webarchive|url=https://web.archive.org/web/20200808234634/http://opennet.net/bulletins/006/ |date=8 August 2020 }}, OpenNet Initiative: Bulletin 006, 3 September 2004</ref><ref>[http://cyber.law.harvard.edu/archived_content/people/edelman/google-safesearch/ "Empirical Analysis of Google SafeSearch"] {{Webarchive|url=https://web.archive.org/web/20130304235802/http://cyber.law.harvard.edu/archived_content/people/edelman/google-safesearch/ |date=4 March 2013 }}, Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003</ref> – particularly in [[Internet censorship in the People's Republic of China|Mainland China]] and [[Internet censorship in cuba|Cuba]]<ref>{{cite news |url=http://news.bbc.co.uk/2/hi/technology/2231101.stm |work=BBC News |title=China blocking Google |date=2 September 2002 |access-date=5 May 2010 |archive-date=11 December 2020 |archive-url=https://web.archive.org/web/20201211035040/http://news.bbc.co.uk/2/hi/technology/2231101.stm |url-status=live }}</ref>
* [[list of search engines|Search engines]] such as [[Microsoft Bing|Bing]]<ref>[http://opennet.net/sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries] {{Webarchive|url=https://web.archive.org/web/20201213174600/http://opennet.net/sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries |date=13 December 2020 }}", Helmi Noman, OpenNet Initiative, March 2010</ref> and [[Google]]<ref>[http://opennet.net/bulletins/006/ "Google Search & Cache Filtering Behind China's Great Firewall"] {{Webarchive|url=https://web.archive.org/web/20200808234634/http://opennet.net/bulletins/006/ |date=8 August 2020 }}, OpenNet Initiative: Bulletin 006, 3 September 2004</ref><ref>[http://cyber.law.harvard.edu/archived_content/people/edelman/google-safesearch/ "Empirical Analysis of Google SafeSearch"] {{Webarchive|url=https://web.archive.org/web/20130304235802/http://cyber.law.harvard.edu/archived_content/people/edelman/google-safesearch/ |date=4 March 2013 }}, Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003</ref> – particularly in [[Internet censorship in China|Mainland China]] and [[Internet censorship in Cuba|Cuba]]<ref>{{cite news |url=http://news.bbc.co.uk/2/hi/technology/2231101.stm |work=BBC News |title=China blocking Google |date=2 September 2002 |access-date=5 May 2010 |archive-date=11 December 2020 |archive-url=https://web.archive.org/web/20201211035040/http://news.bbc.co.uk/2/hi/technology/2231101.stm |url-status=live }}</ref>


===Information about individuals===
===Information about individuals===
{{main|Right to be forgotten}}
{{main|Right to be forgotten}}


The ''right to be forgotten'' is a concept that has been discussed and put into practice in the [[European Union]]. In May 2014, the [[European Court of Justice]] ruled against [[Google]] in ''[[Google v González|Costeja]]'', a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in ''La Vanguardia'' newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid.<ref>{{cite web |url=https://www.wired.co.uk/news/archive/2014-05/15/google-vs-spain |title=What we can salvage from 'right to be forgotten' ruling |publisher=Wired.co.uk |date=15 May 2014 |access-date=16 May 2014 |author=Julia Powles |url-status=dead |archive-url=https://web.archive.org/web/20140516024112/http://www.wired.co.uk/news/archive/2014-05/15/google-vs-spain |archive-date=16 May 2014}}</ref> He initially attempted to have the article removed by complaining to Spain's data protection agency—''Agencia Española de Protección de Datos''—which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results.<ref>{{cite web |last=Solon |first=Olivia |title=People have the right to be forgotten, rules EU court |url=https://www.wired.co.uk/news/archive/2014-05/13/right-to-be-forgotten-ruling |work=Wired.co.uk |publisher=Conde Nast Digital |access-date=13 May 2014 |date=13 May 2014 |url-status=dead |archive-url=https://web.archive.org/web/20140514071400/http://www.wired.co.uk/news/archive/2014-05/13/right-to-be-forgotten-ruling |archive-date=14 May 2014}}</ref> Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in ''Costeja'' that search engines are responsible for the content they point to and thus, Google was required to comply with EU [[information privacy|data privacy]] laws.<ref>{{cite news |title=EU court backs 'right to be forgotten' in Google case |url=https://www.bbc.com/news/world-europe-27388289 |work=BBC News |access-date=13 May 2014 |date=13 May 2014 |archive-date=25 November 2020 |archive-url=https://web.archive.org/web/20201125060034/https://www.bbc.com/news/world-europe-27388289 |url-status=live }}</ref><ref>{{cite web |title=EU court rules Google must tweak search results in test of "right to be forgotten" |url=http://www.cbsnews.com/news/eu-court-google-must-tweak-search-results-right-to-be-forgotten/ |publisher=CBS News |access-date=13 May 2014 |date=13 May 2014 |archive-date=3 December 2019 |archive-url=https://web.archive.org/web/20191203105145/https://www.cbsnews.com/news/eu-court-google-must-tweak-search-results-right-to-be-forgotten/ |url-status=live }}</ref> It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.<ref name="GoogleEU">{{cite news |title=Removal of Google personal information could become work intensive |url=http://www.europenews.net/index.php/sid/222490797/scat/88176adfdf246af5/ht/Removal-of-Google-personal-information-could-become-work-intensive |access-date=2 June 2014 |publisher=Europe News.Net |archive-url=https://web.archive.org/web/20141021150331/http://www.europenews.net/index.php/sid/222490797/scat/88176adfdf246af5/ht/Removal-of-Google-personal-information-could-become-work-intensive |archive-date=21 October 2014 |url-status=dead }}</ref>
The ''right to be forgotten'' is a concept that has been discussed and put into practice in the [[European Union]]. In May 2014, the [[European Court of Justice]] ruled against [[Google]] in ''[[Google Spain v AEPD and Mario Costeja González|Costeja]]'', a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in ''La Vanguardia'' newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid.<ref>{{cite web |url=https://www.wired.co.uk/news/archive/2014-05/15/google-vs-spain |title=What we can salvage from 'right to be forgotten' ruling |publisher=Wired.co.uk |date=15 May 2014 |access-date=16 May 2014 |author=Julia Powles |url-status=dead |archive-url=https://web.archive.org/web/20140516024112/http://www.wired.co.uk/news/archive/2014-05/15/google-vs-spain |archive-date=16 May 2014}}</ref> He initially attempted to have the article removed by complaining to Spain's data protection agency—''Agencia Española de Protección de Datos''—which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results.<ref>{{cite web |last=Solon |first=Olivia |title=People have the right to be forgotten, rules EU court |url=https://www.wired.co.uk/news/archive/2014-05/13/right-to-be-forgotten-ruling |work=Wired.co.uk |publisher=Conde Nast Digital |access-date=13 May 2014 |date=13 May 2014 |url-status=dead |archive-url=https://web.archive.org/web/20140514071400/http://www.wired.co.uk/news/archive/2014-05/13/right-to-be-forgotten-ruling |archive-date=14 May 2014}}</ref> Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in ''Costeja'' that search engines are responsible for the content they point to and thus, Google was required to comply with EU [[information privacy|data privacy]] laws.<ref>{{cite news |title=EU court backs 'right to be forgotten' in Google case |url=https://www.bbc.com/news/world-europe-27388289 |work=BBC News |access-date=13 May 2014 |date=13 May 2014 |archive-date=25 November 2020 |archive-url=https://web.archive.org/web/20201125060034/https://www.bbc.com/news/world-europe-27388289 |url-status=live }}</ref><ref>{{cite web |title=EU court rules Google must tweak search results in test of "right to be forgotten" |url=http://www.cbsnews.com/news/eu-court-google-must-tweak-search-results-right-to-be-forgotten/ |publisher=CBS News |access-date=13 May 2014 |date=13 May 2014 |archive-date=3 December 2019 |archive-url=https://web.archive.org/web/20191203105145/https://www.cbsnews.com/news/eu-court-google-must-tweak-search-results-right-to-be-forgotten/ |url-status=live }}</ref> It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.<ref name="GoogleEU">{{cite news |title=Removal of Google personal information could become work intensive |url=http://www.europenews.net/index.php/sid/222490797/scat/88176adfdf246af5/ht/Removal-of-Google-personal-information-could-become-work-intensive |access-date=2 June 2014 |publisher=Europe News.Net |archive-url=https://web.archive.org/web/20141021150331/http://www.europenews.net/index.php/sid/222490797/scat/88176adfdf246af5/ht/Removal-of-Google-personal-information-could-become-work-intensive |archive-date=21 October 2014 |url-status=dead }}</ref>


[[Index on Censorship]] claimed that "''[[Google v González|Costeja]]'' ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court's decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."<ref>{{cite web |url=http://www.indexoncensorship.org/2014/05/index-blasts-eu-court-ruling-right-forgotten/ |title=Index blasts EU court ruling on "right to be forgotten" |work=indexoncensorship.org |date=13 May 2014 |access-date=5 April 2015 |archive-date=19 September 2020 |archive-url=https://web.archive.org/web/20200919094343/http://www.indexoncensorship.org/2014/05/index-blasts-eu-court-ruling-right-forgotten/ |url-status=live }}</ref>
[[Index on Censorship]] claimed that "''[[Google Spain v AEPD and Mario Costeja González|Costeja]]'' ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court's decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."<ref>{{cite web |url=http://www.indexoncensorship.org/2014/05/index-blasts-eu-court-ruling-right-forgotten/ |title=Index blasts EU court ruling on "right to be forgotten" |work=indexoncensorship.org |date=13 May 2014 |access-date=5 April 2015 |archive-date=19 September 2020 |archive-url=https://web.archive.org/web/20200919094343/http://www.indexoncensorship.org/2014/05/index-blasts-eu-court-ruling-right-forgotten/ |url-status=live }}</ref>


==Resilience==
==Resilience==
Line 221: Line 221:


==Around the world==
==Around the world==
{{Main |Internet censorship by country |Censorship by country}}
{{Main |Internet censorship and surveillance by country |Censorship by country}}
{{clear}}
{{clear}}
As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the [[MENA|Middle East/North Africa]].
As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the [[Middle East and North Africa|Middle East/North Africa]].


Countries in other regions also practice certain forms of filtering. In the [[Internet censorship in the United States|United States]] state-mandated Internet filtering occurs on some computers in libraries and [[K-12 schools]]. Content related to [[Nazism]] or [[Holocaust denial]] is blocked in [[Internet censorship in France|France]] and [[Internet censorship in Germany|Germany]]. [[Child pornography]] and [[hate speech]] are blocked in many countries throughout the world.<ref name=Zittrain-2008>{{cite web |url=http://mitpress.mit.edu/books/chapters/0262541963intro1.pdf |title=Introduction |access-date=2011-09-14 |url-status=dead |archive-url=https://web.archive.org/web/20120629074247/http://mitpress.mit.edu/books/chapters/0262541963intro1.pdf |archive-date=29 June 2012}}, Jonathan Zittrain and John Palfrey, in [http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/web/20090226100258/http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 |date=26 February 2009 }}, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008</ref> In fact, many countries throughout the world, including some democracies with long traditions of strong support for [[freedom of expression]] and [[freedom of the press]], are engaged in some amount of online censorship, often with substantial public support.<ref>[http://opennet.net/sites/opennet.net/files/Deibert_03_Ch02_029-056.pdf "Internet Filtering: The Politics and Mechanisms of Control"] {{Webarchive|url=https://web.archive.org/web/20200919121222/http://opennet.net/sites/opennet.net/files/Deibert_03_Ch02_029-056.pdf |date=19 September 2020 }}, Jonathan Zittrain and John Palfrey, in [http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/web/20090226100258/http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 |date=26 February 2009 }}, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008</ref>
Countries in other regions also practice certain forms of filtering. In the [[Internet censorship in the United States|United States]], state-mandated Internet filtering occurs on some computers in libraries and [[K-12 schools]]. Content related to [[Nazism]] or [[Holocaust denial]] is blocked in [[Internet censorship in France|France]] and [[Internet censorship in Germany|Germany]]. [[Child pornography]] and [[hate speech]] are blocked in many countries throughout the world.<ref name=Zittrain-2008>{{cite web |url=http://mitpress.mit.edu/books/chapters/0262541963intro1.pdf |title=Introduction |access-date=2011-09-14 |url-status=dead |archive-url=https://web.archive.org/web/20120629074247/http://mitpress.mit.edu/books/chapters/0262541963intro1.pdf |archive-date=29 June 2012}}, Jonathan Zittrain and John Palfrey, in [http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/web/20090226100258/http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 |date=26 February 2009 }}, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008</ref> In fact, many countries throughout the world, including some democracies with long traditions of strong support for [[freedom of speech|freedom of expression]] and [[freedom of the press]], are engaged in some amount of online censorship, often with substantial public support.<ref>[http://opennet.net/sites/opennet.net/files/Deibert_03_Ch02_029-056.pdf "Internet Filtering: The Politics and Mechanisms of Control"] {{Webarchive|url=https://web.archive.org/web/20200919121222/http://opennet.net/sites/opennet.net/files/Deibert_03_Ch02_029-056.pdf |date=19 September 2020 }}, Jonathan Zittrain and John Palfrey, in [http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 ''Access Denied: The Practice and Policy of Global Internet Filtering''] {{webarchive|url=https://web.archive.org/web/20090226100258/http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11329 |date=26 February 2009 }}, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008</ref>


