ABSTRACT
Remote censorship measurement techniques offer capabilities for monitoring Internet reachability around the world. However, operating these techniques continuously is labor-intensive and requires specialized knowledge and synchronization, leading to limited adoption. In this paper, we introduce Censored Planet, an online censorship measurement platform that collects and analyzes measurements from ongoing deployments of four remote measurement techniques (Augur, Satellite/Iris, Quack, and Hyperquack). Censored Planet adopts a modular design that supports synchronized baseline measurements on six Internet protocols as well as customized measurements that target specific countries and websites. Censored Planet has already collected and published more than 21.8 billion data points of longitudinal network observations over 20 months of operation. Censored Planet complements existing censorship measurement platforms such as OONI and ICLab by offering increased scale, coverage, and continuity. We introduce a new representative censorship metric and show how time series analysis can be applied to Censored Planet's longitudinal measurements to detect 15 prominent censorship events, two-thirds of which have not been reported previously. Using trend analysis, we find increasing censorship activity in more than 100 countries, and we identify 11 categories of websites facing increasing censorship, including provocative attire, human rights issues, and news media. We hope that the continued publication of Censored Planet data helps counter the proliferation of growing restrictions to online freedom.
References
- NS Ethics '15: Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015.Google Scholar
- N. Aase, J. R. Crandall, A. Diaz, J. Knockel, J. O. Molinero, J. Saia, D. S. Wallach, and T. Zhu. Whiskey, weed, and wukan on the world wide web: On measuring censors' resources and motivations. In FOCI, 2012.Google Scholar
- AccessNow. We defend and extend the digital rights of users at risk around the world. https://www.accessnow.org/.Google Scholar
- G. Aceto, A. Botta, A. Pescapè, N. Feamster, M. F. Awan, T. Ahmad, and S. Qaisar. Monitoring Internet censorship with UBICA. In International Workshop on Traffic Monitoring and Analysis. Springer, 2015.Google Scholar
Cross Ref
- S. Afroz and D. Fifield. Timeline of Tor censorship, 2007. http://www1.icsi.berkeley.edu/ sadia/tor_timeline.pdf.Google Scholar
- Y. Akdeniz. Internet content regulation: UK government and the control of Internet content. Computer Law & Security Review, 2001.Google Scholar
- A. Akhavan Niaki, S. Cho, Z. Weinberg, N. P. Hoang, A. Razaghpanah, N. Christin, and P. Gill. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy (SP), 2020.Google Scholar
- Anonymous. Towards a comprehensive picture of the Great Firewalltextquoterights DNS censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014.Google Scholar
- S. Aryan, H. Aryan, and J. A. Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.Google Scholar
- A. Azpúrua. Wikipedia bloqueada en CANTV desde el 12 de Enero., 2019. https://vesinfiltro.com/noticias/wikipedia_2019-01/.Google Scholar
- A. Azpúrua, M. Chirinos, A. Filastò, M. Xynou, S. Basso, and K. Karan. From the blocking of Wikipedia to Social Media: Venezuela's Political Crisis, 2019.Google Scholar
- D. E. Bambauer. Filtering in Oz: Australia's foray into Internet censorship. U. Pa. J. Int'l L., 2009.Google Scholar
- D. Bamman, B. O'Connor, and N. Smith. Censorship and deletion practices in chinese social media. First Monday, 2012.Google Scholar
Cross Ref
- BBC. Egypt: Protests and clashes enter second day, 2019. https://www.bbc.com/news/world-middle-east-49786367.Google Scholar
- BBC. Omar al-Bashir: Sudan military coup topples ruler after protests, 2019. https://www.bbc.com/news/world-africa-47891470.Google Scholar
- BBC. Sri Lanka attacks: More than 200 killed as churches and hotels targeted, 2019. https://www.bbc.com/news/world-asia-48001720.Google Scholar
- BBC. Zimbabwe protests: Crackdown is just a 'taste of things to come', 2019. https://www.bbc.com/news/world-africa-46938679.Google Scholar
- K. Bock, G. Hughey, X. Qiang, and D. Levin. Geneva: Evolving censorship evasion strategies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.Google Scholar
