10.1145/3372297.3417883acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedings
research-article
Open Access

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

ABSTRACT

Remote censorship measurement techniques offer capabilities for monitoring Internet reachability around the world. However, operating these techniques continuously is labor-intensive and requires specialized knowledge and synchronization, leading to limited adoption. In this paper, we introduce Censored Planet, an online censorship measurement platform that collects and analyzes measurements from ongoing deployments of four remote measurement techniques (Augur, Satellite/Iris, Quack, and Hyperquack). Censored Planet adopts a modular design that supports synchronized baseline measurements on six Internet protocols as well as customized measurements that target specific countries and websites. Censored Planet has already collected and published more than 21.8 billion data points of longitudinal network observations over 20 months of operation. Censored Planet complements existing censorship measurement platforms such as OONI and ICLab by offering increased scale, coverage, and continuity. We introduce a new representative censorship metric and show how time series analysis can be applied to Censored Planet's longitudinal measurements to detect 15 prominent censorship events, two-thirds of which have not been reported previously. Using trend analysis, we find increasing censorship activity in more than 100 countries, and we identify 11 categories of websites facing increasing censorship, including provocative attire, human rights issues, and news media. We hope that the continued publication of Censored Planet data helps counter the proliferation of growing restrictions to online freedom.

References

  1. NS Ethics '15: Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015.Google ScholarGoogle Scholar
  2. N. Aase, J. R. Crandall, A. Diaz, J. Knockel, J. O. Molinero, J. Saia, D. S. Wallach, and T. Zhu. Whiskey, weed, and wukan on the world wide web: On measuring censors' resources and motivations. In FOCI, 2012.Google ScholarGoogle Scholar
  3. AccessNow. We defend and extend the digital rights of users at risk around the world. https://www.accessnow.org/.Google ScholarGoogle Scholar
  4. G. Aceto, A. Botta, A. Pescapè, N. Feamster, M. F. Awan, T. Ahmad, and S. Qaisar. Monitoring Internet censorship with UBICA. In International Workshop on Traffic Monitoring and Analysis. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Afroz and D. Fifield. Timeline of Tor censorship, 2007. http://www1.icsi.berkeley.edu/ sadia/tor_timeline.pdf.Google ScholarGoogle Scholar
  6. Y. Akdeniz. Internet content regulation: UK government and the control of Internet content. Computer Law & Security Review, 2001.Google ScholarGoogle Scholar
  7. A. Akhavan Niaki, S. Cho, Z. Weinberg, N. P. Hoang, A. Razaghpanah, N. Christin, and P. Gill. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy (SP), 2020.Google ScholarGoogle Scholar
  8. Anonymous. Towards a comprehensive picture of the Great Firewalltextquoterights DNS censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014.Google ScholarGoogle Scholar
  9. S. Aryan, H. Aryan, and J. A. Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.Google ScholarGoogle Scholar
  10. A. Azpúrua. Wikipedia bloqueada en CANTV desde el 12 de Enero., 2019. https://vesinfiltro.com/noticias/wikipedia_2019-01/.Google ScholarGoogle Scholar
  11. A. Azpúrua, M. Chirinos, A. Filastò, M. Xynou, S. Basso, and K. Karan. From the blocking of Wikipedia to Social Media: Venezuela's Political Crisis, 2019.Google ScholarGoogle Scholar
  12. D. E. Bambauer. Filtering in Oz: Australia's foray into Internet censorship. U. Pa. J. Int'l L., 2009.Google ScholarGoogle Scholar
  13. D. Bamman, B. O'Connor, and N. Smith. Censorship and deletion practices in chinese social media. First Monday, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. BBC. Egypt: Protests and clashes enter second day, 2019. https://www.bbc.com/news/world-middle-east-49786367.Google ScholarGoogle Scholar
  15. BBC. Omar al-Bashir: Sudan military coup topples ruler after protests, 2019. https://www.bbc.com/news/world-africa-47891470.Google ScholarGoogle Scholar
  16. BBC. Sri Lanka attacks: More than 200 killed as churches and hotels targeted, 2019. https://www.bbc.com/news/world-asia-48001720.Google ScholarGoogle Scholar
  17. BBC. Zimbabwe protests: Crackdown is just a 'taste of things to come', 2019. https://www.bbc.com/news/world-africa-46938679.Google ScholarGoogle Scholar