Internet censorship in [[China]] is among the most stringent in the world. The government blocks Web sites that discuss the [[Dalai Lama]], the 1989 crackdown on [[1989 Tiananmen Square protests|Tiananmen Square protesters]], the banned spiritual practice [[Falun Gong]], as well as many general Internet sites.<ref>{{cite news|title=Internet Censorship in China |url=http://topics.nytimes.com/top/news/international/countriesandterritories/china/internet_censorship/index.html|access-date=9 March 2013|newspaper=The New York Times|date=28 December 2012|archive-date=4 March 2016|archive-url=https://web.archive.org/web/20160304050504/http://topics.nytimes.com/top/news/international/countriesandterritories/china/internet_censorship/index.html|url-status=live}}</ref> The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including [[Facebook]], [[Twitter]], and [[YouTube]].<ref>{{cite book|last=Human Rights Watch|title=World Report 2012: China|date=22 January 2012|url=https://www.hrw.org/world-report-2012/world-report-2012-china|access-date=9 March 2013|archive-date=11 March 2013|archive-url=https://web.archive.org/web/20130311193943/http://www.hrw.org/world-report-2012/world-report-2012-china|url-status=live}}</ref> According to a study in 2014,<ref>{{cite journal|author=G. King |s2cid=5398090|title=Reverse-engineering censorship in China: Randomized experimentation and participant observation|journal=Science |doi=10.1126/science.1251722|date=22 August 2014 |volume=345|issue=6199 |page=891|display-authors=etal|pmid=25146296|url=http://nrs.harvard.edu/urn-3:HUL.InstRepos:37091695 |access-date=11 July 2019|archive-date=24 August 2020|archive-url=https://web.archive.org/web/20200824001559/https://dash.harvard.edu/handle/1/37091695|url-status=live}}</ref> censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government.
Internet censorship in [[China]] is among the most stringent in the world. The government blocks Web sites that discuss the [[Dalai Lama]], the 1989 crackdown on [[1989 Tiananmen Square protests and massacre|Tiananmen Square protesters]], the banned spiritual practice [[Falun Gong]], as well as many general Internet sites.<ref>{{cite news|title=Internet Censorship in China |url=http://topics.nytimes.com/top/news/international/countriesandterritories/china/internet_censorship/index.html|access-date=9 March 2013|newspaper=The New York Times|date=28 December 2012|archive-date=4 March 2016|archive-url=https://web.archive.org/web/20160304050504/http://topics.nytimes.com/top/news/international/countriesandterritories/china/internet_censorship/index.html|url-status=live}}</ref> The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including [[Facebook]], [[Twitter]], and [[YouTube]].<ref>{{cite book|last=Human Rights Watch|title=World Report 2012: China|date=22 January 2012|url=https://www.hrw.org/world-report-2012/world-report-2012-china|access-date=9 March 2013|archive-date=11 March 2013|archive-url=https://web.archive.org/web/20130311193943/http://www.hrw.org/world-report-2012/world-report-2012-china|url-status=live}}</ref> According to a study in 2014,<ref>{{cite journal|author=G. King |s2cid=5398090|title=Reverse-engineering censorship in China: Randomized experimentation and participant observation|journal=Science |doi=10.1126/science.1251722|date=22 August 2014 |volume=345|issue=6199 |page=891|display-authors=etal|pmid=25146296|url=http://nrs.harvard.edu/urn-3:HUL.InstRepos:37091695 |access-date=11 July 2019|archive-date=24 August 2020|archive-url=https://web.archive.org/web/20200824001559/https://dash.harvard.edu/handle/1/37091695|url-status=live}}</ref> censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government.


There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".<ref>{{Cite journal|title=WTO could challenge Internet censorship |journal=Newsletter on Intellectual Freedom|volume=59|issue=1|location=Chicago|publisher=American Library Association|date=January 2010|page=6|id={{ProQuest|217137198}}}}</ref>
There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".<ref>{{Cite journal|title=WTO could challenge Internet censorship |journal=Newsletter on Intellectual Freedom|volume=59|issue=1|location=Chicago|publisher=American Library Association|date=January 2010|page=6|id={{ProQuest|217137198}}}}</ref>
Line 242: Line 242:
Several governments have resorted to shutting down most or all Internet connections in all or part of the country.
Several governments have resorted to shutting down most or all Internet connections in all or part of the country.


This appears to have been the case on 27 and 28 January 2011 during the [[2011 Egyptian protests]], in what has been widely described as an "unprecedented" internet block.<ref name="jamescowie_techdetails_Egyptfullblock">{{cite web|last=Cowie |first=James |title=Egypt Leaves the Internet |publisher=Renesys |url=http://research.dyn.com/2011/01/egypt-leaves-the-internet/ |access-date=28 January 2011 |archive-url=https://web.archive.org/web/20110129105030/http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml |archive-date=29 January 2011 |url-status=live}}</ref><ref name="IDGnews_Egyptfullblock">{{cite news|first=Jeremy |last=Kirk |title=With Wired Internet Locked, Egypt Looks to the Sky |date=28 January 2011 |publisher=IDG News/[[PC World (magazine)|PC World]] |url=https://www.pcworld.com/article/218064/with_wired_internet_locked_egypt_looks_to_the_sky.html |access-date=28 January 2011 |archive-url=https://web.archive.org/web/20110130223855/http://www.pcworld.com/businesscenter/article/218064/with_wired_internet_locked_egypt_looks_to_the_sky.html |archive-date=30 January 2011 |url-status=live}}</ref> About 3500 [[Border Gateway Protocol]] (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January.<ref name="jamescowie_techdetails_Egyptfullblock" /> This full block was implemented without cutting off major intercontinental [[fibre optics|fibre-optic]] links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."<ref name="jamescowie_techdetails_Egyptfullblock" />
This appears to have been the case on 27 and 28 January 2011 during the [[2011 Egyptian revolution]], in what has been widely described as an "unprecedented" internet block.<ref name="jamescowie_techdetails_Egyptfullblock">{{cite web|last=Cowie |first=James |title=Egypt Leaves the Internet |publisher=Renesys |url=http://research.dyn.com/2011/01/egypt-leaves-the-internet/ |access-date=28 January 2011 |archive-url=https://web.archive.org/web/20110129105030/http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml |archive-date=29 January 2011 |url-status=live}}</ref><ref name="IDGnews_Egyptfullblock">{{cite news|first=Jeremy |last=Kirk |title=With Wired Internet Locked, Egypt Looks to the Sky |date=28 January 2011 |publisher=IDG News/[[PC World (magazine)|PC World]] |url=https://www.pcworld.com/article/218064/with_wired_internet_locked_egypt_looks_to_the_sky.html |access-date=28 January 2011 |archive-url=https://web.archive.org/web/20110130223855/http://www.pcworld.com/businesscenter/article/218064/with_wired_internet_locked_egypt_looks_to_the_sky.html |archive-date=30 January 2011 |url-status=live}}</ref> About 3500 [[Border Gateway Protocol]] (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35&nbsp;UTC 27 January.<ref name="jamescowie_techdetails_Egyptfullblock" /> This full block was implemented without cutting off major intercontinental [[optical fiber|fibre-optic]] links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."<ref name="jamescowie_techdetails_Egyptfullblock" />
Full blocks also occurred in [[Internet censorship in Myanmar|Myanmar/Burma]] in 2007,<ref>{{cite web|url=http://opennet.net/research/bulletins/013|title=Pulling the Plug: A Technical Review of the Internet Shutdown in Burma|work=opennet.net|access-date=5 April 2015|archive-date=15 November 2020|archive-url=https://web.archive.org/web/20201115195441/https://opennet.net/research/bulletins/013|url-status=live}}</ref> [[Free speech in the media during the 2011 Libyan civil war|Libya]] in 2011,<ref name=Libya-RWB-2011>{{cite web|title=Journalists confined to their hotels, Internet disconnected |url=http://en.rsf.org/journalists-confined-to-their-04-03-2011,39681.html|publisher=Reporters Without Borders|access-date=21 March 2011|archive-date=4 March 2016|archive-url=https://web.archive.org/web/20160304070847/http://en.rsf.org/journalists-confined-to-their-04-03-2011,39681.html|url-status=dead}}</ref> [[Iran]] in 2019,<ref>{{Cite web|last=Skinner|first=Helena|date=2019-11-22|title=How did Iran's government pull the plug on the Internet?|url=https://www.euronews.com/2019/11/22/how-did-iran-s-government-pulled-the-plug-on-the-internet|access-date=2020-11-09|website=euronews|language=en|archive-date=27 November 2019|archive-url=https://web.archive.org/web/20191127185512/https://www.euronews.com/2019/11/22/how-did-iran-s-government-pulled-the-plug-on-the-internet|url-status=live}}</ref> and [[Internet censorship in Syria|Syria]] during the [[Syrian civil war]].
Full blocks also occurred in [[Internet in Myanmar#Censorship|Myanmar/Burma]] in 2007,<ref>{{cite web|url=http://opennet.net/research/bulletins/013|title=Pulling the Plug: A Technical Review of the Internet Shutdown in Burma|work=opennet.net|access-date=5 April 2015|archive-date=15 November 2020|archive-url=https://web.archive.org/web/20201115195441/https://opennet.net/research/bulletins/013|url-status=live}}</ref> [[Free speech in the media during the Libyan civil war (2011)|Libya]] in 2011,<ref name=Libya-RWB-2011>{{cite web|title=Journalists confined to their hotels, Internet disconnected |url=http://en.rsf.org/journalists-confined-to-their-04-03-2011,39681.html|publisher=Reporters Without Borders|access-date=21 March 2011|archive-date=4 March 2016|archive-url=https://web.archive.org/web/20160304070847/http://en.rsf.org/journalists-confined-to-their-04-03-2011,39681.html|url-status=dead}}</ref> [[Iran]] in 2019,<ref>{{Cite web|last=Skinner|first=Helena|date=2019-11-22|title=How did Iran's government pull the plug on the Internet?|url=https://www.euronews.com/2019/11/22/how-did-iran-s-government-pulled-the-plug-on-the-internet|access-date=2020-11-09|website=euronews|language=en|archive-date=27 November 2019|archive-url=https://web.archive.org/web/20191127185512/https://www.euronews.com/2019/11/22/how-did-iran-s-government-pulled-the-plug-on-the-internet|url-status=live}}</ref> and [[Internet censorship in Syria|Syria]] during the [[Syrian civil war]].


Almost all Internet connections in [[Sudan]] were disconnected from 3 June to 9 July 2019, in response to a political opposition sit-in seeking civilian rule.<ref>{{Cite news|url=https://www.npr.org/2019/06/16/733158506/sudans-internet-outage|title=Sudan's Internet Outage|website=NPR.org|access-date=30 July 2019|archive-date=8 August 2020|archive-url=https://web.archive.org/web/20200808065504/https://www.npr.org/2019/06/16/733158506/sudans-internet-outage|url-status=live}}</ref><ref>{{Cite web|url=https://netblocks.org/reports/sudan-internet-recovery-after-month-long-shutdown-98aZpOAo|title=Sudan internet shows signs of recovery after month-long shutdown|date=9 July 2019|access-date=30 July 2019|archive-date=14 October 2020|archive-url=https://web.archive.org/web/20201014055615/https://netblocks.org/reports/sudan-internet-recovery-after-month-long-shutdown-98aZpOAo|url-status=live}}</ref> A near-complete shutdown in [[Ethiopia]] lasted for a week after the [[Amhara Region coup d'état attempt]].<ref>{{Cite web|url=https://netblocks.org/reports/ethiopia-partially-restores-internet-days-after-amhara-coup-attempt-blackout-V8xxlo8k|title=Ethiopia partially restores internet access days after blackout following reported Amhara coup attempt|date=27 June 2019|access-date=30 July 2019|archive-date=14 October 2020|archive-url=https://web.archive.org/web/20201014125618/https://netblocks.org/reports/ethiopia-partially-restores-internet-days-after-amhara-coup-attempt-blackout-V8xxlo8k|url-status=live}}</ref> A week-long shutdown in [[Mauritania]] followed disputes over the [[2019 Mauritanian presidential election]].<ref>{{Cite web|url=https://netblocks.org/reports/post-election-internet-shutdown-in-mauritania-following-widespread-mobile-disruptions-JA6zmeAQ|title=Post-election internet shutdown in Mauritania following widespread mobile disruptions|date=25 June 2019|access-date=30 July 2019|archive-date=19 November 2020|archive-url=https://web.archive.org/web/20201119190509/https://netblocks.org/reports/post-election-internet-shutdown-in-mauritania-following-widespread-mobile-disruptions-JA6zmeAQ|url-status=live}}</ref> Other country-wide shutdowns in 2019 include [[Zimbabwe]] after a gasoline price protests triggered police violence, [[Gabon]] during the [[2019 Gabonese coup d'état attempt]], and during or after elections in [[Democratic Republic of the Congo]], [[Benin]], [[Malawi]], and [[Kazakhstan]].<ref name="proton">{{Cite web|url=https://protonvpn.com/blog/internet-shutdown-2019/|title=Government that have shut down the Internet in 2019|date=26 June 2019|access-date=30 July 2019|archive-date=1 November 2020|archive-url=https://web.archive.org/web/20201101131214/https://protonvpn.com/blog/internet-shutdown-2019/|url-status=live}}</ref>
Almost all Internet connections in [[Sudan]] were disconnected from 3 June to 9 July 2019, in response to a political opposition sit-in seeking civilian rule.<ref>{{Cite news|url=https://www.npr.org/2019/06/16/733158506/sudans-internet-outage|title=Sudan's Internet Outage|website=NPR.org|access-date=30 July 2019|archive-date=8 August 2020|archive-url=https://web.archive.org/web/20200808065504/https://www.npr.org/2019/06/16/733158506/sudans-internet-outage|url-status=live}}</ref><ref>{{Cite web|url=https://netblocks.org/reports/sudan-internet-recovery-after-month-long-shutdown-98aZpOAo|title=Sudan internet shows signs of recovery after month-long shutdown|date=9 July 2019|access-date=30 July 2019|archive-date=14 October 2020|archive-url=https://web.archive.org/web/20201014055615/https://netblocks.org/reports/sudan-internet-recovery-after-month-long-shutdown-98aZpOAo|url-status=live}}</ref> A near-complete shutdown in [[Ethiopia]] lasted for a week after the [[Amhara Region coup attempt]].<ref>{{Cite web|url=https://netblocks.org/reports/ethiopia-partially-restores-internet-days-after-amhara-coup-attempt-blackout-V8xxlo8k|title=Ethiopia partially restores internet access days after blackout following reported Amhara coup attempt|date=27 June 2019|access-date=30 July 2019|archive-date=14 October 2020|archive-url=https://web.archive.org/web/20201014125618/https://netblocks.org/reports/ethiopia-partially-restores-internet-days-after-amhara-coup-attempt-blackout-V8xxlo8k|url-status=live}}</ref> A week-long shutdown in [[Mauritania]] followed disputes over the [[2019 Mauritanian presidential election]].<ref>{{Cite web|url=https://netblocks.org/reports/post-election-internet-shutdown-in-mauritania-following-widespread-mobile-disruptions-JA6zmeAQ|title=Post-election internet shutdown in Mauritania following widespread mobile disruptions|date=25 June 2019|access-date=30 July 2019|archive-date=19 November 2020|archive-url=https://web.archive.org/web/20201119190509/https://netblocks.org/reports/post-election-internet-shutdown-in-mauritania-following-widespread-mobile-disruptions-JA6zmeAQ|url-status=live}}</ref> Other country-wide shutdowns in 2019 include [[Zimbabwe]] after a gasoline price protests triggered police violence, [[Gabon]] during the [[2019 Gabonese coup attempt]], and during or after elections in [[Democratic Republic of the Congo]], [[Benin]], [[Malawi]], and [[Kazakhstan]].<ref name="proton">{{Cite web|url=https://protonvpn.com/blog/internet-shutdown-2019/|title=Government that have shut down the Internet in 2019|date=26 June 2019|access-date=30 July 2019|archive-date=1 November 2020|archive-url=https://web.archive.org/web/20201101131214/https://protonvpn.com/blog/internet-shutdown-2019/|url-status=live}}</ref>


