feeding my own misguided insanity

From Internet Censorship to Real-time Content Manipulation

For those of us who live in the Middle East, Internet censorship and partial access to services is a daily reality. The UAE’s two primary Internet Service Providers (ISPs), Du & Etisalat, actively monitor and filter access to Internet sites and content that the government deems inappropriate.

But censorship of the Internet is only part of what I wanted to discuss here. I’m more interested in new technological advances that are helping these repressive governments achieve new levels of control and surveillance.

Who are the Enemies of the Internet

Reporters without Borders (Reporters sans Frontià¨res, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, has just released their annual Internet Enemies Report which reveals some surprising findings.

Internet content filtering is growing but Internet surveillance is growing even more. Censors prefer to monitor dissidents’ online activities and contacts rather than try to prevent them from going online.

–RSF

Enemies of the Internet

According to the report, twelve countries fall under the Enemies of the Internet category and are classified as such if they demonstrate a capacity to censor news and information online, but also for their almost systematic repression of Internet users: Bahrain, Belarus, Burma, China (excluding Hong Kong and Macau), Cuba, Iran, North Korea, Saudi Arabia, Syria, Turkmenistan, Uzbekistan, Vietnam.

Countries under Surveillance

The fourteen countries listed under the Countries under Surveillance category are those that actively monitor, report and/or have in place frameworks that encourage ISPs to report on their subscribers’ Internet activities: Australia, Egypt, Eritrea, France, India, Kazakhstan, Malaysia, Russia, South Korea, Sri Lanka, Thailand, Tunisia, Turkey, United Arab Emirates.

Enemies of the Internet

It’s quite shocking to see two Western countries, Australia and France, make this list.

Australia, whose government clings to a dangerous content filtering system, has persuaded ISPs to create a voluntary system of information disclosure. It has also formed a News Media Council which “could turn out to be dangerous for freedom of information in the blogosphere.” France is on the list because it continues its “three-strikes” policy on illegal downloading and allows for official filtering of the Web.

Western Technology for Repressive Regimes

Some of the world’s most repressive regimes are (ab)using technologies developed, and in most cases sold to them, by Western corporations.

To enhance their surveillance abilities, repressive regimes turn to specialized companies for ever more effective equipment and software for filtering, monitoring and Deep Packet Inspection.

– RSF, Internet Enemies Report 2012

The report names the US company Blue Coat, for its activities in Syria, Vodafone and Etisalat, for “criminal liability in participation in the harming and killing of demonstrators by cutting off the Internet and telecommunication services in Egypt arbitrarily“, Amesys, a French company which supplied Col. Gaddafi, and Area S.p.A. [1], an Italian company for its cooperation with the Assad regime (Reporters sans Frontiers, 2012).

In addition to the existing censorship policies in the UAE, according to Major Salem Obaid Salmeen, Dubai’s deputy director of anti-electronic crimes, social networking sites like Twitter and Facebook are subject to round-the-clock monitoring by dedicated teams in Dubai and other emirates.[2] Many more companies are implicated by similar reports (Sadafy, 2012).

McAfee and its SmartFilter technology was mentioned in relation to filtering content in Saudi Arabia, UAE, Kuwait, Bahrain, Oman and Tunisia in a bulletin released by the OpenNet Initiative[3] (Noman & York, 2011).

Western-built automated filtering solutions to block mass content, such as websites that provide sceptical views of Islam, secular and atheist discourse, sex, GLBT, dating services, and proxy and anonymity tools. These lists of sites are maintained by the Western company vendors. The ISPs also use these tools to add their own selected URLs to the companies’ black lists.

– OpenNet Initiative

Out of all these companies, only Websense has gone on record “opposing the use of its software for the purposes of government censorship, except for the protection of minors from pornography.” This technology is actively being used to hamper and at times completely stop people’s ability to create and share vital content during times of crisis.

Are we advocating the use of Western products to oppress the people of sovereign countries and deny them basic human rights? It seems that the West’s motivation has shifted from government & resource-based interference (oil, gas, minerals) to that of controlling the greater population. Look at what happened during the Arab Spring.[4]

The Next Wave of Technological Warfare

We can only estimate the total number of blogs, somewhere around 100 million, according to Pingdom. The task of censoring, classifying and updating the classification databases is quite the task with many legitimate sites being wrongly classified and subsequently blocked.

Du Restricted Site Message

But if you thought that the situation was bad enough as it is, then prepare yourselves for a new wave of technological warfare that will make the current systems look like stone-age tools.

You see, the problem right now is that the end user is fully aware that a site has been blocked. They receive any number of messages telling them that a site is blocked and why.

Utopian Censorship

Imagine a world where censorship was transparent and completely hidden from the consumer. Where the browsing experience is no longer interrupted by intrusive “restricted” messages, but instead, the page renders properly and fills with content. The people read and consume that which is presented without ever questioning its authenticity.

The next wave will consist of governments and corporations being able to render a fully readable page without alerting anyone to what is really happening behind the scenes. This is the ultimate deception. Not only will an oppressive government have the ability to rewrite the content as they see fit, the audience will never (or very rarely) know the true content, nor the publisher be aware of the ongoing deception.

Consider a simple scenario of browsing to the New York Times website, but instead of a page which should read “19 Killed in State-Sanctioned Assassination” the content is manipulated to read “29 Government Soldiers Wounded in Rebel Skirmish” – not only changing the slant but also replacing words and statistics of importance.

Technology such as this would singlehandedly change the way people interact with one another and transform the Internet into the most powerful propaganda and manipulation tool in existence.