  18. K. Bock, G. Hughey, X. Qiang, and D. Levin. Geneva: Evolving censorship evasion strategies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Burnett and N. Feamster. Making sense of Internet censorship: a new frontier for Internet measurement, 2013.Google ScholarGoogle Scholar
  20. S. Burnett and N. Feamster. Encore: Lightweight measurement of web censorship with cross-origin requests. In ACM SIGCOMM Conference, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Businesswire. Japan Welcomes World Leaders to Its First-ever G20 Summit in Osaka, 2019. https://www.businesswire.com/news/home/20190630005053/en/Japan-Welcomes-World-Leaders-First-ever-G20-Summit.Google ScholarGoogle Scholar
  22. CAIDA. Archipelago (Ark) Measurement Infrastructure. http://www.caida.org/projects/ark/.Google ScholarGoogle Scholar
  23. CalvinAyre. Gambling operators scoff as Norway approves DNS-blocking, 2018. https://calvinayre.com/2018/05/10/business/norway-approves-gambling-restrictions/.Google ScholarGoogle Scholar
  24. K. M. Carter and W. W. Streilein. Probabilistic reasoning for streaming anomaly detection. In 2012 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Chaabane, T. Chen, M. Cunche, E. D. Cristofaro, A. Friedman, and M. A. Kaafar. Censorship in the wild: Analyzing Internet filtering in Syria. In Internet Measurement Conference (IMC). ACM, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Chiu, C. Ip, and A. Silverman. Understanding social media in china. McKinsey Quarterly, 2012.Google ScholarGoogle Scholar
  27. Citizen Lab. Block test list. https://github.com/citizenlab/test-lists.Google ScholarGoogle Scholar
  28. Cloudflare. IP Ranges, 2019. https://www.cloudflare.com/ips/.Google ScholarGoogle Scholar
  29. J. R. Crandall, M. Crete-Nishihata, and J. Knockel. Forgive us our syns: Technical and ethical considerations for measuring internet filtering. In NS [email protected] SIGCOMM, 2015.Google ScholarGoogle Scholar
  30. J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. ConceptDoppler: A weather tracker for Internet censorship. In Proceedings of the 2007 ACM SIGSAC Conference on Computer and Communications Security, 2007.Google ScholarGoogle Scholar
  31. A. L. Dahir. Internet shutdowns are costing African governments more than we thought. https://qz.com/1089749/internet-shutdowns-are-increasingly-taking-a-toll-on-africas-economies/, 2017.Google ScholarGoogle Scholar
  32. J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A method for identifying and confirming the use of URL filtering products for censorship. In Internet Measurement Conference (IMC). ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.Google ScholarGoogle Scholar
  34. D. Dittrich and E. Kenneally. The Menlo Report: Ethical principles guiding information and communication technology research. Technical report, U.S. Department of Homeland Security, 2012.Google ScholarGoogle Scholar
  35. Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman. A search engine backed by Internet-wide scanning. In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. Ensafi, J. Knockel, G. Alexander, and J. R. Crandall. Detecting intentional packet drops on the Internet via TCP/IP side channels. In International Conference on Passive and Active Network Measurement, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. Ensafi, P. Winter, A. Mueen, and J. R. Crandall. Analyzing the Great Firewall of China over space and time. Proceedings on Privacy Enhancing Technologies, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  39. M. Ester, H.-P. Kriegel, J. Sander, X. Xu, et al. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. R. Falkvinge. Norwegian politicians want to censor the Internet, because Rule 34 ('because all the pornography'), 2016. https://www.privateinternetaccess.com/blog/norwegian-politicians-want-censor-internet-rule-34-pornography/.Google ScholarGoogle Scholar
  41. O. Farnan, A. Darer, and J. Wright. Poisoning the well: Exploring the great firewall's poisoned dns responses. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. D. Fifield, C. Lan, R. Hynes, P. Wegmann, and V. Paxson. Blocking-resistant communication through domain fronting. Proceedings on Privacy Enhancing Technologies, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  43. A. Filastò and J. Appelbaum. OONI: Open Observatory of Network Interference. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.Google ScholarGoogle Scholar