Local shutdowns are frequently ordered in India during times of unrest and security concerns.<ref>{{Cite web|url=https://internetshutdowns.in/|title=Internet Shutdowns in India|website=internetshutdowns.in|access-date=30 July 2019|archive-date=16 November 2021|archive-url=https://web.archive.org/web/20211116233248/https://internetshutdowns.in/|url-status=live}}</ref><ref>{{Cite web|last=Krishna Mohan|first=Vaishnavi|date=2021-01-30|title=Internet Shutdowns in India: From Kashmir to Haryana|url=https://www.globalviews360.com/articles/internet-shutdowns-in-india-from-kashmir-to-haryana|access-date=2021-01-30|website=Global Views 360|language=en|archive-date=31 January 2021|archive-url=https://web.archive.org/web/20210131133650/https://www.globalviews360.com/articles/internet-shutdowns-in-india-from-kashmir-to-haryana|url-status=live}}</ref> Some countries have used localized Internet shutdowns to combat cheating during exams, including [[Iraq]],<ref>{{Cite web|url=https://netblocks.org/reports/iraq-shuts-down-internet-to-prevent-cheating-in-national-science-exams-gBLk94A4|title=Iraq shuts down internet to prevent cheating in national science exams|date=26 June 2019|access-date=30 July 2019|archive-date=27 October 2020|archive-url=https://web.archive.org/web/20201027100323/https://netblocks.org/reports/iraq-shuts-down-internet-to-prevent-cheating-in-national-science-exams-gBLk94A4|url-status=live}}</ref> [[Ethiopia]], [[India]], [[Algeria]], and [[Uzbekistan]].<ref name="proton" />
Local shutdowns are frequently ordered in India during times of unrest and security concerns.<ref>{{Cite web|url=https://internetshutdowns.in/|title=Internet Shutdowns in India|website=internetshutdowns.in|access-date=30 July 2019|archive-date=16 November 2021|archive-url=https://web.archive.org/web/20211116233248/https://internetshutdowns.in/|url-status=live}}</ref><ref>{{Cite web|last=Krishna Mohan|first=Vaishnavi|date=2021-01-30|title=Internet Shutdowns in India: From Kashmir to Haryana|url=https://www.globalviews360.com/articles/internet-shutdowns-in-india-from-kashmir-to-haryana|access-date=2021-01-30|website=Global Views 360|language=en|archive-date=31 January 2021|archive-url=https://web.archive.org/web/20210131133650/https://www.globalviews360.com/articles/internet-shutdowns-in-india-from-kashmir-to-haryana|url-status=live}}</ref> Some countries have used localized Internet shutdowns to combat cheating during exams, including [[Iraq]],<ref>{{Cite web|url=https://netblocks.org/reports/iraq-shuts-down-internet-to-prevent-cheating-in-national-science-exams-gBLk94A4|title=Iraq shuts down internet to prevent cheating in national science exams|date=26 June 2019|access-date=30 July 2019|archive-date=27 October 2020|archive-url=https://web.archive.org/web/20201027100323/https://netblocks.org/reports/iraq-shuts-down-internet-to-prevent-cheating-in-national-science-exams-gBLk94A4|url-status=live}}</ref> [[Ethiopia]], [[India]], [[Algeria]], and [[Uzbekistan]].<ref name="proton" />


The Iranian government imposed a [[2019 Internet blackout in Iran|total internet shutdown]] from 16 to 23 November 2019, in response to [[2019 Iranian protests|the fuel protests]].<ref>{{Cite web|url=https://netblocks.org/reports/internet-restored-in-iran-after-protest-shutdown-dAmqddA9|title=Internet being restored in Iran after week-long shutdown|date=2019-11-23|website=NetBlocks|language=en-US|access-date=2019-12-10|archive-date=28 November 2019|archive-url=https://web.archive.org/web/20191128081744/https://netblocks.org/reports/internet-restored-in-iran-after-protest-shutdown-dAmqddA9|url-status=live}}</ref> [[Doug Madory]], the director of Internet analysis at [[Oracle Corporation|Oracle]], has described the operation as "unusual in its scale" and way more advanced.<ref name=":1">{{Cite web|author=Ivana Kottasová and Sara Mazloumsaki|title=What makes Iran's internet blackout different|url=https://www.cnn.com/2019/11/19/middleeast/iran-internet-shutdown-intl/index.html|access-date=2020-11-09|website=CNN|date=19 November 2019|archive-date=21 November 2019|archive-url=https://web.archive.org/web/20191121024946/https://www.cnn.com/2019/11/19/middleeast/iran-internet-shutdown-intl/index.html|url-status=live}}</ref> Beginning Saturday afternoon on 16 November 2019, the government of [[Iran]] ordered the disconnection of much of the country's internet connectivity as a response to widespread protests against the government's decision to raise gas prices. While [[Iran]] is no stranger to government-directed interference in its citizens’ access to the [[internet]], this outage is notable in how it differs from past events. Unlike previous efforts at censorship and bandwidth throttling, the internet of Iran is presently experiencing a multi-day wholesale disconnection for much of its population – arguably the largest such event ever for Iran.<ref name=":1" /><ref>{{Cite web|title=Iran shuts down country's internet in the wake of fuel protests|url=https://techcrunch.com/2019/11/17/iran-shuts-down-countrys-internet-in-the-wake-of-fuel-protests/|access-date=2020-11-09|website=TechCrunch|date=17 November 2019 |language=en-US|archive-date=25 November 2020|archive-url=https://web.archive.org/web/20201125173810/https://techcrunch.com/2019/11/17/iran-shuts-down-countrys-internet-in-the-wake-of-fuel-protests/|url-status=live}}</ref><ref>{{Cite web|last=Mihalcik|first=Carrie|title=Iran's internet has been shut down for days amid protests|url=https://www.cnet.com/news/irans-internet-has-been-shut-down-for-days-amid-protests/|access-date=2020-11-09|website=CNET|language=en|archive-date=26 November 2019|archive-url=https://web.archive.org/web/20191126051521/https://www.cnet.com/news/irans-internet-has-been-shut-down-for-days-amid-protests/|url-status=live}}</ref>
The Iranian government imposed a [[2019 Internet blackout in Iran|total internet shutdown]] from 16 to 23 November 2019, in response to [[2019&ndash;2020 Iranian protests|the fuel protests]].<ref>{{Cite web|url=https://netblocks.org/reports/internet-restored-in-iran-after-protest-shutdown-dAmqddA9|title=Internet being restored in Iran after week-long shutdown|date=2019-11-23|website=NetBlocks|language=en-US|access-date=2019-12-10|archive-date=28 November 2019|archive-url=https://web.archive.org/web/20191128081744/https://netblocks.org/reports/internet-restored-in-iran-after-protest-shutdown-dAmqddA9|url-status=live}}</ref> [[Doug Madory]], the director of Internet analysis at [[Oracle Corporation|Oracle]], has described the operation as "unusual in its scale" and way more advanced.<ref name=":1">{{Cite web|author=Ivana Kottasová and Sara Mazloumsaki|title=What makes Iran's internet blackout different|url=https://www.cnn.com/2019/11/19/middleeast/iran-internet-shutdown-intl/index.html|access-date=2020-11-09|website=CNN|date=19 November 2019|archive-date=21 November 2019|archive-url=https://web.archive.org/web/20191121024946/https://www.cnn.com/2019/11/19/middleeast/iran-internet-shutdown-intl/index.html|url-status=live}}</ref> Beginning Saturday afternoon on 16 November 2019, the government of [[Iran]] ordered the disconnection of much of the country's internet connectivity as a response to widespread protests against the government's decision to raise gas prices. While [[Iran]] is no stranger to government-directed interference in its citizens’ access to the [[internet]], this outage is notable in how it differs from past events. Unlike previous efforts at censorship and bandwidth throttling, the internet of Iran is presently experiencing a multi-day wholesale disconnection for much of its population – arguably the largest such event ever for Iran.<ref name=":1" /><ref>{{Cite web|title=Iran shuts down country's internet in the wake of fuel protests|url=https://techcrunch.com/2019/11/17/iran-shuts-down-countrys-internet-in-the-wake-of-fuel-protests/|access-date=2020-11-09|website=TechCrunch|date=17 November 2019 |language=en-US|archive-date=25 November 2020|archive-url=https://web.archive.org/web/20201125173810/https://techcrunch.com/2019/11/17/iran-shuts-down-countrys-internet-in-the-wake-of-fuel-protests/|url-status=live}}</ref><ref>{{Cite web|last=Mihalcik|first=Carrie|title=Iran's internet has been shut down for days amid protests|url=https://www.cnet.com/news/irans-internet-has-been-shut-down-for-days-amid-protests/|access-date=2020-11-09|website=CNET|language=en|archive-date=26 November 2019|archive-url=https://web.archive.org/web/20191126051521/https://www.cnet.com/news/irans-internet-has-been-shut-down-for-days-amid-protests/|url-status=live}}</ref>


===Reports, ratings, and trends===
===Reports, ratings, and trends===
Line 265: Line 265:
{{clear}}
{{clear}}


Detailed country by country information on Internet censorship is provided by the [[OpenNet Initiative]], [[Reporters Without Borders]], [[Freedom House]], [[V-Dem Institute]], [[Access Now]] and in the [[U.S. State Department]] [[Bureau of Democracy, Human Rights, and Labor]]'s ''Human Rights Reports''.<ref>[https://web.archive.org/web/20110411175832/http://www.state.gov/g/drl/rls/hrrpt/2010/index.htm "2010 Country Reports on Human Rights Practices"], Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011</ref> The ratings produced by several of these organizations are summarized in the [[Internet censorship by country]] and the [[Censorship by country]] articles.
Detailed country by country information on Internet censorship is provided by the [[OpenNet Initiative]], [[Reporters Without Borders]], [[Freedom House]], [[V-Dem Institute]], [[Access Now]] and in the [[United States Department of State|U.S. State Department]] [[Bureau of Democracy, Human Rights, and Labor]]'s ''Human Rights Reports''.<ref>[https://web.archive.org/web/20110411175832/http://www.state.gov/g/drl/rls/hrrpt/2010/index.htm "2010 Country Reports on Human Rights Practices"], Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011</ref> The ratings produced by several of these organizations are summarized in the [[Internet censorship and surveillance by country]] and the [[Censorship by country]] articles.


====OpenNet Initiative reports====
====OpenNet Initiative reports====
Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.<ref name=Noman-2011/> The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas ([[Internet censorship in Egypt|Egypt]], [[Internet censorship in France|France]], [[Internet censorship in Germany|Germany]], [[Internet censorship in India|India]], [[Human rights in Ukraine#Media freedom and freedom of information|Ukraine]], [[Internet censorship in the United Kingdom|United Kingdom]], and [[Internet censorship in the United States|United States]]), while one was found to engage in pervasive filtering in all three areas ([[Internet censorship in the People's Republic of China|China]]), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering ([[Internet censorship in Pakistan|Pakistan]]), five increased their level of filtering ([[Internet censorship in Azerbaijan|Azerbaijan]], [[Internet censorship in Belarus|Belarus]], [[Internet censorship in Kazakhstan|Kazakhstan]], [[Internet censorship in South Korea|South Korea]], and [[Internet censorship in Uzbekistan|Uzbekistan]]), and four maintained the same level of filtering ([[Internet censorship in the People's Republic of China|China]], [[Internet censorship in Iran|Iran]], [[Internet censorship in Myanmar|Myanmar]], and [[Human rights in Tajikistan|Tajikistan]]).<ref name=UNESCO-2011/><ref name=ONIChildPornLegal>Due to legal concerns the [[OpenNet Initiative]] does not check for filtering of [[child pornography]] and because their classifications focus on technical filtering, they do not include other types of censorship.</ref>
Through 2010, the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.<ref name=Noman-2011/> The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas ([[Internet in Egypt#Censorship|Egypt]], [[Internet censorship in France|France]], [[Internet censorship in Germany|Germany]], [[Internet censorship in India|India]], [[Human rights in Ukraine#Media freedom and freedom of information|Ukraine]], [[Internet censorship in the United Kingdom|United Kingdom]], and [[Internet censorship in the United States|United States]]), while one was found to engage in pervasive filtering in all three areas ([[Internet censorship in China|China]]), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering ([[Internet censorship in Pakistan|Pakistan]]), five increased their level of filtering ([[Internet in Azerbaijan#Filtering, surveillance, and harassment|Azerbaijan]], [[censorship in Belarus|Belarus]], [[Internet censorship in Kazakhstan|Kazakhstan]], [[Internet censorship in South Korea|South Korea]], and [[Internet censorship in Uzbekistan|Uzbekistan]]), and four maintained the same level of filtering ([[Internet censorship in the People's Republic of China|China]], [[Internet censorship in Iran|Iran]], [[Internet in Myanmar#Censorship|Myanmar]], and [[Human rights in Tajikistan|Tajikistan]]).<ref name=UNESCO-2011/><ref name=ONIChildPornLegal>Due to legal concerns the [[OpenNet Initiative]] does not check for filtering of [[child pornography]] and because their classifications focus on technical filtering, they do not include other types of censorship.</ref>


====Freedom on the Net reports====
====Freedom on the Net reports====
Line 373: Line 373:
The five "State Enemies of the Internet" named in March 2013 are: [[Bahrain]], [[China]], [[Iran]], [[Syria]], and [[Vietnam]].<ref name=RSFSRS-March2013/>
The five "State Enemies of the Internet" named in March 2013 are: [[Bahrain]], [[China]], [[Iran]], [[Syria]], and [[Vietnam]].<ref name=RSFSRS-March2013/>


The five "Corporate Enemies of the Internet" named in March 2013 are: [[Amesys]] (France), [[Blue Coat Systems]] (U.S.), [[Gamma International]] (UK and Germany), [[Hacking Team]] (Italy), and Trovicor (Germany).<ref name=RSFSRS-March2013/>
The five "Corporate Enemies of the Internet" named in March 2013 are: [[groupe Bull#Amesys controversy|Amesys]] (France), [[Blue Coat Systems]] (U.S.), [[Gamma Group]] (UK and Germany), [[HackingTeam]] (Italy), and Trovicor (Germany).<ref name=RSFSRS-March2013/>


