Leaping Over the Censors

Posted April 13th, 2011 at 3:15 pm (UTC-4)

JulieAnn McKellogg | Washington

While it’s hard to generalize across the nations, it seems apparent the Internet and digital networks continue to play a serious role in helping pro-democracy activists organize and communicate.  This, despite efforts by a growing number of governments to limit, censor, or totally block portions of the web.

This week the non-profit human rights group Freedom House released a report detailing which online circumvention tools are best for helping activists break through the censors’ walls.*

Not surprisingly, determining the best tool to use depends on where you are, and what you’re doing.

Based on a survey of Internet users in Iran, Azerbaijan, China and Burma, the report found 11 circumvention tools to be effective, and outlines the  advantages and disadvantages of each.  But the report authors go further, providing a matrix to allow users to pick which tool would be best for them based on their activities, amount of privacy and security desired, and devices used.

For example, someone wanting to access or download material already on the web who doesn’t need much privacy should consider Freegate, while another wanting more privacy should look at Tor or Ultrasurf.  On the other side, Psiphon might best serve a user wanting to upload text or video with minimal security demands, but JonDonym is better tailored to those with high security concerns but slow processing ability.

But report co-author Cormac Callanan is quick to qualify these recommendations.

“Circumvention is not security,” says Callanan, head of Dublin-based Aconite Internet Solutions.   “Security, anonymity and privacy are important and do need to be addressed.  For end users, we can only repeat that security is more than a single circumvention tool.  And that it becomes a way of life.”

One surprising finding of the report found users preferred speed over security in accessing the net.  Callanan says that may seem counter-intuitive, but locals better understand their unique censorship situation and its consequences.

“They have more real time and local knowledge about what is happening in their government censorship system, or the local policing or the local monitoring than many of us do internationally.”

The U.S. State Department-funded report found that security is more important for users who are sending material rather than those accessing and viewing information on the Internet.

Freedom House’s Project Director for Internet Freedom, Robert Guerra, calls circumvention software “…not only for activists”:

“I think to popularize the tool, we have to depoliticize.  It’s not to access blocked sites.  It’s to access things that may be blocked that aren’t necessarily threatening.  One may want to access cooking YouTube videos, but if YouTube is blocked, that is a bad thing.”

Karen Rielly, development director for the Tor Project, a circumvention software company, says that even her organization can not see who is using the software:

“Tor separates where you are going online from where you are coming from.  Its hides your IP address, which can be linked to your physical location.”

Rielly notes that Tor and similar products were widely used in Egypt prior to the government taking the country offline during recent protests.  Egypt was not the first country to nearly shut down its Internet access.  Burma, Nepal and China have used similar tactics.

Last week, U.S. Secretary of State Hillary Clinton said restrictions on Internet activity that prohibit free expression is one of three worrisome trends concerning human rights.

*Full Disclosure: The U.S. Broadcasting Board of Governors – VOA’s parent organization – has been active in promoting circumvention technologies and has relationships with Tor, Freegate and others.  As part of the budget deal reached last week, Congress agreed with President Obama to provide $10 million to the BBG to continue its circumvention and Internet privacy work.  The U.S. State Department and the BBG have both been seeking funds for such efforts.

5 responses to “Leaping Over the Censors”

  1. Freedom Crusader says:

    Much needed tech but much more could be done – protection and accurate translation services for people in friendly countries – It’s all about ideology (IMHO this is the point where we have fallen down)– words are a potent weapon – change a mind; change the world – when you get going against a government or organization that views your ideology as a threat – well its easy to find yourself targeted – tech is moving too fast to keep up with governments counter efforts –It dangerous out there.

    Put together a custom small Linux distro – set it up for pure social networking/blogging – include software that randomizes the data streams – routed through proxy servers and relays globally – powerful tunneling software- strong Encryption most govs don’t want or like –torrent software – – run it and boot it off of usb , cd or virtual image using vmware (single use delete when done – use fresh copy next day) – update this often (cat and mouse) – a lot of options but too technical and time consuming for most social activists to set up and be effective. Sending individuals up against foreign governments without the protection is IMHO irresponsible – things will get real hot – these regimes will fight for their survival and normal people don’t stand a chance against state craft.

    Freedom Knows No Borders

    • BBGWatcher says:

      Excellent point Freedom Crusader. That is exactly what the Broadcasting Board of Governors (BBG) wants to do in China: “sending individuals up against foreign governments without the protection.” You are absolutely right. It is irresponsible. Pushing Internet-only delivery for the Voice of America in China does exactly that. It exposes pro-democracy activists to the Chinese secret police. Listening to VOA radio or watching VOA Chinese TV on satellite is anonymous and safe. Most people lack the technological knowledge to protect themselves against the Chinese cyber police. In fact, I doubt that anybody can.

  2. […] those, the solution is encryption.  We’ve discussed it here often before, but it’s worth repeating – a solid encryption program such as Tor, Freegate or Psiphon (just […]

  3. […] from the Net.  There are any number of ways to do this, but one of the best tools at hand is anti-circumvention technology (ACTs); essentially programs that mask users’ identities, or hide their Internet activities from […]

  4. […] from the Net.  There are any number of ways to do this, but one of the best tools at hand is anti-circumvention technology (ACTs); essentially programs that mask users’ identities, or hide their Internet activities from prying […]

Leave a Reply

Your email address will not be published. Required fields are marked *

What’s Digital Frontiers?

What’s Digital Frontiers?

The Internet, mobile phones, tablet computers and other digital devices are transforming our lives in fundamental and often unpredictable ways. “Digital Frontiers” investigates how real world concepts like privacy, identity, security and freedom are evolving in the virtual world.

Find us on twitter


April 2011
« Mar   May »