Digital Library
- S. Burnett and N. Feamster. Making sense of Internet censorship: a new frontier for Internet measurement, 2013.Google Scholar
- S. Burnett and N. Feamster. Encore: Lightweight measurement of web censorship with cross-origin requests. In ACM SIGCOMM Conference, 2015.Google Scholar
Digital Library
- Businesswire. Japan Welcomes World Leaders to Its First-ever G20 Summit in Osaka, 2019. https://www.businesswire.com/news/home/20190630005053/en/Japan-Welcomes-World-Leaders-First-ever-G20-Summit.Google Scholar
- CAIDA. Archipelago (Ark) Measurement Infrastructure. http://www.caida.org/projects/ark/.Google Scholar
- CalvinAyre. Gambling operators scoff as Norway approves DNS-blocking, 2018. https://calvinayre.com/2018/05/10/business/norway-approves-gambling-restrictions/.Google Scholar
- K. M. Carter and W. W. Streilein. Probabilistic reasoning for streaming anomaly detection. In 2012 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2012.Google Scholar
Cross Ref
- A. Chaabane, T. Chen, M. Cunche, E. D. Cristofaro, A. Friedman, and M. A. Kaafar. Censorship in the wild: Analyzing Internet filtering in Syria. In Internet Measurement Conference (IMC). ACM, 2014.Google Scholar
Digital Library
- C. Chiu, C. Ip, and A. Silverman. Understanding social media in china. McKinsey Quarterly, 2012.Google Scholar
- Citizen Lab. Block test list. https://github.com/citizenlab/test-lists.Google Scholar
- Cloudflare. IP Ranges, 2019. https://www.cloudflare.com/ips/.Google Scholar
- J. R. Crandall, M. Crete-Nishihata, and J. Knockel. Forgive us our syns: Technical and ethical considerations for measuring internet filtering. In NS [email protected] SIGCOMM, 2015.Google Scholar
- J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. ConceptDoppler: A weather tracker for Internet censorship. In Proceedings of the 2007 ACM SIGSAC Conference on Computer and Communications Security, 2007.Google Scholar
- A. L. Dahir. Internet shutdowns are costing African governments more than we thought. https://qz.com/1089749/internet-shutdowns-are-increasingly-taking-a-toll-on-africas-economies/, 2017.Google Scholar
- J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A method for identifying and confirming the use of URL filtering products for censorship. In Internet Measurement Conference (IMC). ACM, 2013.Google Scholar
Digital Library
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.Google Scholar
- D. Dittrich and E. Kenneally. The Menlo Report: Ethical principles guiding information and communication technology research. Technical report, U.S. Department of Homeland Security, 2012.Google Scholar
- Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman. A search engine backed by Internet-wide scanning. In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, 2015.Google Scholar
Digital Library
- Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium, 2013.Google Scholar
Digital Library
- R. Ensafi, J. Knockel, G. Alexander, and J. R. Crandall. Detecting intentional packet drops on the Internet via TCP/IP side channels. In International Conference on Passive and Active Network Measurement, 2014.Google Scholar
Digital Library
- R. Ensafi, P. Winter, A. Mueen, and J. R. Crandall. Analyzing the Great Firewall of China over space and time. Proceedings on Privacy Enhancing Technologies, 2015.Google Scholar
Cross Ref
- M. Ester, H.-P. Kriegel, J. Sander, X. Xu, et al. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, 1996.Google Scholar
Digital Library
- R. Falkvinge. Norwegian politicians want to censor the Internet, because Rule 34 ('because all the pornography'), 2016. https://www.privateinternetaccess.com/blog/norwegian-politicians-want-censor-internet-rule-34-pornography/.Google Scholar
- O. Farnan, A. Darer, and J. Wright. Poisoning the well: Exploring the great firewall's poisoned dns responses. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016.Google Scholar
Digital Library
- D. Fifield, C. Lan, R. Hynes, P. Wegmann, and V. Paxson. Blocking-resistant communication through domain fronting. Proceedings on Privacy Enhancing Technologies, 2015.Google Scholar
Cross Ref