==== V-Dem Digital Societies Project ====
==== V-Dem Digital Societies Project ====
Line 388: Line 388:
* Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
* Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
* Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
* Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
* Opinion was evenly split between Internet users who felt that "the internet is a safe place to express my opinions" (48%) and those who disagreed (49%). Users in [[Internet censorship in Germany|Germany]] and [[Internet censorship in France|France]] agreed the least, followed by users in a highly filtered country such as [[Internet Censorship in China|China]], while users in [[Internet censorship in Egypt|Egypt]], [[Internet censorship in India|India]] and [[Internet in Kenya|Kenya]] agreed more strongly.<ref name=UNESCO-2011/>
* Opinion was evenly split between Internet users who felt that "the internet is a safe place to express my opinions" (48%) and those who disagreed (49%). Users in [[Internet censorship in Germany|Germany]] and [[Internet censorship in France|France]] agreed the least, followed by users in a highly filtered country such as [[Internet censorship in China|China]], while users in [[Internet censorship in Egypt|Egypt]], [[Internet censorship in India|India]] and [[telecommunications in Kenya|Kenya]] agreed more strongly.<ref name=UNESCO-2011/>
* The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to [[internet privacy|privacy]] (20%), state censorship of content (6%), and the extent of corporate presence (3%).
* The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to [[internet privacy|privacy]] (20%), state censorship of content (6%), and the extent of corporate presence (3%).
* Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).<ref>[http://news.bbc.co.uk/2/hi/8548190.stm "Internet access is 'a fundamental right'"] {{Webarchive|url=https://web.archive.org/web/20120107075123/http://news.bbc.co.uk/2/hi/8548190.stm |date=7 January 2012 }}, ''BBC News'', 8 March 2010</ref> And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in [[Human rights in Japan#Civil liberties|Japan]], 11% in the [[Internet censorship in the United States|U.S.]], 11% in [[Internet in Kenya|Kenya]], 11% in [[Internet censorship in Pakistan|Pakistan]], and 10% in [[Internet censorship in Canada|Canada]] strongly disagree).<ref name=UNESCO-2011/>
* Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).<ref>[http://news.bbc.co.uk/2/hi/8548190.stm "Internet access is 'a fundamental right'"] {{Webarchive|url=https://web.archive.org/web/20120107075123/http://news.bbc.co.uk/2/hi/8548190.stm |date=7 January 2012 }}, ''BBC News'', 8 March 2010</ref> And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in [[Human rights in Japan#Civil liberties|Japan]], 11% in the [[Internet censorship in the United States|U.S.]], 11% in [[Internet in Kenya|Kenya]], 11% in [[Internet censorship in Pakistan|Pakistan]], and 10% in [[Internet censorship in Canada|Canada]] strongly disagree).<ref name=UNESCO-2011/>


====Internet Society's Global Internet User Survey====
====Internet Society's Global Internet User Survey====
In July and August 2012 the [[Internet Society]] conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.<ref>[https://www.internetsociety.org/sites/default/files/GIUS2012-GlobalData-Table-20121120_0.pdf "Global Internet User Survey 2012"] {{webarchive|url=https://web.archive.org/web/20130314063616/https://www.internetsociety.org/sites/default/files/GIUS2012-GlobalData-Table-20121120_0.pdf |date=14 March 2013 }}, Internet Society, 20 November 2012</ref>
In July and August 2012, the [[Internet Society]] conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.<ref>[https://www.internetsociety.org/sites/default/files/GIUS2012-GlobalData-Table-20121120_0.pdf "Global Internet User Survey 2012"] {{webarchive|url=https://web.archive.org/web/20130314063616/https://www.internetsociety.org/sites/default/files/GIUS2012-GlobalData-Table-20121120_0.pdf |date=14 March 2013 }}, Internet Society, 20 November 2012</ref>
{{sticky header}}

{| class= "wikitable"
{| class= "wikitable sticky-header"
|-
|-
! width="50%" | Question
! width="50%" | Question
Line 464: Line 464:
===Transparency of filtering or blocking activities===
===Transparency of filtering or blocking activities===
Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information.<ref name=Chadwick-2009/> For example:
Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information.<ref name=Chadwick-2009/> For example:
* [[Internet censorship in Saudi Arabia|Saudi Arabia]] and the [[Internet in the United Arab Emirates|United Arab Emirates]] (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly [[pornographic]] or considered un-Islamic.
* [[censorship in Saudi Arabia#Censorship on various platforms|Saudi Arabia]] and the [[telecommunications in the United Arab Emirates#Internet censorship|United Arab Emirates]] (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly [[pornography|pornographic]] or considered un-Islamic.
* In contrast, countries such as [[Internet censorship in China|China]] and [[Internet censorship in Tunisia|Tunisia]] send users a false error indication. China blocks requests by users for a banned website at the [[Transport layer|router level]] and a connection error is returned, effectively preventing the user's [[IP address]] from making further [[HTTP]] requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of [[SmartFilter]], the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
* In contrast, countries such as [[Internet censorship in China|China]] and [[Internet censorship in Tunisia|Tunisia]] send users a false error indication. China blocks requests by users for a banned website at the [[Transport layer|router level]] and a connection error is returned, effectively preventing the user's [[IP address]] from making further [[HTTP]] requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of [[Secure Computing Corporation|SmartFilter]], the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
* In [[Internet censorship in Uzbekistan|Uzbekistan]], users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.<ref>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| page = 331 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref>
* In [[Internet censorship in Uzbekistan|Uzbekistan]], users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.<ref>{{Cite book| last = Chadwick| first = Andrew| title = Routledge handbook of Internet politics| publisher = Taylor and Francis| series = Routledge international handbooks| year = 2009| page = 331 | url = https://books.google.com/books?id=GJdfuGSa1xUC| isbn = 978-0-415-42914-6}}</ref>


===Arab Spring===
===Arab Spring===
{{See also|Internet censorship in the Arab Spring|Internet in Egypt#2011 Internet shutdown|Free speech in the media during the 2011 Libyan Civil War}}
{{See also|Internet censorship in the Arab Spring|Internet in Egypt#2011 Internet shutdown|Free speech in the media during the Libyan civil war (2011)}}


During the [[Arab Spring]] of 2011, media [[jihad]] (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, "we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world".<ref>[http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ "The Arab Spring's Cascading Effects"] {{webarchive|url=https://web.archive.org/web/20110227051329/http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ |date=27 February 2011 }}, Philip N. Howard, Miller-McCune, 23 February 2011</ref>
During the [[Arab Spring]] of 2011, media [[jihad]] (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, "we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world".<ref>[http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ "The Arab Spring's Cascading Effects"] {{webarchive|url=https://web.archive.org/web/20110227051329/http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ |date=27 February 2011 }}, Philip N. Howard, Miller-McCune, 23 February 2011</ref>


This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt<ref name="jamescowie_techdetails_Egyptfullblock"/><ref name="IDGnews_Egyptfullblock"/><ref>[http://monkey.org/~labovit/blog//viewpage.php?page=middle_east_scorecard_feb20 "Middle East Political Protest And Internet Traffic Report: February 12–20, 2011"] {{Webarchive|url=https://web.archive.org/web/20110225204810/http://monkey.org/~labovit/blog/viewpage.php?page=middle_east_scorecard_feb20 |date=25 February 2011 }}, Craig Labovitz, Arbor Networks</ref> and [[Free speech in the media during the 2011 Libyan civil war|Libya]] in 2011.<ref name=Libya-RWB-2011/><ref name="Analysis of Egyptian and Libyan outages">{{cite web| url=http://www.caida.org/publications/papers/2011/outages_censorship/outages_censorship.pdf| title=Analysis of Country-wide Internet Outages Caused by Censorship| last=Dainotti| year=2011| publisher=ACM| display-authors=etal| access-date=14 April 2012| archive-date=17 June 2012| archive-url=https://web.archive.org/web/20120617034714/http://www.caida.org/publications/papers/2011/outages_censorship/outages_censorship.pdf| url-status=live}}</ref> In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of [[Al Jazeera Media Network|Al Jazeera]], [[BBC News]], Syrian satellite broadcaster [[Orient TV]], and Dubai-based [[Al Arabiya]] TV.<ref>[http://opennet.net/syrian-electronic-army-disruptive-attacks-and-hyped-targets "Syrian Electronic Army: Disruptive Attacks and Hyped Targets"] {{Webarchive|url=https://web.archive.org/web/20180720171155/https://opennet.net/syrian-electronic-army-disruptive-attacks-and-hyped-targets |date=20 July 2018 }}, OpenNet Initiative, 25 June 2011</ref>
This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt<ref name="jamescowie_techdetails_Egyptfullblock"/><ref name="IDGnews_Egyptfullblock"/><ref>[http://monkey.org/~labovit/blog//viewpage.php?page=middle_east_scorecard_feb20 "Middle East Political Protest And Internet Traffic Report: February 12–20, 2011"] {{Webarchive|url=https://web.archive.org/web/20110225204810/http://monkey.org/~labovit/blog/viewpage.php?page=middle_east_scorecard_feb20 |date=25 February 2011 }}, Craig Labovitz, Arbor Networks</ref> and [[Free speech in the media during the Libyan civil war (2011)|Libya]] in 2011.<ref name=Libya-RWB-2011/><ref name="Analysis of Egyptian and Libyan outages">{{cite web| url=http://www.caida.org/publications/papers/2011/outages_censorship/outages_censorship.pdf| title=Analysis of Country-wide Internet Outages Caused by Censorship| last=Dainotti| year=2011| publisher=ACM| display-authors=etal| access-date=14 April 2012| archive-date=17 June 2012| archive-url=https://web.archive.org/web/20120617034714/http://www.caida.org/publications/papers/2011/outages_censorship/outages_censorship.pdf| url-status=live}}</ref> In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of [[Al Jazeera Media Network|Al Jazeera]], [[BBC News]], Syrian satellite broadcaster [[Orient News|Orient TV]], and Dubai-based [[Al Arabiya]] TV.<ref>[http://opennet.net/syrian-electronic-army-disruptive-attacks-and-hyped-targets "Syrian Electronic Army: Disruptive Attacks and Hyped Targets"] {{Webarchive|url=https://web.archive.org/web/20180720171155/https://opennet.net/syrian-electronic-army-disruptive-attacks-and-hyped-targets |date=20 July 2018 }}, OpenNet Initiative, 25 June 2011</ref>


In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved [[Internet censorship in Tunisia|Tunisia]] and [[Internet censorship in Egypt|Egypt]] from its "Internet enemies" list to its list of countries "under surveillance"<ref>[http://en.rsf.org/surveillance-egypt,39740.html "Countries under surveillance: Egypt"] {{webarchive|url=https://web.archive.org/web/20160304060153/http://en.rsf.org/surveillance-egypt,39740.html |date=4 March 2016 }}, Reporters Without Borders, March 2011</ref> and in 2012 dropped [[Free speech in the media during the Libyan civil war|Libya]] from the list entirely.<ref name=RWBEnemies2012/><!-- defined by template:RWB Internet lists --> At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring.<ref>[http://www.future500.org/blog/censorship-fallout-from-the-arab-spring/ "Censorship fallout from the Arab Spring?"] {{webarchive|url=https://web.archive.org/web/20120126060054/http://www.future500.org/blog/censorship-fallout-from-the-arab-spring/ |date=26 January 2012 }}, Juliette Terzieff, The Future 500, 29 June 2011</ref><ref>[http://ca.reuters.com/article/technologyNews/idCATRE78R3CM20110928?pageNumber=1&virtualBrandChannel=0 "Insight: Social media – a political tool for good or evil?"] {{Webarchive|url=https://web.archive.org/web/20111106132945/http://ca.reuters.com/article/technologyNews/idCATRE78R3CM20110928?pageNumber=1&virtualBrandChannel=0 |date=6 November 2011 }}, Peter Apps, Reuters Canada, 28 September 2011</ref> However, in 2013, Libyan communication company [[Libya Telecom & Technology|LTT]] blocked the pornographic websites.<ref>{{Cite web|url=https://www.libya-businessnews.com/2013/09/13/ltt-blocks-pornographic-websites/|title=LTT Blocks Pornographic Websites|date=13 September 2013|access-date=10 August 2017|archive-date=11 August 2017|archive-url=https://web.archive.org/web/20170811010930/https://www.libya-businessnews.com/2013/09/13/ltt-blocks-pornographic-websites/|url-status=live}}</ref> It even blocked the family-filtered videos of ordinary websites like [[Dailymotion]].<ref>{{Cite journal|last=Shishkina|first=Alisa|date=November 2018|title=Internet Censorship in Arab Countries: Religious and Moral Aspects|journal=Religions|volume=9|issue=11|pages=358|doi=10.3390/rel9110358|doi-access=free}}</ref>
In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved [[Internet censorship in Tunisia|Tunisia]] and [[Internet in Egypt#Censorship|Egypt]] from its "Internet enemies" list to its list of countries "under surveillance"<ref>[http://en.rsf.org/surveillance-egypt,39740.html "Countries under surveillance: Egypt"] {{webarchive|url=https://web.archive.org/web/20160304060153/http://en.rsf.org/surveillance-egypt,39740.html |date=4 March 2016 }}, Reporters Without Borders, March 2011</ref> and in 2012 dropped [[Free speech in the media during the Libyan civil war|Libya]] from the list entirely.<ref name=RWBEnemies2012/><!-- defined by template:RWB Internet lists --> At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring.<ref>[http://www.future500.org/blog/censorship-fallout-from-the-arab-spring/ "Censorship fallout from the Arab Spring?"] {{webarchive|url=https://web.archive.org/web/20120126060054/http://www.future500.org/blog/censorship-fallout-from-the-arab-spring/ |date=26 January 2012 }}, Juliette Terzieff, The Future 500, 29 June 2011</ref><ref>[http://ca.reuters.com/article/technologyNews/idCATRE78R3CM20110928?pageNumber=1&virtualBrandChannel=0 "Insight: Social media – a political tool for good or evil?"] {{Webarchive|url=https://web.archive.org/web/20111106132945/http://ca.reuters.com/article/technologyNews/idCATRE78R3CM20110928?pageNumber=1&virtualBrandChannel=0 |date=6 November 2011 }}, Peter Apps, Reuters Canada, 28 September 2011</ref> However, in 2013, Libyan communication company [[Libya Telecom & Technology|LTT]] blocked the pornographic websites.<ref>{{Cite web|url=https://www.libya-businessnews.com/2013/09/13/ltt-blocks-pornographic-websites/|title=LTT Blocks Pornographic Websites|date=13 September 2013|access-date=10 August 2017|archive-date=11 August 2017|archive-url=https://web.archive.org/web/20170811010930/https://www.libya-businessnews.com/2013/09/13/ltt-blocks-pornographic-websites/|url-status=live}}</ref> It even blocked the family-filtered videos of ordinary websites like [[Dailymotion]].<ref>{{Cite journal|last=Shishkina|first=Alisa|date=November 2018|title=Internet Censorship in Arab Countries: Religious and Moral Aspects|journal=Religions|volume=9|issue=11|pages=358|doi=10.3390/rel9110358|doi-access=free}}</ref>