  44. A. Filastò, M. Xynou, and N. Fatemi. Iran temporarily blocks the Farsi language edition of Wikipedia, 2019. https://ooni.org/post/2020-iran-blocks-farsi-wikipedia/.Google ScholarGoogle Scholar
  45. FortiNet. Fortiguard labs web filter. https://fortiguard.com/webfilter.Google ScholarGoogle Scholar
  46. Freedom House. Freedom on the net report 2019. https://freedomhouse.org/countries/freedom-world/scores, 2019.Google ScholarGoogle Scholar
  47. G. Gebhart and T. Kohno. Internet censorship in Thailand: User practices and potential threats. In IEEE European Symposium on Security and Privacy (EuroS&P), 2017.Google ScholarGoogle ScholarCross RefCross Ref
  48. K. H. Hamed and A. R. Rao. A modified mann-kendall trend test for autocorrelated data. Journal of hydrology, 1998.Google ScholarGoogle Scholar
  49. A. Houmansadr, G. T. Nguyen, M. Caesar, and N. Borisov. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 2011 ACM SIGSAC Conference on Computer and Communications Security, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. M. Hussain and I. Mahmud. pymannkendall: a python package for non parametric mann kendall family of trend tests. Journal of Open Source Software, 2019.Google ScholarGoogle Scholar
  51. ICLAB. ICLAB: Internet Censorship Lab. https://iclab.org.Google ScholarGoogle Scholar
  52. Indonesia introduces new internet censorship system. https://www.arabnews.com/node/1218011/world.Google ScholarGoogle Scholar
  53. Internet Outage Detection and Analysis. https://ioda.caida.org/ioda/dashboard.Google ScholarGoogle Scholar
  54. A. Jazeera. India decriminalises gay sex in landmark verdict, 2018. https://www.aljazeera.com/news/2018/09/india-decriminalises-gay-sex-landmark-verdict-180906051219637.html.Google ScholarGoogle Scholar
  55. A. Jazeera. Sri Lanka bombings, 2019. https://www.aljazeera.com/news/2019/04/sri-lanka-bombings-latest-updates-190421092621543.html.Google ScholarGoogle Scholar
  56. B. Jones, R. Ensafi, N. Feamster, V. Paxson, and N. Weaver. Ethical concerns for censorship measurement. In ACM SIGCOMM Conference, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. B. Jones, T.-W. Lee, N. Feamster, and P. Gill. Automated detection and fingerprinting of censorship block pages. In Internet Measurement Conference (IMC). ACM, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. J. Lin, E. Keogh, S. Lonardi, and B. Chiu. A symbolic representation of time series, with implications for streaming algorithms. In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. LinkedIn. Luminol: Anomaly Detection and Correlation library. https://github.com/linkedin/luminol.Google ScholarGoogle Scholar
  60. N. Macedo. Norway plots DNS blocking and further restrictions on payments, 2018. https://egr.global/intel/news/norway-plots-dns-blocking-and-further-restrictions-on-payments/.Google ScholarGoogle Scholar
  61. R. MacKinnon. China's censorship 2.0: How companies censor bloggers. First Monday, 2009.Google ScholarGoogle Scholar
  62. MaxMind. https://www.maxmind.com/.Google ScholarGoogle Scholar
  63. T. McIntyre. Internet censorship in the united kingdom: National schemes and european norms. Law, Policy and the Internet (Hart Publishing, 2018 Forthcoming), 2018.Google ScholarGoogle Scholar
  64. Mozilla. Mozilla takes action to protect users in Kazakhstan. The Mozilla Blog, August 21, 2019. https://blog.mozilla.org/blog/2019/08/21/mozilla-takes-action-to-protect-users-in-kazakhstan/.Google ScholarGoogle Scholar
  65. Z. Nabi. The Anatomy of Web Censorship in Pakistan. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.Google ScholarGoogle Scholar
  66. A. Narayanan and B. Zevenbergen. No encore for Encore? Ethical questions for web-based censorship measurement. Ethical Questions for Web-Based Censorship Measurement (September 24, 2015), 2015.Google ScholarGoogle ScholarCross RefCross Ref
  67. M. Nasr, H. Zolfaghar, A. Houmansadr, and A. Ghafari. Massbrowser: Unblocking the censored web for the masses, by the masses. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  68. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1978.Google ScholarGoogle Scholar
  69. N. Nazeri and C. Anderson. Citation filtered: Iran's censorship of wikipedia. CGCS Research, 2013.Google ScholarGoogle Scholar
  70. NetBlocks. Social media blocked in Sri Lanka following church and hotel bombings, 2019. https://netblocks.org/reports/social-media-blocked-in-sri-lanka-following-church-and-hotel-bombings-XaAwlQBM.Google ScholarGoogle Scholar