- A. Filastò and J. Appelbaum. OONI: Open Observatory of Network Interference. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.Google Scholar
- A. Filastò, M. Xynou, and N. Fatemi. Iran temporarily blocks the Farsi language edition of Wikipedia, 2019. https://ooni.org/post/2020-iran-blocks-farsi-wikipedia/.Google Scholar
- FortiNet. Fortiguard labs web filter. https://fortiguard.com/webfilter.Google Scholar
- Freedom House. Freedom on the net report 2019. https://freedomhouse.org/countries/freedom-world/scores, 2019.Google Scholar
- G. Gebhart and T. Kohno. Internet censorship in Thailand: User practices and potential threats. In IEEE European Symposium on Security and Privacy (EuroS&P), 2017.Google Scholar
Cross Ref
- K. H. Hamed and A. R. Rao. A modified mann-kendall trend test for autocorrelated data. Journal of hydrology, 1998.Google Scholar
- A. Houmansadr, G. T. Nguyen, M. Caesar, and N. Borisov. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 2011 ACM SIGSAC Conference on Computer and Communications Security, 2011.Google Scholar
Digital Library
- M. Hussain and I. Mahmud. pymannkendall: a python package for non parametric mann kendall family of trend tests. Journal of Open Source Software, 2019.Google Scholar
- ICLAB. ICLAB: Internet Censorship Lab. https://iclab.org.Google Scholar
- Indonesia introduces new internet censorship system. https://www.arabnews.com/node/1218011/world.Google Scholar
- Internet Outage Detection and Analysis. https://ioda.caida.org/ioda/dashboard.Google Scholar
- A. Jazeera. India decriminalises gay sex in landmark verdict, 2018. https://www.aljazeera.com/news/2018/09/india-decriminalises-gay-sex-landmark-verdict-180906051219637.html.Google Scholar
- A. Jazeera. Sri Lanka bombings, 2019. https://www.aljazeera.com/news/2019/04/sri-lanka-bombings-latest-updates-190421092621543.html.Google Scholar
- B. Jones, R. Ensafi, N. Feamster, V. Paxson, and N. Weaver. Ethical concerns for censorship measurement. In ACM SIGCOMM Conference, 2015.Google Scholar
Digital Library
- B. Jones, T.-W. Lee, N. Feamster, and P. Gill. Automated detection and fingerprinting of censorship block pages. In Internet Measurement Conference (IMC). ACM, 2014.Google Scholar
Digital Library
- J. Lin, E. Keogh, S. Lonardi, and B. Chiu. A symbolic representation of time series, with implications for streaming algorithms. In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003.Google Scholar
Digital Library
- LinkedIn. Luminol: Anomaly Detection and Correlation library. https://github.com/linkedin/luminol.Google Scholar
- N. Macedo. Norway plots DNS blocking and further restrictions on payments, 2018. https://egr.global/intel/news/norway-plots-dns-blocking-and-further-restrictions-on-payments/.Google Scholar
- R. MacKinnon. China's censorship 2.0: How companies censor bloggers. First Monday, 2009.Google Scholar
- MaxMind. https://www.maxmind.com/.Google Scholar
- T. McIntyre. Internet censorship in the united kingdom: National schemes and european norms. Law, Policy and the Internet (Hart Publishing, 2018 Forthcoming), 2018.Google Scholar
- Mozilla. Mozilla takes action to protect users in Kazakhstan. The Mozilla Blog, August 21, 2019. https://blog.mozilla.org/blog/2019/08/21/mozilla-takes-action-to-protect-users-in-kazakhstan/.Google Scholar
- Z. Nabi. The Anatomy of Web Censorship in Pakistan. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.Google Scholar
- A. Narayanan and B. Zevenbergen. No encore for Encore? Ethical questions for web-based censorship measurement. Ethical Questions for Web-Based Censorship Measurement (September 24, 2015), 2015.Google Scholar
Cross Ref
- M. Nasr, H. Zolfaghar, A. Houmansadr, and A. Ghafari. Massbrowser: Unblocking the censored web for the masses, by the masses. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google Scholar
Cross Ref
- National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1978.Google Scholar
- N. Nazeri and C. Anderson. Citation filtered: Iran's censorship of wikipedia. CGCS Research, 2013.Google Scholar
- NetBlocks. Social media blocked in Sri Lanka following church and hotel bombings, 2019. https://netblocks.org/reports/social-media-blocked-in-sri-lanka-following-church-and-hotel-bombings-XaAwlQBM.Google Scholar