===Russian invasion of Ukraine===
===Russian–Ukrainian War===
During the [[Russo-Ukrainian War]] in 2022, Russia was reported to have blocked the internet websites [[Twitter]] and [[Facebook]]. Facebook was noted as being suspended due to an objection to its policy of reviewing news stories for authenticity where they were produced by Russian state-backed media before allowing them to be published on its platform. It was subject to a total ban whereas Twitter was suspended regionally. Reports have identified that [[Virtual private network|VPN]] use has enabled people to circumvent the restrictions by installing software.<ref>{{Cite news |date=2022-02-26 |title=Ukraine invasion: Russia restricts social media access |language=en-GB |work=BBC News |url=https://www.bbc.com/news/technology-60533083 |access-date=2022-02-26 |archive-date=2 March 2022 |archive-url=https://web.archive.org/web/20220302202156/https://www.bbc.com/news/technology-60533083 |url-status=live }}</ref>
During the [[Russian invasion of Ukraine]] in 2022, Russia was reported to have blocked the internet websites [[Twitter]] and [[Facebook]]. Facebook was noted as being suspended due to an objection to its policy of reviewing news stories for authenticity where they were produced by Russian state-backed media before allowing them to be published on its platform. It was subject to a total ban whereas Twitter was suspended regionally. Reports have identified that [[Virtual private network|VPN]] use has enabled people to circumvent the restrictions by installing software.<ref>{{Cite news |date=2022-02-26 |title=Ukraine invasion: Russia restricts social media access |language=en-GB |work=BBC News |url=https://www.bbc.com/news/technology-60533083 |access-date=2022-02-26 |archive-date=2 March 2022 |archive-url=https://web.archive.org/web/20220302202156/https://www.bbc.com/news/technology-60533083 |url-status=live }}</ref>


It been reported that the [[European Union]] would seek to censor Russian media outlets regarded as producing propaganda.{{cn|date=March 2022}}
It been reported that the [[European Union]] would seek to censor Russian media outlets regarded as producing propaganda.{{cn|date=March 2022}}
Line 486: Line 486:
{{Col-1-of-2}}
{{Col-1-of-2}}
'''Organizations and projects'''
'''Organizations and projects'''
* [[Anonymous (group)|Anonymous]] – an online hacktivist collective that express its opposition to Internet censorship through protests and online hacking in several countries.
* [[Anonymous (hacker group)|Anonymous]] – an online hacktivist collective that express its opposition to Internet censorship through protests and online hacking in several countries.
* [[CIRCAMP]] (Cospol Internet Related Child Abusive Material Project) – a project of the European Chiefs of Police Task Force to combat commercial and organized distribution of [[child pornography]]
* [[CIRCAMP]] (Cospol Internet Related Child Abusive Material Project) – a project of the European Chiefs of Police Task Force to combat commercial and organized distribution of [[child pornography]]
* The [[Clean IT]] project – a European Union-funded project with the stated aim of suppressing terrorist activity
* The [[Clean IT project]] – a European Union-funded project with the stated aim of suppressing terrorist activity
* [[Electronic Frontier Foundation]] – an international non-profit digital rights advocacy and legal organization
* [[Electronic Frontier Foundation]] – an international non-profit digital rights advocacy and legal organization
* [[Financial Coalition Against Child Pornography]] – a coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that fund these operations
* [[Financial Coalition Against Child Pornography]] – a coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that fund these operations
* [[Freedom House]] – a U.S.-based non-profit that produces the ''Freedom on the Net'' reports, among others.
* [[Freedom House]] – a U.S.-based non-profit that produces the ''Freedom on the Net'' reports, among others.
* [[Global Internet Freedom Consortium]] (GIFC) – a consortium of organizations that develop and deploy anti-censorship technologies
* [[Global Internet Freedom Consortium]] (GIFC) – a consortium of organizations that develop and deploy anti-censorship technologies
* [[Global Internet Freedom Task Force]] (GIFT) – an initiative within the [[United States Department of State|U.S. Department of State]]
* [[NetFreedom Task Force|Global Internet Freedom Task Force]] (GIFT) – an initiative within the [[United States Department of State|U.S. Department of State]]
* [[International Freedom of Expression Exchange]] (IFEX) – a global network of non-governmental organizations that promotes and defends the right to freedom of expression
* [[IFEX (organization)|IFEX]] – a global network of non-governmental organizations that promotes and defends the right to freedom of expression
** [[Tunisia Monitoring Group]] – a coalition within IFEX that monitors free expression in Tunisia
** [[Tunisia Monitoring Group]] – a coalition within IFEX that monitors free expression in Tunisia
* [[Internet Governance Forum]] (IGF) – a United Nations multi-stakeholder policy dialogue initiative
* [[Internet Governance Forum]] (IGF) – a United Nations multi-stakeholder policy dialogue initiative
Line 500: Line 500:
* [[Lumen (website)|Lumen]] (formerly Chilling Effects) – a joint project of the Electronic Frontier Foundation and several U.S. university law schools and clinics
* [[Lumen (website)|Lumen]] (formerly Chilling Effects) – a joint project of the Electronic Frontier Foundation and several U.S. university law schools and clinics
* [[NetBlocks]] - a global watchdog organization that monitors cybersecurity and the [[Internet governance|governance of the Internet]]
* [[NetBlocks]] - a global watchdog organization that monitors cybersecurity and the [[Internet governance|governance of the Internet]]
* [[Open Observatory of Network Interference (OONI)]] - is a free software, global observation network created to detect censorship, surveillance and traffic manipulation on the internet
* [[OONI]] - a free software, global observation network created to detect censorship, surveillance and traffic manipulation on the internet
* [[Open Technology Fund]] (OTF) – a U.S. Government funded program created in 2012 at Radio Free Asia to support global Internet freedom technologies
* [[Open Technology Fund]] (OTF) – a U.S. Government funded program created in 2012 at Radio Free Asia to support global Internet freedom technologies
* [[OpenNet Initiative]] – a joint project to monitor and report on Internet filtering and surveillance practices by nations
* [[OpenNet Initiative]] – a joint project to monitor and report on Internet filtering and surveillance practices by nations
* [[Peacefire]] – a U.S.-based website dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18"
* [[Peacefire]] – a U.S.-based website dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18"
* [[The Pirate Party]] – a political movement that aims to reform laws regarding [[copyright]] and patents, strengthen the [[right to privacy]], and increase the [[Transparency (social)|transparency of state administration]]
* [[Pirate Parties International]] – a political movement that aims to reform laws regarding [[copyright]] and patents, strengthen the [[right to privacy]], and increase the [[Transparency (behavior)|transparency of state administration]]
* ''[[Reporters sans frontières]]'' ([[Reporters Without Borders]]) – a France-based international non-governmental organization that advocates freedom of the press
* ''[[Reporters sans frontières]]'' ([[Reporters Without Borders]]) – a France-based international non-governmental organization that advocates freedom of the press
{{Col-2-of-2}}
{{Col-2-of-2}}
Line 510: Line 510:
'''Topics'''
'''Topics'''
* [[Accountability software]]
* [[Accountability software]]
* [[Anti-copyright]]
* [[Block (Internet)]] – a technical measure intended to restrict access to information or resources
* [[Block (Internet)]] – a technical measure intended to restrict access to information or resources
* [[Cleanfeed (content blocking system)|Cleanfeed]] – a content blocking system in use in the UK and Canada
* [[Cleanfeed (content blocking system)|Cleanfeed]] – a content blocking system in use in the UK and Canada
* [[Computer surveillance]]
* [[Computer and network surveillance]]
* [[criticism of copyright|Anti-copyright]]
* [[Content-control software]]
* [[criticism of copyright|Anti-copyright]]
* [[Criticism of copyright]]
* [[Cyber-dissident]]
* [[Cyber-dissident]]
* [[The Digital Imprimatur]] – a 2003 article about Internet censorship and [[digital rights management]] by [[John Walker (programmer)|John Walker]], co-founder of the [[computer-aided design]] software company [[Autodesk]]
* [[John Walker (programmer)#The digital imprimatur|The Digital Imprimatur]] – a 2003 article about Internet censorship and [[digital rights management]] by [[John Walker (programmer)|John Walker]], co-founder of the [[computer-aided design]] software company [[Autodesk]]
* [[Digital rights]]
* [[Digital rights]]
* [[Great Firewall]]
* [[For the children (politics)]]
* [[Great Firewall of China]]
* [[Internet censorship circumvention]]
* [[Internet censorship circumvention]]
* [[Internet filter]]
* [[Internet police]]
* [[Internet police]]
* [[Internet activism]]
* [[Internet activism]]
Line 542: Line 543:
*** [[Stop Online Piracy Act]] (SOPA) – a proposed US law
*** [[Stop Online Piracy Act]] (SOPA) – a proposed US law
*** [[Protests against SOPA and PIPA]]
*** [[Protests against SOPA and PIPA]]
** [[Federal law of Russian Federation no. 139-FZ of 2012-07-28]] – a Russian law
** [[Russian Internet Restriction Bill|Federal law of Russian Federation no. 139-FZ of 2012-07-28]] – a Russian law
** [[Trans-Pacific Partnership]] (TPP) – a proposed multilateral Free Trade Agreement that includes controversial intellectual property provisions
** [[Trans-Pacific Partnership]] (TPP) – a proposed multilateral Free Trade Agreement that includes controversial intellectual property provisions
* [[List of content-control software]]
* [[Comparison of content-control software and providers|List of content-control software]]
* [[Parental controls]]
* [[Parental controls]]
* [[Political repression of cyber-dissidents]]
* [[Political repression of cyber-dissidents]]
* [[Right to Internet access]]
* [[Right to Internet access]]
* [[River crab (Internet slang)]]
* [[River crab (Internet slang)]]
* [[Scientology versus the Internet]]
* [[Scientology and the Internet]]
* [[Sociology of the Internet]]
* [[Sociology of the Internet]]
* [[Splinternet]]
* [[Splinternet]]
* [[Notice and take down|Takedown notice]]
* [[Notice and take down|Takedown notice]]
* [[Web filtering]]
* [[Think of the children]]
* [[World Day Against Cyber Censorship]]
* [[World Day Against Cyber Censorship]]
{{Col end}}
{{Col end}}

Revision as of 01:39, 17 November 2024

Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org, for example) but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible.[1] Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.[2][3]

The extent of Internet censorship varies on a country-to-country basis. While some countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress and silence discussion among citizens.[3] Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring. Other types of censorship include the use of copyrights, defamation, harassment, and various obscene material claims as a way to deliberately suppress content.

Support for and opposition to Internet censorship also varies. In a 2012 Internet Society survey, 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey, 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "freedom of expression should be guaranteed on the Internet". Perception of internet censorship in the US is largely based on the First Amendment and the right for expansive free speech and access to content without regard to the consequences.[4] According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for increased user privacy.[5]

Overview

Many of the challenges associated with Internet censorship are similar to those for offline censorship of more traditional media such as newspapers, magazines, books, music, radio, television, and film. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.[6]

Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:

  • A 1993 Time Magazine article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."[7]
  • In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.[8]
  • A report of research conducted in 2007 and published in 2009 by the Berkman Klein Center for Internet & Society at Harvard University stated that: "We are confident that the [censorship circumvention] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools."[9]
  • In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."[6]

Blocking and filtering can be based on relatively static blacklists or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, e.g., in libraries, universities or Internet cafés.[3] Blocking and filtering may also vary within a country across different ISPs.[10] Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases, the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked website.[11]

Unless the censor has total control over all Internet-connected computers, such as in North Korea (who employs an intranet that only privileged citizens can access), or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Hyphanet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.[6]

The term "splinternet" is sometimes used to describe the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.[12]

Content suppression methods

Technical censorship

Various parties are using different technical methods of preventing public access to undesirable resources, with varying levels of effectiveness, costs and side effects.

Blacklist

Entities mandating and implementing the censorship usually identify them by one of the following items: keywords, domain names and IP addresses. Lists are populated from different sources, ranging from private supplier through courts to specialized government agencies (Ministry of Industry and Information Technology of China, Islamic Guidance in Iran).[13]

As per Hoffmann, different methods are used to block certain websites or pages including DNS spoofing, blocking access to IPs, analyzing and filtering URLs, inspecting filter packets and resetting connections.[14]

Points of control

Enforcement of the censor-nominated technologies can be applied at various levels of countries and Internet infrastructure:[13]

  • Internet backbone, including Internet exchange points (IXP) with international networks (Autonomous Systems), operators of submarine communications cables, satellite Internet access points, international optical fibre links etc. In addition to facing huge performance challenges due to large bandwidths involved, these do not give censors access to information exchanged within the country.
  • Internet Service Providers, which involves installation of voluntary (such as in the UK) or mandatory (such as in Russia) Internet surveillance and blocking equipment.
  • Individual institutions, which in most cases implement some form of Internet access controls to enforce their own policies, but, especially in case of public or educational institutions, may be requested or coerced to do this on the request from the government.
  • Personal devices, whose manufacturers or vendors may be required by law to install censorship software.
  • Application service providers (e.g. social media companies), who may be legally required to remove particular content. Foreign providers with business presence in given country may be also coerced into restricting access to specific contents for visitors from the requesting country.
  • Certificate authorities may be required to issue counterfeit X.509 certificates controlled by the government, allowing man-in-the-middle surveillance of TLS encrypted connections.
  • Content Delivery Network providers who tend to aggregate large amounts of content (e.g. images) may be also an attractive target for censorship authorities.