  71. A. Nisar, A. Kashaf, I. A. Qazi, and Z. A. Uzmi. Incentivizing censorship measurements via circumvention. In SIGCOMM. ACM, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. NPR. Turkmenistan Has Banned Use Of The Word 'Coronavirus', 2020. https://www.npr.org/sections/coronavirus-live-updates/2020/03/31/824611607/turkmenistan-has-banned-use-of-the-word-coronavirus.Google ScholarGoogle Scholar
  73. OpenNet Initiative. OpenNet Initiative. https://opennet.net/.Google ScholarGoogle Scholar
  74. OpenNet Initiative. Jordan, August 2009. https://opennet.net/research/profiles/jordan.Google ScholarGoogle Scholar
  75. OpenNet Initiative. South Korea, August 2012. https://opennet.net/research/profiles/south-korea.Google ScholarGoogle Scholar
  76. C. Partridge and M. Allman. Addressing ethical considerations in network measurement papers. In Workshop on Ethics in Networked Systems Research (NS [email protected] SIGCOMM), 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson. Augur: Internet-wide detection of connectivity disruptions. In IEEE Symposium on Security and Privacy, May 2017.Google ScholarGoogle ScholarCross RefCross Ref
  78. P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS manipulation. In 26th USENIX Security Symposium, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. PeeringDB. Peeringdb, 2018. https://www.peeringdb.com/.Google ScholarGoogle Scholar
  80. PlanetLab. https://www.planet-lab.org/.Google ScholarGoogle Scholar
  81. Portuguese ISPs given 40 days to comply with EU net neutrality rules. https://edri.org/portuguese-isps-given-40-days-to-comply-with-eu-net-neutrality-rules/.Google ScholarGoogle Scholar
  82. List of websites/domains blocked by ISP's in Portugal, 2019. https://tofran.github.io/PortugalWebBlocking/.Google ScholarGoogle Scholar
  83. Psiphon. Psiphon: Beyond Borders, 2020. https://psiphon3.com/en/index.html.Google ScholarGoogle Scholar
  84. R. Ramesh, L. Evdokimov, and R. Ensafi. Censorship in Russia, 2019. https://censoredplanet.org/russia.Google ScholarGoogle Scholar
  85. R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, and R. Ensafi. Decentralized Control: A Case Study of Russia. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  86. R. Raoof, M. El-Taher, M. Tita, A. Filastò, and M. Xynou. Egypt blocks BBC and Alhurra: Expanding media censorship amid political unrest, 2019. https://ooni.org/post/venezuela-blocking-wikipedia-and-social-media-2019/.Google ScholarGoogle Scholar
  87. Reporters without Borders. Coronavirus off limits in Turkmenistan, 2020. https://rsf.org/en/news/coronavirus-limits-turkmenistan.Google ScholarGoogle Scholar
  88. Reporters without Borders. Norway: Clouds in sight, 2020. https://rsf.org/en/norway.Google ScholarGoogle Scholar
  89. Reporters without Borders. Turkmenistan: Ever-expanding news 'black hole', 2020. https://rsf.org/en/turkmenistan.Google ScholarGoogle Scholar
  90. Reuters. Polish police detain 25 after attacks on equality march, 2019. https://www.reuters.com/article/us-poland-lgbt-idUSKCN1UG0GH.Google ScholarGoogle Scholar
  91. University of Oregon Route Views Project. www.routeviews.org.Google ScholarGoogle Scholar
  92. Q. Scheitle, O. Hohlfeld, J. Gamba, J. Jelten, T. Zimmermann, S. D. Strowes, and N. Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of internet top lists. In Internet Measurement Conference (IMC). ACM, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. Satellite: Joint analysis of CDNs and network-level interference. In USENIX Annual Technical Conference (ATC), 2016.Google ScholarGoogle Scholar
  94. P. K. Sen. Estimates of the regression coefficient based on Kendall's tau. Journal of the American statistical association, 1968.Google ScholarGoogle Scholar
  95. A. Sfakianakis, E. Athanasopoulos, and S. Ioannidis. Censmon: A web censorship monitor. In USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011.Google ScholarGoogle Scholar
  96. R. Shandler. Measuring the Political and Social Implications of Government-Initiated Cyber Shutdowns. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.Google ScholarGoogle Scholar
  97. S. Song, A. Zhang, J. Wang, and P. S. Yu. Screen: Stream data cleaning under speed constraints. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Kazakhstan's HTTPS Interception, 2019. https://censoredplanet.org/kazakhstan.Google ScholarGoogle Scholar
  99. R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Investigating Large Scale HTTPS Interception in Kazakhstan. In Internet Measurement Conference (IMC). ACM, 2020.Google ScholarGoogle Scholar