- A. Nisar, A. Kashaf, I. A. Qazi, and Z. A. Uzmi. Incentivizing censorship measurements via circumvention. In SIGCOMM. ACM, 2018.Google Scholar
Digital Library
- NPR. Turkmenistan Has Banned Use Of The Word 'Coronavirus', 2020. https://www.npr.org/sections/coronavirus-live-updates/2020/03/31/824611607/turkmenistan-has-banned-use-of-the-word-coronavirus.Google Scholar
- OpenNet Initiative. OpenNet Initiative. https://opennet.net/.Google Scholar
- OpenNet Initiative. Jordan, August 2009. https://opennet.net/research/profiles/jordan.Google Scholar
- OpenNet Initiative. South Korea, August 2012. https://opennet.net/research/profiles/south-korea.Google Scholar
- C. Partridge and M. Allman. Addressing ethical considerations in network measurement papers. In Workshop on Ethics in Networked Systems Research (NS [email protected] SIGCOMM), 2015.Google Scholar
Digital Library
- P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson. Augur: Internet-wide detection of connectivity disruptions. In IEEE Symposium on Security and Privacy, May 2017.Google Scholar
Cross Ref
- P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS manipulation. In 26th USENIX Security Symposium, 2017.Google Scholar
Digital Library
- PeeringDB. Peeringdb, 2018. https://www.peeringdb.com/.Google Scholar
- PlanetLab. https://www.planet-lab.org/.Google Scholar
- Portuguese ISPs given 40 days to comply with EU net neutrality rules. https://edri.org/portuguese-isps-given-40-days-to-comply-with-eu-net-neutrality-rules/.Google Scholar
- List of websites/domains blocked by ISP's in Portugal, 2019. https://tofran.github.io/PortugalWebBlocking/.Google Scholar
- Psiphon. Psiphon: Beyond Borders, 2020. https://psiphon3.com/en/index.html.Google Scholar
- R. Ramesh, L. Evdokimov, and R. Ensafi. Censorship in Russia, 2019. https://censoredplanet.org/russia.Google Scholar
- R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, and R. Ensafi. Decentralized Control: A Case Study of Russia. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google Scholar
Cross Ref
- R. Raoof, M. El-Taher, M. Tita, A. Filastò, and M. Xynou. Egypt blocks BBC and Alhurra: Expanding media censorship amid political unrest, 2019. https://ooni.org/post/venezuela-blocking-wikipedia-and-social-media-2019/.Google Scholar
- Reporters without Borders. Coronavirus off limits in Turkmenistan, 2020. https://rsf.org/en/news/coronavirus-limits-turkmenistan.Google Scholar
- Reporters without Borders. Norway: Clouds in sight, 2020. https://rsf.org/en/norway.Google Scholar
- Reporters without Borders. Turkmenistan: Ever-expanding news 'black hole', 2020. https://rsf.org/en/turkmenistan.Google Scholar
- Reuters. Polish police detain 25 after attacks on equality march, 2019. https://www.reuters.com/article/us-poland-lgbt-idUSKCN1UG0GH.Google Scholar
- University of Oregon Route Views Project. www.routeviews.org.Google Scholar
- Q. Scheitle, O. Hohlfeld, J. Gamba, J. Jelten, T. Zimmermann, S. D. Strowes, and N. Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of internet top lists. In Internet Measurement Conference (IMC). ACM, 2018.Google Scholar
Digital Library
- W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. Satellite: Joint analysis of CDNs and network-level interference. In USENIX Annual Technical Conference (ATC), 2016.Google Scholar
- P. K. Sen. Estimates of the regression coefficient based on Kendall's tau. Journal of the American statistical association, 1968.Google Scholar
- A. Sfakianakis, E. Athanasopoulos, and S. Ioannidis. Censmon: A web censorship monitor. In USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011.Google Scholar
- R. Shandler. Measuring the Political and Social Implications of Government-Initiated Cyber Shutdowns. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.Google Scholar
- S. Song, A. Zhang, J. Wang, and P. S. Yu. Screen: Stream data cleaning under speed constraints. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015.Google Scholar
Digital Library
- R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Kazakhstan's HTTPS Interception, 2019. https://censoredplanet.org/kazakhstan.Google Scholar
- R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Investigating Large Scale HTTPS Interception in Kazakhstan. In Internet Measurement Conference (IMC). ACM, 2020.Google Scholar