Approaches

Internet content is subject to technical censorship methods, including:[3][6]

  • Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses[citation needed]. Due to challenges with geopositioning, geo-blocking is normally implemented via IP address blocking.
  • Domain name system (DNS) filtering and redirection: Connections to blocked domain names are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative DNS resolver that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser.
  • Uniform Resource Locator (URL) filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.[15]
  • Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections – such as VPN and TLS/SSL – to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.
  • Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.[16]
  • Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). A circumvention method could be to use a satellite ISP to access Internet.[17]
  • Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect to censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove Neo-Nazi and other listings in compliance with German and French law.[18]
  • Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.[19]

Over and under blocking

Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired.[6] An example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.[20]

Use of commercial filtering software

Screenshot of Websense blocking Facebook in an organization where it has been configured to block a category named "Personals and Dating"

Writing in 2009, Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an op-ed contributor to The New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf filtering software sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.[21][22]

Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK.[23] Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper[24] is used in Qatar, the UAE, and Yemen.[25] The Canadian organization CitizenLab has reported that Sandvine and Procera products are used in Turkey and Egypt.[26]

On 12 March 2013, in a Special Report on Internet Surveillance, Reporters Without Borders named five "Corporate Enemies of the Internet": Amesys (France), Blue Coat Systems (U.S.), Gamma (UK and Germany), HackingTeam (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.[27]

In a U.S. lawsuit filed in May 2011, Cisco is accused of helping the Chinese government build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents.[28] Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.[29]

Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....[25] The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.[21] The blocking of Dailymotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing Dailymotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked Dailymotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to Dailymotion was gradually restored in Tunisia.[30]

Organizations such as the Global Network Initiative, the Electronic Frontier Foundation, Amnesty International, and the American Civil Liberties Union have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.[31][32][33] Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.[25]

Non-technical censorship

PDF about countries that criminalize free speech

Internet content is also subject to censorship methods similar to those used with more traditional media. For example:[6]

  • Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
  • Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
  • Publishers and authors may accept bribes to include, withdraw, or slant the information they present.
  • Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
  • Publishers, authors, and ISPs may be subject to civil lawsuits.
  • Equipment may be confiscated and/or destroyed.
  • Publishers and ISPs may be closed or required licenses may be withheld or revoked.
  • Publishers, authors, and ISPs may be subject to boycotts.
  • Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.[34]
  • Publishers, authors, and their families may be threatened with or actually lose their jobs.
  • Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.[35][36]
  • Censors may create their own online publications and Web sites to guide online opinion.[35]
  • Access to the Internet may be limited due to restrictive licensing policies or high costs.
  • Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.
  • Access to search results may be restricted due to government involvement in the censorship of specific search terms, content may be excluded due to terms set with search engines. By allowing search engines to operate in new territory they must agree to abide to censorship standards set by the government in that country.[37]

Censorship of users by web service operators

Removal of user accounts based on controversial content

Deplatforming is a form of Internet censorship in which controversial speakers or speech are suspended, banned, or otherwise shut down by social media platforms and other service providers that generally provide a venue for free speech or expression.[38] Banking and financial service providers, among other companies, have also denied services to controversial activists or organizations, a practice known as "financial deplatforming".

Law professor Glenn Reynolds dubbed 2018 the "Year of Deplatforming", in an August 2018 article in The Wall Street Journal.[38] According to Reynolds, in 2018 "the internet giants decided to slam the gates on a number of people and ideas they don't like."[38] On 6 August 2018, for example, several major platforms, including YouTube and Facebook, executed a coordinated, permanent ban on all accounts and media associated with conservative talk show host Alex Jones and his media platform InfoWars, citing "hate speech" and "glorifying violence."[39]

Official statements regarding site and content removal

Most major web service operators reserve to themselves broad rights to remove or pre-screen content, and to suspend or terminate user accounts, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of service agreements.

  • Facebook: Among other things, the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".[40]
  • Google: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act".[41]
    • Google Search: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."[42]
  • Twitter: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be copyright infringing without prior notice and at our sole discretion".[43]
  • YouTube: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".[44]
  • Wikipedia: The site's content may be modified or deleted by any editor as part of the normal process of editing and updating articles. Wikipedia's deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in the encyclopedia can propose its deletion. Such a page can be deleted by any administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for outright deletion of articles that are so clearly in violation of rules of the website that they do not need to undergo a full deletion discussion. All deletion decisions may be reviewed, either informally or formally. An additional means of hiding specific content within Wikipedia articles is revision deletion, or RevDel, by which an administrator can perform sanitization/redaction of specific revisions of an article, thereby hiding certain information from the view of non-administrators.[45][46]: 216 
  • Yahoo: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."[47]

Circumvention

Internet censorship circumvention is one of the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.[6]

Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, the dark web and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for an increased level of privacy.[5] The majority of circumvention techniques are not suitable for day to day use.[48]

There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries, individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.[3][49]

In June 2011, The New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."[50]

Another way to circumvent Internet censorship is to physically go to an area where the Internet is not censored. In 2017, a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where the Internet is regularly blocked.[51][52]

Increased use of HTTPS

The use of HTTPS versus what originally was HTTP in web searches created greater accessibility to most sites originally blocked or heavily monitored. Many social media sites including, Facebook, Google, and Twitter have added an automatic redirection to HTTPS as of 2017.[53] With the added adoption of HTTPS use, "censors" are left with limited options of either completely blocking all content or none of it.[54]

The use of HTTPS does not inherently prevent the censorship of an entire domain, as the domain name is left unencrypted in the ClientHello of the TLS handshake. The Encrypted Client Hello TLS extension expands on HTTPS and encrypts the entire ClientHello but this depends on both client and server support.[55][56]

Common targets

There are several motives or rationales for Internet filtering: politics and power, social norms and morals, and security concerns. Protecting existing economic interests is an additional emergent motive for Internet filtering. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.[11]

Politics and power

Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.[11]

Examples include:

Social norms

Social filtering is censorship of topics that are held to be antithetical to accepted societal norms.[11] In particular censorship of child pornography and content deemed inappropriate for children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries.

Examples include:

Security concerns

Many organizations implement filtering as part of a defense in depth strategy to protect their environments from malware,[62] and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment.

Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.[11]

Examples include:

The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.[11]

Anti-copyright activists Christian Engström, Rick Falkvinge and Oscar Swartz have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.[65]

Examples include:

Network tools

Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.[11]

Examples include:

Information about individuals

The right to be forgotten is a concept that has been discussed and put into practice in the European Union. In May 2014, the European Court of Justice ruled against Google in Costeja, a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in La Vanguardia newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid.[72] He initially attempted to have the article removed by complaining to Spain's data protection agency—Agencia Española de Protección de Datos—which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results.[73] Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in Costeja that search engines are responsible for the content they point to and thus, Google was required to comply with EU data privacy laws.[74][75] It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.[76]

Index on Censorship claimed that "Costeja ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court's decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."[77]

Resilience

Various contexts influence whether or not an internet user will be resilient to censorship attempts. Users are more resilient to censorship if they are aware that information is being manipulated. This awareness of censorship leads to users finding ways to circumvent it. Awareness of censorship also allows users to factor this manipulation into their belief systems. Knowledge of censorship also offers some citizens incentive to try to discover information that is being concealed. In contrast, those that lack awareness of censorship cannot easily compensate for information manipulation.[78]

Other important factors for censorship resiliency are the demand for the information being concealed, and the ability to pay the costs to circumvent censorship. Entertainment content is more resilient to online censorship than political content, and users with more education, technology access, and wider, more diverse social networks are more resilient to censorship attempts.[78]

Around the world

As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle East/North Africa.

Countries in other regions also practice certain forms of filtering. In the United States, state-mandated Internet filtering occurs on some computers in libraries and K-12 schools. Content related to Nazism or Holocaust denial is blocked in France and Germany. Child pornography and hate speech are blocked in many countries throughout the world.[79] In fact, many countries throughout the world, including some democracies with long traditions of strong support for freedom of expression and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.[80]

Internet censorship in China is among the most stringent in the world. The government blocks Web sites that discuss the Dalai Lama, the 1989 crackdown on Tiananmen Square protesters, the banned spiritual practice Falun Gong, as well as many general Internet sites.[81] The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including Facebook, Twitter, and YouTube.[82] According to a study in 2014,[83] censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government.

There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".[84]

International concerns

Generally, national laws affecting content within a country only apply to services that operate within that country and do not affect international services, but this has not been established clearly by international case law. There are concerns that due to the vast differences in freedom of speech between countries, that the ability for one country to affect speech across the global Internet could have chilling effects.

For example, Google had won a case at the European Court of Justice in September 2019 that ruled that the EU's right to be forgotten only applied to services within the EU, and not globally.[85] But in a contrary decision in October 2019, the same court ruled that Facebook was required to globally comply with a takedown request made in relationship to defamatory material that was posted to Facebook by an Austrian that was libelous of another, which had been determined to be illegal under Austrian laws. The case created a problematic precedent that the Internet may become subject to regulation under the strictest national defamation laws, and would limit free speech that may be acceptable in other countries.[86]

Internet shutdowns

Several governments have resorted to shutting down most or all Internet connections in all or part of the country.

This appears to have been the case on 27 and 28 January 2011 during the 2011 Egyptian revolution, in what has been widely described as an "unprecedented" internet block.[87][88] About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January.[87] This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."[87] Full blocks also occurred in Myanmar/Burma in 2007,[89] Libya in 2011,[90] Iran in 2019,[91] and Syria during the Syrian civil war.

Almost all Internet connections in Sudan were disconnected from 3 June to 9 July 2019, in response to a political opposition sit-in seeking civilian rule.[92][93] A near-complete shutdown in Ethiopia lasted for a week after the Amhara Region coup attempt.[94] A week-long shutdown in Mauritania followed disputes over the 2019 Mauritanian presidential election.[95] Other country-wide shutdowns in 2019 include Zimbabwe after a gasoline price protests triggered police violence, Gabon during the 2019 Gabonese coup attempt, and during or after elections in Democratic Republic of the Congo, Benin, Malawi, and Kazakhstan.[96]

Local shutdowns are frequently ordered in India during times of unrest and security concerns.[97][98] Some countries have used localized Internet shutdowns to combat cheating during exams, including Iraq,[99] Ethiopia, India, Algeria, and Uzbekistan.[96]

The Iranian government imposed a total internet shutdown from 16 to 23 November 2019, in response to the fuel protests.[100] Doug Madory, the director of Internet analysis at Oracle, has described the operation as "unusual in its scale" and way more advanced.[101] Beginning Saturday afternoon on 16 November 2019, the government of Iran ordered the disconnection of much of the country's internet connectivity as a response to widespread protests against the government's decision to raise gas prices. While Iran is no stranger to government-directed interference in its citizens’ access to the internet, this outage is notable in how it differs from past events. Unlike previous efforts at censorship and bandwidth throttling, the internet of Iran is presently experiencing a multi-day wholesale disconnection for much of its population – arguably the largest such event ever for Iran.[101][102][103]

World map showing the status of YouTube blocking

Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, V-Dem Institute, Access Now and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports.[104] The ratings produced by several of these organizations are summarized in the Internet censorship and surveillance by country and the Censorship by country articles.

OpenNet Initiative reports

Through 2010, the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.[25] The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Egypt, France, Germany, India, Ukraine, United Kingdom, and United States), while one was found to engage in pervasive filtering in all three areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).[6][105]

Freedom on the Net reports

The Freedom on the Net reports from Freedom House provide analytical reports and numerical ratings regarding the state of Internet freedom for countries worldwide.[106] The countries surveyed represent a sample with a broad range of geographical diversity and levels of economic development, as well as varying levels of political and media freedom. The surveys ask a set of questions designed to measure each country's level of Internet and digital media freedom, as well as the access and openness of other digital means of transmitting information, particularly mobile phones and text messaging services. Results are presented for three areas: Obstacles to Access, Limits on Content, and Violations of User Rights. The results from the three areas are combined into a total score for a country (from 0 for best to 100 for worst) and countries are rated as "Free" (0 to 30), "Partly Free" (31 to 60), or "Not Free" (61 to 100) based on the totals.

Starting in 2009 Freedom House has produced nine editions of the report.[107][108][109][110][111][112][113][114][106] There was no report in 2010. The reports generally cover the period from June through May.

Freedom on the Net Survey Results
  2009[107] 2011[108] 2012[109] 2013[110] 2014[111] 2015[112] 2016[113] 2017[114] 2018[106]
Countries 15 37 47 60 65 65 65 65 65
Free   4 (27%)   8 (22%) 14 (30%) 17 (29%) 19 (29%) 18 (28%) 17 (26%) 16 (25%) 15 (23%)
Partly free   7 (47%) 18 (49%) 20 (43%) 29 (48%) 31 (48%) 28 (43%) 28 (43%) 28 (43%) 30 (46%)
Not free   4 (27%) 11 (30%) 13 (28%) 14 (23%) 15 (23%) 19 (29%) 20 (31%) 21 (32%) 20 (31%)
Improved n/a   5 (33%) 11 (31%) 12 (26%) 12 (18%) 15 (23%) 34 (52%) 32 (49%) 19 (29%)
Declined n/a   9 (60%) 17 (47%) 28 (60%) 36 (55%) 32 (49%) 14 (22%) 13 (20%) 26 (40%)
No change n/a   1   (7%)   8 (22%)   7 (15%) 17 (26%) 18 (28%) 17 (26%) 20 (31%) 20 (31%)

The 2014 report assessed 65 countries and reported that 36 countries experienced a negative trajectory in Internet freedom since the previous year, with the most significant declines in Russia, Turkey and Ukraine. According to the report, few countries demonstrated any gains in Internet freedom, and the improvements that were recorded reflected less vigorous application of existing controls rather than new steps taken by governments to actively increase Internet freedom. The year's largest improvement was recorded in India, where restrictions to content and access were relaxed from what had been imposed in 2013 to stifle rioting in the northeastern states. Notable improvement was also recorded in Brazil, where lawmakers approved the bill Marco Civil da Internet, which contains significant provisions governing net neutrality and safeguarding privacy protection.[111]

Reporters Without Borders (RSF)

RWB "Internet enemies" and "countries under surveillance" lists

In 2006, Reporters without Borders (Reporters sans frontières, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet".[115] The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users."[116] In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added.[117]

When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. The list was not updated in 2013. In 2014 the list grew to 19 with an increased emphasis on surveillance in addition to censorship. The list has not been updated since 2014.

When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 11. The number grew to 12 with the addition of Norway in 2020. The list was last updated in 2020.[citation needed]

RWB Special report on Internet Surveillance

On 12 March 2013, Reporters Without Borders published a Special report on Internet Surveillance.[27] The report includes two new lists:

  • a list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights; and
  • a list of "Corporate Enemies of the Internet", companies that sell products that are liable to be used by governments to violate human rights and freedom of information.