  100. R. Sundara Raman, A. Stoll, J. Dalek, A. Sarabi, R. Ramesh, W. Scott, and R. Ensafi. Measuring the Deployment of Network Censorship Filters at Global Scale. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  101. B. Taye. Sri Lanka: shutting down social media to fight rumors hurts victims, 2019. https://www.accessnow.org/sri-lanka-shutting-down-social-media-to-fight-rumors-hurts-victims/.Google ScholarGoogle Scholar
  102. The Guardian. Army deployed in Ecuador as protests descend into violence, 2019. https://www.theguardian.com/world/2019/oct/13/army-deployed-in-ecuador-as-protests-descend-into-violence.Google ScholarGoogle Scholar
  103. The Guardian. Venezuela protests: thousands march as military faces call to abandon Maduro, 2019. https://www.theguardian.com/world/2019/jan/23/venezuela-protests-thousands-march-against-maduro-as-opposition-sees-chance-for-change.Google ScholarGoogle Scholar
  104. The Tor Project. OONI: Open observatory of network interference. https://ooni.torproject.org/.Google ScholarGoogle Scholar
  105. Tor. Tor Browser's default bridges, 2020. https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges.Google ScholarGoogle Scholar
  106. B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, and R. Ensafi. Quack: Scalable remote measurement of application-layer censorship. In 27th USENIX Security Symposium, 2018.Google ScholarGoogle Scholar
  107. Z. Wang, S. Zhu, Y. Cao, Z. Qian, C. Song, S. V. Krishnamurthy, K. S. Chan, and T. D. Braun. SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  108. V. Weber. The worldwide web of Chinese and Russian information controls, 2019.Google ScholarGoogle Scholar
  109. L. Wei, N. Kumar, V. N. Lolla, E. J. Keogh, S. Lonardi, and C. A. Ratanamahatana. Assumption-free anomaly detection in time series. In SSDBM, 2005.Google ScholarGoogle Scholar
  110. Z. Weinberg, M. Sharif, J. Szurdi, and N. Christin. Topics of controversy: An empirical analysis of web censorship lists. Proceedings on Privacy Enhancing Technologies, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  111. Wikipedia. Gaza--Israel clashes (May 2019), 2019. https://en.wikipedia.org/wiki/Gaza%E2%80%93Israel_clashes_(May_2019).Google ScholarGoogle Scholar
  112. C. Williams. How Egypt shut down the internet. https://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8288163/How-Egypt-shut-down-the-internet.html, 2011.Google ScholarGoogle Scholar
  113. P. Winter and S. Lindskog. How the Great Firewall of China is blocking Tor. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.Google ScholarGoogle Scholar
  114. E. Wustrow, C. M. Swanson, and J. A. Halderman. Tapdance: End-to-middle anticensorship without flow blocking. In 23rd USENIX Security Symposium, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In 20th USENIX Security Symposium, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Xu, Xueyang and Mao, Z. Morley and Halderman, J. Alex. Internet censorship in china: Where does the filtering occur? In International Conference on Passive and Active Network Measurement, 2011.Google ScholarGoogle Scholar
  117. M. Xynou, F. Arturo, M. Tawanda, and M. Natasha. Zimbabwe protests: Social media blocking and internet blackouts, 2019. https://ooni.org/post/zimbabwe-protests-social-media-blocking-2019/.Google ScholarGoogle Scholar
  118. T. K. Yadav, A. Sinha, D. Gosain, P. K. Sharma, and S. Chakravarty. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In Internet Measurement Conference (IMC). ACM, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. B. Zevenbergen, B. Mittelstadt, C. Véliz, C. Detweiler, C. Cath, J. Savulescu, and M. Whittaker. Philosophy meets Internet engineering: Ethics in networked systems research. In (GTC Workshop Outcomes Paper) (September 29, 2015), 2015.Google ScholarGoogle Scholar
  120. A. Zhang, S. Song, and J. Wang. Sequential data cleaning: a statistical approach. In Proceedings of the 2016 International Conference on Management of Data, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. J. Zittrain and B. Edelman. Internet filtering in China. IEEE Internet Computing, 2003.Google ScholarGoogle Scholar
  122. ZwNews. BREAKING: Internet shut down illegal?Zimbabwe High Court rules, 2019. https://zwnews.com/breaking-internet-shut-down-illegal-zimbabwe-high-court-rules/.Google ScholarGoogle Scholar

Supplemental Material

Copy of CCS2020_fpc387_Ram Sundara Raman - Andrew Diehl.mov

Index Terms

  1. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!