- R. Sundara Raman, A. Stoll, J. Dalek, A. Sarabi, R. Ramesh, W. Scott, and R. Ensafi. Measuring the Deployment of Network Censorship Filters at Global Scale. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google Scholar
Cross Ref
- B. Taye. Sri Lanka: shutting down social media to fight rumors hurts victims, 2019. https://www.accessnow.org/sri-lanka-shutting-down-social-media-to-fight-rumors-hurts-victims/.Google Scholar
- The Guardian. Army deployed in Ecuador as protests descend into violence, 2019. https://www.theguardian.com/world/2019/oct/13/army-deployed-in-ecuador-as-protests-descend-into-violence.Google Scholar
- The Guardian. Venezuela protests: thousands march as military faces call to abandon Maduro, 2019. https://www.theguardian.com/world/2019/jan/23/venezuela-protests-thousands-march-against-maduro-as-opposition-sees-chance-for-change.Google Scholar
- The Tor Project. OONI: Open observatory of network interference. https://ooni.torproject.org/.Google Scholar
- Tor. Tor Browser's default bridges, 2020. https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges.Google Scholar
- B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, and R. Ensafi. Quack: Scalable remote measurement of application-layer censorship. In 27th USENIX Security Symposium, 2018.Google Scholar
- Z. Wang, S. Zhu, Y. Cao, Z. Qian, C. Song, S. V. Krishnamurthy, K. S. Chan, and T. D. Braun. SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google Scholar
Cross Ref
- V. Weber. The worldwide web of Chinese and Russian information controls, 2019.Google Scholar
- L. Wei, N. Kumar, V. N. Lolla, E. J. Keogh, S. Lonardi, and C. A. Ratanamahatana. Assumption-free anomaly detection in time series. In SSDBM, 2005.Google Scholar
- Z. Weinberg, M. Sharif, J. Szurdi, and N. Christin. Topics of controversy: An empirical analysis of web censorship lists. Proceedings on Privacy Enhancing Technologies, 2017.Google Scholar
Cross Ref
- Wikipedia. Gaza--Israel clashes (May 2019), 2019. https://en.wikipedia.org/wiki/Gaza%E2%80%93Israel_clashes_(May_2019).Google Scholar
- C. Williams. How Egypt shut down the internet. https://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8288163/How-Egypt-shut-down-the-internet.html, 2011.Google Scholar
- P. Winter and S. Lindskog. How the Great Firewall of China is blocking Tor. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.Google Scholar
- E. Wustrow, C. M. Swanson, and J. A. Halderman. Tapdance: End-to-middle anticensorship without flow blocking. In 23rd USENIX Security Symposium, 2014.Google Scholar
Digital Library
- E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In 20th USENIX Security Symposium, 2011.Google Scholar
Digital Library
- Xu, Xueyang and Mao, Z. Morley and Halderman, J. Alex. Internet censorship in china: Where does the filtering occur? In International Conference on Passive and Active Network Measurement, 2011.Google Scholar
- M. Xynou, F. Arturo, M. Tawanda, and M. Natasha. Zimbabwe protests: Social media blocking and internet blackouts, 2019. https://ooni.org/post/zimbabwe-protests-social-media-blocking-2019/.Google Scholar
- T. K. Yadav, A. Sinha, D. Gosain, P. K. Sharma, and S. Chakravarty. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In Internet Measurement Conference (IMC). ACM, 2018.Google Scholar
Digital Library
- B. Zevenbergen, B. Mittelstadt, C. Véliz, C. Detweiler, C. Cath, J. Savulescu, and M. Whittaker. Philosophy meets Internet engineering: Ethics in networked systems research. In (GTC Workshop Outcomes Paper) (September 29, 2015), 2015.Google Scholar
- A. Zhang, S. Song, and J. Wang. Sequential data cleaning: a statistical approach. In Proceedings of the 2016 International Conference on Management of Data, 2016.Google Scholar
Digital Library
- J. Zittrain and B. Edelman. Internet filtering in China. IEEE Internet Computing, 2003.Google Scholar
- ZwNews. BREAKING: Internet shut down illegal?Zimbabwe High Court rules, 2019. https://zwnews.com/breaking-internet-shut-down-illegal-zimbabwe-high-court-rules/.Google Scholar
Supplemental Material
Index Terms
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory





Comments