The five "State Enemies of the Internet" named in March 2013 are: Bahrain, China, Iran, Syria, and Vietnam.[27]

The five "Corporate Enemies of the Internet" named in March 2013 are: Amesys (France), Blue Coat Systems (U.S.), Gamma Group (UK and Germany), HackingTeam (Italy), and Trovicor (Germany).[27]

V-Dem Digital Societies Project

The V-Dem Digital Societies Project measures a range of questions related to internet censorship, misinformation online, and internet shutdowns.[120] This annual report includes 35 indicators assessing five areas: disinformation, digital media freedom, state regulation of digital media, polarization of online media, and online social cleavages.[121] The data set uses V-Dem's methodology of aggregating surveys of experts from around the world.[121] It has been updated each year starting in 2019, with data covering from 2000–2021.[121] These ratings are more similar to other expert analyses like Freedom House than remotely sensed data from Access Now.[122]

Access Now #KeepItOn

Access Now maintains an annual list of internet shutdowns, throttling, and blockages as part of the #KeepItOn project.[122][123][124] These data track several features of shutdowns including their location, their duration, the particular services impacted, the government's justification for the shutdown, and actual reasons for the shutdown as reported by independent media.[125] Unlike Freedom House or V-Dem, Access Now detects shutdowns using remote sensing and then confirms these instances with reports from civil society, government, in-country volunteers, or ISPs.[125][122] These methods have been found to be less prone to false positives.[122]

BBC World Service global public opinion poll

A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[126] was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that:

Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most don't want governments to regulate it.[127]

Findings from the poll include:[127]

  • Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
  • Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
  • Opinion was evenly split between Internet users who felt that "the internet is a safe place to express my opinions" (48%) and those who disagreed (49%). Users in Germany and France agreed the least, followed by users in a highly filtered country such as China, while users in Egypt, India and Kenya agreed more strongly.[6]
  • The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%).
  • Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).[128] And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).[6]

Internet Society's Global Internet User Survey

In July and August 2012, the Internet Society conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.[129]

Transparency of filtering or blocking activities

Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information.[10] For example:

  • Saudi Arabia and the United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly pornographic or considered un-Islamic.
  • In contrast, countries such as China and Tunisia send users a false error indication. China blocks requests by users for a banned website at the router level and a connection error is returned, effectively preventing the user's IP address from making further HTTP requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
  • In Uzbekistan, users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.[131]

Arab Spring

During the Arab Spring of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, "we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world".[132]

This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt[87][88][133] and Libya in 2011.[90][134] In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based Al Arabiya TV.[135]

In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance"[136] and in 2012 dropped Libya from the list entirely.[118] At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring.[137][138] However, in 2013, Libyan communication company LTT blocked the pornographic websites.[139] It even blocked the family-filtered videos of ordinary websites like Dailymotion.[140]

Russian invasion of Ukraine

During the Russian invasion of Ukraine in 2022, Russia was reported to have blocked the internet websites Twitter and Facebook. Facebook was noted as being suspended due to an objection to its policy of reviewing news stories for authenticity where they were produced by Russian state-backed media before allowing them to be published on its platform. It was subject to a total ban whereas Twitter was suspended regionally. Reports have identified that VPN use has enabled people to circumvent the restrictions by installing software.[141]

It been reported that the European Union would seek to censor Russian media outlets regarded as producing propaganda.[citation needed]

