GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET Ayman Irziqat Katarzyna Kosarska Sergio Pradel.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Internet Censorship Tomáš Otava. Content of presentation How censors block the internet? Censorship in the world Censorship in the Czech Republic.
Impact of Computers on Society 5. Freedom of Speech.
U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
Blog A Blog is a website where entries are written in chronological order and commonly displayed in reverse chronological order.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Rethink the design of the Internet CSCI 780, Fall 2005.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
STRATEGIES. Non-Technical Measures to Protect Kids Online.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Internet Censorship. What is Internet Censorship Control or suppression of publishing or accessing information on the Internet Legal issues – Moral –
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
Internet Filtering and Safety Kyle Szczublewski, Dustin Clapsaddle, Sam Scott.
PRESENTATION THE CYBER GUARDIAN PRODUCT RANGE. TCG CHILD ONLINE PROTECTION PARENT AND CHILD.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
© ContentWatch, Inc. All rights reserved. 2.
Psiphon Program By Amine Moubtasim.
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Chantz Martin.  Put computer in a common place in the house  Use Internet filters and blocks  Talk to children about the dangers of the Internet.
Ch3 Freedom of Speech The US Constitution.
About responsibilities of content providers and users Conference Prague, March 18 th - 20 th.
Web 2.0 By Martin King. Features of Web 2.0 Tags: These are one word descriptions of the entire content written by the owner. Extensions: It is software.
Moral, Social and Ethical issues associated with the Internet
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Internet Censorship Amy McCarty and Michelle Weisgerber.
By Ben Smith. What is COICA? What effect it will have on the web? How does it work? How to prevent COICA from passing Summary.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Presentation by: Jennifer Collins Roldan Padilla.
Freedom of Speech Computers in the World.
Internet Censorship Flora Wan Computer Science 99 Winter 2000.
+ LeaAnne Montel October 8, 2008 INF 103 Internet Filters Responsibility Freedom Rights Danger Protection or censorship?
Internet safety An Irish Perspective. Safety - the context  Children v adults  Other media- messages and images  Television  Video  Magazines  Computer.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Impact of Computers on Society 5-A. Freedom of Speech.
Internet Governance Session 4: Internet Governance When the Internet Collides With the Offline World ANG Peng Hwa Nanyang Technological University
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
e-safety ..at school and at home
Internet Governance Session 4: Internet Governance When the Internet Collides With the Offline World ANG Peng Hwa Nanyang Technological University
Firewall Techniques Matt Cupp.
e-safety ..at school and at home
Practical Censorship Evasion Leveraging Content Delivery Networks
Parent eSafety Survey Results
China & Censorship.
Censorship Media law.
Website URL
E-Commerce: Regulatory, Ethical, and Social Environments
Censorship in Thailand
Freedom of Speech … refers to the ability of a person to publicly speak or publish any thought without legal constraints or repercussions. In this section:
Firewalls Routers, Switches, Hubs VPNs
The Internet is For Everyone
A Gift of Fire Third edition Sara Baase
Constitutional Issues
A Gift of Fire Third edition Sara Baase
Presentation transcript:

GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET Ayman Irziqat Katarzyna Kosarska Sergio Pradel

INTERNET CENSORSHIP RATINGS No censorship Some censorship Under surveillance Internet black holes

COMMONLY USED METHODS FOR CENSORING INTERNET CONTENT IP blocking Domain Name System filtering & redirection URL filtering Deep Packet filtering Connection reset Web feed blocking Reverse surveillance Self censorship

BYPASSING INTERNET CENSORSHIP Proxy websites Java Anon Proxy Virtual Private Networks Psiphon Tor Sneakernets

CENSORSHIP TARGETS Human rights activists. Anti-government organizations. Anti-government criticism issues. “UNHEALTY INFORMATION”. Violent video games. Child pornography.

INTERNET MONITORING & CENSORSHIP Pros: Protecting children (Child violence and pornography). Control of terrorist activities. Crime control. Cons: Violate freedom of speech. Violate media freedom. Limited access to extensive source of information.