See also

References

  1. ^ "What is Internet Censorship?". www.iplocation.net. Archived from the original on 1 May 2021. Retrieved 1 May 2021.
  2. ^ The Editorial Board (15 October 2018). "There May Soon Be Three Internets. America's Won't Necessarily Be the Best. - A breakup of the web grants privacy, security and freedom to some, and not so much to others". The New York Times. Archived from the original on 9 July 2021. Retrieved 16 October 2018.
  3. ^ a b c d e Schmidt, Eric E.; Cohen, Jared (11 March 2014). "The Future of Internet Freedom". The New York Times. Archived from the original on 12 December 2020. Retrieved 11 March 2014.
  4. ^ Goldberg, Erica (2016). "Free Speech Consequentialism". Columbia Law Review. 116 (3): 687–694. JSTOR 43783393.
  5. ^ a b Marcello Mari. How Facebook's Tor service could encourage a more open web Archived 10 June 2016 at the Wayback Machine. The Guardian. Friday 5 December 2014.
  6. ^ a b c d e f g h i j Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet Archived 28 September 2011 at the Wayback Machine, Dutton, March 2003
  7. ^ "First Nation in Cyberspace", Philip Elmer-Dewitt, Time, 6 December 1993, No.49
  8. ^ "Cerf sees government control of Internet failing" Archived 3 November 2020 at the Wayback Machine, Pedro Fonseca, Reuters, 15 November 2006
  9. ^ 2007 Circumvention Landscape Report: Methods, Uses, and Tools Archived 11 November 2011 at the Wayback Machine, Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009
  10. ^ a b Chadwick, Andrew (2009). Routledge handbook of Internet politics. Routledge international handbooks. Taylor and Francis. p. 332. ISBN 978-0-415-42914-6.
  11. ^ a b c d e f g h i "Measuring Global Internet Filtering" Archived 9 August 2020 at the Wayback Machine, Robert Faris and Nart Villeneuve, in Access Denied: The Practice and Policy of Global Internet Filtering Archived 26 February 2009 at the Wayback Machine, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
  12. ^ Lao Wai (21 October 2007). "I've Been Rivercrabbed!". An American in Beijing. Archived from the original on 11 August 2011. Retrieved 28 May 2011.
  13. ^ a b Jones, Ben; Feamster, Nick; Hall, Joseph; Adams, Stan; Aaron, Michael (23 August 2019). "A Survey of Worldwide Censorship Techniques". IETF. Archived from the original on 19 September 2020. Retrieved 30 September 2019.
  14. ^ Hoffman, Chris (22 September 2016). "How the "Great Firewall of China" Works to Censor China's Internet". www.howtogeek.com. How to geek. Archived from the original on 15 August 2018. Retrieved 15 August 2018.
  15. ^ For an example, see Wikipedia:Advice to users using Tor to bypass the Great Firewall
  16. ^ Tom Espiner (4 July 2006). "Academics break the Great Firewall of China". ZDNet. Archived from the original on 8 October 2009. Retrieved 5 April 2015.
  17. ^ Greenberg, Andy. "The Ingenious Way Iranians Are Using Satellite TV to Beam in Banned Internet". WIRED. Archived from the original on 8 November 2020. Retrieved 25 January 2018.
  18. ^ Google excluding controversial sites Archived 23 November 2020 at the Wayback Machine, Declan McCullagh, CNET News, 23 October 2002, 8:55 pm PDT. Retrieved 22 April 2007 00:40 UTC
  19. ^ "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army" Archived 14 May 2020 at the Wayback Machine, Helmi Noman, OpenNet Initiative, May 2011
  20. ^ "India blocks Yahoo! Groups" Archived 17 September 2018 at the Wayback Machine, Andrew Orlowski, The Register, 24 September 2003
  21. ^ a b Chadwick, Andrew (2009). Routledge handbook of Internet politics. Routledge international handbooks. Taylor and Francis. pp. 330–331. ISBN 978-0-415-42914-6.
  22. ^ "Political Repression 2.0" Archived 12 November 2020 at the Wayback Machine, Evgeny Morzov, Op-Ed Contributor to the New York Times, 1 September 2011
  23. ^ Glanville, Jo (17 November 2008). "The big business of net censorship". The Guardian. London. Archived from the original on 28 January 2013. Retrieved 11 December 2016.
  24. ^ "Internet content filtering" Archived 17 December 2013 at the Wayback Machine, Netsweeper, Inc. web site. Retrieved 1 September 2011
  25. ^ a b c d "West Censoring East: The Use of Western Technologies by Middle East Censors, 2010–2011" Archived 18 September 2018 at the Wayback Machine, Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011
  26. ^ "BAD TRAFFIC: Sandvine's PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?". The Citizen Lab. 9 March 2018. Archived from the original on 10 December 2020. Retrieved 10 May 2018.
  27. ^ a b c d The Enemies of the Internet Special Edition : Surveillance Archived 31 August 2013 at the Wayback Machine, Reporters Without Borders, 12 March 2013
  28. ^ "The Great Firewall of China". National Council for the Social Studies. 27 May 2016. Archived from the original on 29 March 2020. Retrieved 29 March 2020.
  29. ^ Somini Sengupta (2 September 2011). "Group Says It Has New Evidence of Cisco's Misdeeds in China". The New York Times. Archived from the original on 12 November 2020.
  30. ^ Chadwick, Andrew (2009). Routledge handbook of Internet politics. Routledge international handbooks. Taylor and Francis. pp. 323–324. ISBN 978-0-415-42914-6.
  31. ^ "R.I. ACLU releases report on "troubling" internet censorship in public libraries" (Press release). ACLU. 18 April 2005. Archived from the original on 5 December 2008. The Rhode Island affiliate, American Civil Liberties Union (April 2005). Reader's block: Internet censorship in Rhode Island public libraries (PDF) (Report). Archived from the original (PDF) on 6 September 2005.
  32. ^ Sutton, Maira; Timm, Trevor (7 November 2011). "This Week in Internet Censorship Egypt Imprisons Alaa, Other Pro-democracy Bloggers". Electronic Frontier Foundation. Archived from the original on 12 August 2020. Retrieved 27 March 2012.
  33. ^ China: Controls tighten as Internet activism grows Archived 25 September 2020 at the Wayback Machine "Cisco Systems, Microsoft, Nortel Networks, Websense and Sun Microsystems", citing Amnesty International: People's Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002.
  34. ^ "In Mexico, Social Media Become a Battleground in the Drug War" Archived 11 October 2012 at the Wayback Machine, J. David Goodman, The Lede, The New York Times, 15 September 2011
  35. ^ a b Provision of information in this fashion is in keeping with principles of freedom of expression, as long as it is done transparently and does not overwhelm alternative sources of information.
  36. ^ "China's growing army of paid internet commentators" Archived 13 October 2011 at the Wayback Machine, Sarah Cook and Maggie Shum, Freedom House, 11 October 2011
  37. ^ Farrell, Michael B (22 March 2010). "Google Ends Internet Censorship, Dares China to Make Next Move". link.galegroup.com. The Christian Science Monitor. Archived from the original on 17 January 2023. Retrieved 15 November 2018.
  38. ^ a b c Reynolds, Glenn Harlan (18 August 2018). "When Digital Platforms Become Censors". The Wall Street Journal. Archived from the original on 30 March 2019.
  39. ^ Chappell, Bill; Tsioulcas, Anastasia (6 August 2018). "YouTube, Apple and Facebook Ban Infowars, Which Decries 'Mega Purge'". NPR. Archived from the original on 3 May 2019. Retrieved 2 September 2018.
  40. ^ "Statement of Rights and Responsibilities" Archived 26 December 2018 at the Wayback Machine, Facebook, 26 April 2011. Retrieved 18 August 2011
  41. ^ "Google Terms of Service" Archived 15 December 2020 at the Wayback Machine, Policies & Principles, Google, Inc.. Retrieved 1 April 2012
  42. ^ "Why does Google remove sites from the Google index?" Archived 6 May 2007 at the Wayback Machine, Google Webmaster Tools Help. Retrieved 22 April 2007 00:43 UTC
  43. ^ "Terms of Service" Archived 15 December 2020 at the Wayback Machine, Twitter, 1 June 2011. Retrieved 18 August 2011
  44. ^ "Terms of Service" Archived 26 December 2016 at the Wayback Machine, YouTube, 9 June 2010. Retrieved 18 August 2011
  45. ^ West, Andrew Granville; Lee, Insup (October 2011). "What Wikipedia deletes: Characterizing dangerous collaborative content". Proceedings of the 7th International Symposium on Wikis and Open Collaboration. pp. 25–28. doi:10.1145/2038558.2038563. ISBN 978-1-4503-0909-7. S2CID 10396423.
  46. ^ Jemielniak, Dariusz (2014). Common Knowledge?: An Ethnography of Wikipedia. Stanford University Press.
  47. ^ "Yahoo! Terms of Service" Archived 18 July 2014 at the Wayback Machine, Yahoo!, 24 November 2008. Retrieved 18 August 2011
  48. ^ Roberts, H., Zuckerman, E., & Palfrey, J. (2009, March). 2007 Circumvention Landscape Report: Methods, Uses, and Tools (Rep.). Retrieved 18 March 2016, from The Berkman Center for Internet & Society at Harvard University.
  49. ^ "Risks" Archived 8 September 2011 at the Wayback Machine, Internet censorship wiki. Retrieved 2 September 2011
  50. ^ "U.S. Underwrites Internet Detour Around Censors" Archived 11 November 2020 at the Wayback Machine, James Glanz and John Markoff, The New York Times, 12 June 2011
  51. ^ Dahir, Abdi Latif (28 March 2017). "Reeling from an internet shutdown, startups in Cameroon have created an "internet refugee camp"". Quartz Africa. Archived from the original on 12 November 2020. Retrieved 30 January 2020.
  52. ^ Ritzen, Yarno (26 January 2018). "Cameroon internet shutdowns cost Anglophones millions". Al Jazeera. Archived from the original on 22 September 2020. Retrieved 30 January 2020.
  53. ^ Connolly, Amanda (27 January 2016). "Medium stands by journalists as Malaysia blocks the site". The Next Web. Archived from the original on 29 November 2020. Retrieved 26 April 2020.
  54. ^ Zittrain, Jonathan; Faris, Robert; Noman, Helmi; Clark, Justin; Tilton, Casey; Morrison-Westphal, Ryan (June 2017). "The Shifting Landscape of Global Internet Censorship" (PDF). Dash.Harvard.Edu. Archived (PDF) from the original on 6 December 2018. Retrieved 25 April 2020.
  55. ^ "Encrypting SNI: Fixing One of the Core Internet Bugs". The Cloudflare Blog. 24 September 2018. Archived from the original on 12 December 2020. Retrieved 22 August 2020.
  56. ^ Oku, Kazuho; Wood, Christopher; Rescorla, Eric; Sullivan, Nick (June 2020). "Encrypted Server Name Indication for TLS 1.3". IETF. Archived from the original on 16 July 2020. Retrieved 22 August 2020.
  57. ^ "Blog censorship gains support". CNET. Archived from the original on 29 May 2012. Retrieved 5 April 2015.
  58. ^ "Far Eastern Economic Review | China's Guerrilla War for the Web". 25 February 2009. Archived from the original on 25 February 2009. Retrieved 25 April 2020.
  59. ^ a b c d e f g h i j "Which Countries Censor the Internet?". Time Magazine. 23 November 2015. p. 36. Archived from the original on 12 November 2015. Retrieved 5 August 2023.
  60. ^ "Latest Stories From News.Com.Au". Archived from the original on 11 December 2008. Retrieved 8 December 2007.
  61. ^ Russia Bans the Wikipedia of Drugs Archived 11 November 2020 at the Wayback Machine The Fix 2013-02-28
  62. ^ "Why Malware Filtering Is Necessary in the Web Gateway". Gartner. 26 August 2008. Archived from the original on 18 October 2017. Retrieved 14 April 2012.
  63. ^ "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites" Archived 9 December 2020 at the Wayback Machine, OpenNet Initiative: Bulletin 009, 31 January 2005
  64. ^ "Federal authorities take on Anonymous hackers" Archived 9 December 2020 at the Wayback Machine, Associated Press in the Washington Post, 12 September 2011
  65. ^ Rick Falkvinge (9 July 2011). "The Copyright Lobby Absolutely Loves Child Pornography". TorrentFreak. Archived from the original on 9 December 2020. Retrieved 26 July 2012.
  66. ^ "YouTube Blocked in...Thailand". Mashable. 11 March 2007. Archived from the original on 9 August 2020. Retrieved 5 April 2015.
  67. ^ "China struggles to tame microblogging masses" Archived 4 November 2017 at the Wayback Machine, Agence France-Presse (AFP) in The Independent, 8 September 2011
  68. ^ "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries Archived 13 December 2020 at the Wayback Machine", Helmi Noman, OpenNet Initiative, March 2010
  69. ^ "Google Search & Cache Filtering Behind China's Great Firewall" Archived 8 August 2020 at the Wayback Machine, OpenNet Initiative: Bulletin 006, 3 September 2004
  70. ^ "Empirical Analysis of Google SafeSearch" Archived 4 March 2013 at the Wayback Machine, Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003
  71. ^ "China blocking Google". BBC News. 2 September 2002. Archived from the original on 11 December 2020. Retrieved 5 May 2010.
  72. ^ Julia Powles (15 May 2014). "What we can salvage from 'right to be forgotten' ruling". Wired.co.uk. Archived from the original on 16 May 2014. Retrieved 16 May 2014.
  73. ^ Solon, Olivia (13 May 2014). "People have the right to be forgotten, rules EU court". Wired.co.uk. Conde Nast Digital. Archived from the original on 14 May 2014. Retrieved 13 May 2014.
  74. ^ "EU court backs 'right to be forgotten' in Google case". BBC News. 13 May 2014. Archived from the original on 25 November 2020. Retrieved 13 May 2014.
  75. ^ "EU court rules Google must tweak search results in test of "right to be forgotten"". CBS News. 13 May 2014. Archived from the original on 3 December 2019. Retrieved 13 May 2014.
  76. ^ "Removal of Google personal information could become work intensive". Europe News.Net. Archived from the original on 21 October 2014. Retrieved 2 June 2014.
  77. ^ "Index blasts EU court ruling on "right to be forgotten"". indexoncensorship.org. 13 May 2014. Archived from the original on 19 September 2020. Retrieved 5 April 2015.
  78. ^ a b Roberts, Margaret E. (2020). "Resilience to Online Censorship". Annual Review of Political Science. 23: 401–419. doi:10.1146/annurev-polisci-050718-032837.
  79. ^ "Introduction" (PDF). Archived from the original (PDF) on 29 June 2012. Retrieved 14 September 2011., Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering Archived 26 February 2009 at the Wayback Machine, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
  80. ^ "Internet Filtering: The Politics and Mechanisms of Control" Archived 19 September 2020 at the Wayback Machine, Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering Archived 26 February 2009 at the Wayback Machine, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
  81. ^ "Internet Censorship in China". The New York Times. 28 December 2012. Archived from the original on 4 March 2016. Retrieved 9 March 2013.
  82. ^ Human Rights Watch (22 January 2012). World Report 2012: China. Archived from the original on 11 March 2013. Retrieved 9 March 2013.
  83. ^ G. King; et al. (22 August 2014). "Reverse-engineering censorship in China: Randomized experimentation and participant observation". Science. 345 (6199): 891. doi:10.1126/science.1251722. PMID 25146296. S2CID 5398090. Archived from the original on 24 August 2020. Retrieved 11 July 2019.
  84. ^ "WTO could challenge Internet censorship". Newsletter on Intellectual Freedom. 59 (1). Chicago: American Library Association: 6. January 2010. ProQuest 217137198.
  85. ^ Kelion, Leo (24 September 2019). "Google wins landmark right to be forgotten case". BBC. Archived from the original on 1 December 2020. Retrieved 3 October 2019.
  86. ^ Satariano, Adam (3 October 2019). "Facebook Can Be Forced to Delete Content, E.U.'s Top Court Rules". The New York Times. Archived from the original on 3 October 2019. Retrieved 3 October 2019.
  87. ^ a b c d Cowie, James. "Egypt Leaves the Internet". Renesys. Archived from the original on 29 January 2011. Retrieved 28 January 2011.
  88. ^ a b Kirk, Jeremy (28 January 2011). "With Wired Internet Locked, Egypt Looks to the Sky". IDG News/PC World. Archived from the original on 30 January 2011. Retrieved 28 January 2011.
  89. ^ "Pulling the Plug: A Technical Review of the Internet Shutdown in Burma". opennet.net. Archived from the original on 15 November 2020. Retrieved 5 April 2015.
  90. ^ a b "Journalists confined to their hotels, Internet disconnected". Reporters Without Borders. Archived from the original on 4 March 2016. Retrieved 21 March 2011.
  91. ^ Skinner, Helena (22 November 2019). "How did Iran's government pull the plug on the Internet?". euronews. Archived from the original on 27 November 2019. Retrieved 9 November 2020.
  92. ^ "Sudan's Internet Outage". NPR.org. Archived from the original on 8 August 2020. Retrieved 30 July 2019.
  93. ^ "Sudan internet shows signs of recovery after month-long shutdown". 9 July 2019. Archived from the original on 14 October 2020. Retrieved 30 July 2019.
  94. ^ "Ethiopia partially restores internet access days after blackout following reported Amhara coup attempt". 27 June 2019. Archived from the original on 14 October 2020. Retrieved 30 July 2019.
  95. ^ "Post-election internet shutdown in Mauritania following widespread mobile disruptions". 25 June 2019. Archived from the original on 19 November 2020. Retrieved 30 July 2019.
  96. ^ a b "Government that have shut down the Internet in 2019". 26 June 2019. Archived from the original on 1 November 2020. Retrieved 30 July 2019.
  97. ^ "Internet Shutdowns in India". internetshutdowns.in. Archived from the original on 16 November 2021. Retrieved 30 July 2019.
  98. ^ Krishna Mohan, Vaishnavi (30 January 2021). "Internet Shutdowns in India: From Kashmir to Haryana". Global Views 360. Archived from the original on 31 January 2021. Retrieved 30 January 2021.
  99. ^ "Iraq shuts down internet to prevent cheating in national science exams". 26 June 2019. Archived from the original on 27 October 2020. Retrieved 30 July 2019.
  100. ^ "Internet being restored in Iran after week-long shutdown". NetBlocks. 23 November 2019. Archived from the original on 28 November 2019. Retrieved 10 December 2019.
  101. ^ a b Ivana Kottasová and Sara Mazloumsaki (19 November 2019). "What makes Iran's internet blackout different". CNN. Archived from the original on 21 November 2019. Retrieved 9 November 2020.
  102. ^ "Iran shuts down country's internet in the wake of fuel protests". TechCrunch. 17 November 2019. Archived from the original on 25 November 2020. Retrieved 9 November 2020.
  103. ^ Mihalcik, Carrie. "Iran's internet has been shut down for days amid protests". CNET. Archived from the original on 26 November 2019. Retrieved 9 November 2020.
  104. ^ "2010 Country Reports on Human Rights Practices", Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011
  105. ^ Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship.
  106. ^ a b c "Freedom on the Net 2018" (PDF). Freedom House. November 2018. Archived from the original (PDF) on 1 November 2018. Retrieved 1 November 2018.
  107. ^ a b Freedom on the Net 2009 Archived 26 March 2018 at the Wayback Machine, Freedom House, accessed 16 April 2012
  108. ^ a b Freedom on the Net 2011 Archived 16 June 2018 at the Wayback Machine, Freedom House, accessed 15 April 2012
  109. ^ a b Freedom on the Net 2012 Archived 12 April 2019 at the Wayback Machine, Freedom House, accessed 24 September 2012
  110. ^ a b Freedom on the Net 2013 Archived 22 April 2018 at the Wayback Machine, Freedom House, 3 October 2013. Retrieved 12 October 2013.
  111. ^ a b c "Freedom on the Net 2014" (PDF). Freedom House. Archived (PDF) from the original on 12 April 2019. Retrieved 14 December 2014.
  112. ^ a b "Freedom on the Net 2015" (PDF). Freedom House. October 2015. Archived (PDF) from the original on 11 April 2019. Retrieved 27 December 2015.
  113. ^ a b "Freedom on the Net 2016" (PDF). Freedom House. October 2016. Archived (PDF) from the original on 12 April 2019. Retrieved 25 March 2018.
  114. ^ a b "Freedom on the Net 2017" (PDF). Freedom House. October 2017. Archived from the original (PDF) on 12 April 2019. Retrieved 25 March 2018.
  115. ^ List of the 13 Internet enemies Reporters Without Borders (Paris), 11 July 2006, .
  116. ^ "Internet enemies", Reporters Without Borders (Paris), 12 March 2009, Archived 16 March 2009 at the Wayback Machine.
  117. ^ Web 2.0 versus Control 2.0. Reporters Without Borders (Paris), 18 March 2010, Archived 14 March 2010 at the Wayback Machine.
  118. ^ a b c Internet Enemies Archived 2012-03-23 at the Wayback Machine, Reporters Without Borders (Paris), 12 March 2012
  119. ^ "Internet Enemies", Enemies of the Internet 2014: Entities at the heart of censorship and surveillance, Reporters Without Borders (Paris), 11 March 2014. Archived 12 March 2014 at the Wayback Machine. Retrieved 24 June 2014.
  120. ^ Mechkova, V., Daniel P., Brigitte S.,&Steven W. (2020). Digital Society Project Dataset v2.Varieties of Democracy (V-Dem) Project http://digitalsocietyproject.org/ Archived 19 May 2021 at the Wayback Machine
  121. ^ a b c Mechkova, Valeriya; Pemstein, Daniel; Seim, Brigitte; Wilson, Steven (2021). Digital Society Survey Codebook (PDF). Digital Society Project. Archived (PDF) from the original on 27 May 2021. Retrieved 27 May 2021.
  122. ^ a b c d Fletcher, Terry; Hayes-Birchler, Andria (30 July 2020). Comparing Measures of Internet Censorship: Analyzing the Tradeoffs between Expert Analysis and Remote Measurement. Data for Policy 2020, 15-17 September 2020. doi:10.5281/zenodo.3967398. S2CID 244992072. Archived from the original on 27 May 2021. Retrieved 27 May 2021.
  123. ^ Taye, B. (2020). Targeted, Cut Off, and Left in the DarkThe #KeepItOn Report on internet shutdowns in 2019. Access Now. https://www.accessnow.org/keepiton/
  124. ^ Taye, Berhan (2021). "Shattered Dreams and Lost Opportunities" (PDF). Access Now. Archived (PDF) from the original on 2 June 2021. Retrieved 27 May 2021.
  125. ^ a b Access Now (2021). "STOP Methodology" (PDF). Access Now. Archived (PDF) from the original on 17 January 2023. Retrieved 27 May 2021.
  126. ^ For the BBC poll Internet users are those who used the Internet within the previous six months.
  127. ^ a b "BBC Internet Poll: Detailed Findings" Archived 1 June 2013 at the Wayback Machine, BBC World Service, 8 March 2010
  128. ^ "Internet access is 'a fundamental right'" Archived 7 January 2012 at the Wayback Machine, BBC News, 8 March 2010
  129. ^ "Global Internet User Survey 2012" Archived 14 March 2013 at the Wayback Machine, Internet Society, 20 November 2012
  130. ^ Note: Responses may not add up to 100% due to rounding in the original report.
  131. ^ Chadwick, Andrew (2009). Routledge handbook of Internet politics. Routledge international handbooks. Taylor and Francis. p. 331. ISBN 978-0-415-42914-6.
  132. ^ "The Arab Spring's Cascading Effects" Archived 27 February 2011 at the Wayback Machine, Philip N. Howard, Miller-McCune, 23 February 2011
  133. ^ "Middle East Political Protest And Internet Traffic Report: February 12–20, 2011" Archived 25 February 2011 at the Wayback Machine, Craig Labovitz, Arbor Networks
  134. ^ Dainotti; et al. (2011). "Analysis of Country-wide Internet Outages Caused by Censorship" (PDF). ACM. Archived (PDF) from the original on 17 June 2012. Retrieved 14 April 2012.
  135. ^ "Syrian Electronic Army: Disruptive Attacks and Hyped Targets" Archived 20 July 2018 at the Wayback Machine, OpenNet Initiative, 25 June 2011
  136. ^ "Countries under surveillance: Egypt" Archived 4 March 2016 at the Wayback Machine, Reporters Without Borders, March 2011
  137. ^ "Censorship fallout from the Arab Spring?" Archived 26 January 2012 at the Wayback Machine, Juliette Terzieff, The Future 500, 29 June 2011
  138. ^ "Insight: Social media – a political tool for good or evil?" Archived 6 November 2011 at the Wayback Machine, Peter Apps, Reuters Canada, 28 September 2011
  139. ^ "LTT Blocks Pornographic Websites". 13 September 2013. Archived from the original on 11 August 2017. Retrieved 10 August 2017.
  140. ^ Shishkina, Alisa (November 2018). "Internet Censorship in Arab Countries: Religious and Moral Aspects". Religions. 9 (11): 358. doi:10.3390/rel9110358.
  141. ^ "Ukraine invasion: Russia restricts social media access". BBC News. 26 February 2022. Archived from the original on 2 March 2022. Retrieved 26 February 2022.

Sources

Further reading

Media related to Internet censorship at Wikimedia Commons

  1. ^ Creative Commons Attribution 3.0 Unported license, see the lower right corner of pages at the OpenNet Initiative web site Archived 25 September 2018 at the Wayback Machine