Real-time Content Manipulation

When a people are aware of manipulation and censorship, they are likely to seek alternative and trustworthy sources of information. With current tools, the regime might be able to stop the access but they won’t be able to satisfy the underlying thirst for knowledge.

But what if whole sentences, paragraphs and ideas could be automatically and effortlessly redacted down to whatever the regime wants — real-time content manipulation and thought control.

And if you think that technology like this doesn’t yet exist, consider Narrative Science, a company that trains computers to write news stories. The generated articles are already running on the websites of respected publishers like Forbes, as well as other Internet media powers (many of which are keeping their identities private) (Levy, 2012).

The fact that customers wish to remain anonymous is, in my mind, a clear indication that the spread of the technology is far greater than what is being reported and that the wave is already upon us.

Automated Insights, a company based out of North Carolina, is also a major player in this new content game, much like Narrative Science, their website blurb reads: “Our technology platform automatically transforms raw data into compelling narrative content (articles, summaries, headlines), visual displays (charts, tables, graphs) and interactive applications (mobile and Twitter/Facebook-based social applications).:

At the moment, Narrative Science admits to only looking at sporting events and financial markets, however, it is predicted that the technology will be available to write whole news stories within 15 years and that 90% of all news will be written in this way (Levy, 2012).

Eventually, the algorithms will be refined to such a degree that the content and the news will be reorganized, redacted, censored and rewritten as it moves dynamically from one Internet gateway to the next. Implementing such algorithms in existing systems would be a trivial task.

The right to communicate cannot be ignored … The internet is the most powerful potential source of enlightenment ever created.

– Dr Hamadoun Toure [5]

How long before this type of manipulative technology becomes abused by democratic and so-called “free” countries to serve their own propaganda agendas?

[Title photo credit: Eric Drooker]

Footnotes
  1. Area S.p.A. finally pulled out of Syria after an international campaign criticizing its cooperation with the Assad regime. ^
  2. The security services no longer interrogate and torture a prisoner for the names of his accomplices. Now they want his Facebook, Skype and Vkontakte passwords. It is the same in Bahrain, Turkmenistan or Syria. ^
  3. The OpenNet Initiative is a collaborative partnership of three institutions: the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group (Ottawa). ^
  4. Arab Spring is a revolutionary wave of demonstrations and protests occurring in the Arab world that began on Friday, 17 December 2010. ^
  5. Dr Hamadoun Toure is the secretary-general of the International Telecommunication Union (ITU) and was interviewed as part of a BBC survey of more than 27,000 adults across 26 countries. ^

References

Anderson, C. (n.d.). The Man Who Makes the Future: Wired Icon Marc Andreessen. WIRED. Retrieved April 27, 2012, from http://www.wired.com/epicenter/2012/04/ff_andreessen/
Arab Spring. (2012, April 28).Wikipedia, the free encyclopedia. Wikimedia Foundation, Inc. Retrieved from http://en.wikipedia.org/w/index.php?title=Arab_Spring&oldid=489370149
Arabic Network for Human Rights Information. (n.d.). ANHRI calls on attorney general to investigate telecoms’ responsibility in civilian deaths – IFEX. Retrieved April 27, 2012, from http://www.ifex.org/egypt/2011/02/25/criminal_liability/
Associated Press. (2012, April 27). Cispa cybersecurity bill passed by US Senate. the Guardian. Retrieved from http://www.guardian.co.uk/technology/2012/apr/27/cispa-cybersecurity-bill-passed-senate
Automated Insights. (n.d.).Automated Insights. Retrieved April 28, 2012, from http://automatedinsights.com/
Avaaz. (n.d.). Click here to save the Internet from US spies. Avaaz. Retrieved April 27, 2012, from http://www.avaaz.org/en/stop_cispa_corporate_global/
BBC. (2010, March 8). Internet access “a human right.” BBC. Retrieved from http://news.bbc.co.uk/2/hi/8548190.stm
Crawford, S. (n.d.). Be Very Afraid: The Cable-ization of Online Life Is Upon Us. WIRED. Retrieved April 27, 2012, from http://www.wired.com/epicenter/
Dubai Prohibited Content Categories. (n.d.). Retrieved April 27, 2012, from http://www.etisalat.ae/assets/document/blockcontent.pdf
Farivar, C. (n.d.). CISPA passes House despite opposition. Ars Technica. Retrieved April 27, 2012, from http://arstechnica.com/tech-policy/news/2012/04/cispa-passes-house-despite-opposition.ars
Fassler, J. (2012, April 12). Can the Computers at Narrative Science Replace Paid Writers? The Atlantic. Retrieved April 27, 2012, from http://www.theatlantic.com/entertainment/archive/2012/04/can-the-computers-at-narrative-science-replace-paid-writers/255631/
Internet 2011 in numbers. (n.d.).Pingdom. Retrieved April 28, 2012, from http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/
Internet censorship. (2012, April 26).Wikipedia, the free encyclopedia. Wikimedia Foundation, Inc. Retrieved from http://en.wikipedia.org/w/index.php?title=Internet_censorship&oldid=489170751
Levy, S. (2012, April 24). Can an Algorithm Write a Better News Story Than a Human Reporter? WIRED. Retrieved April 27, 2012, from http://www.wired.com/gadgetlab/2012/04/can-an-algorithm-write-a-better-news-story-than-a-human-reporter/all/1
Lohr, S. (2011, September 10). Computer-Generated Articles Are Gaining Traction. The New York Times. Retrieved from http://www.nytimes.com/2011/09/11/business/computer-generated-articles-are-gaining-traction.html
McAfee SmartFilter | McAfee Products. (n.d.). Retrieved April 27, 2012, from http://www.mcafee.com/us/products/smartfilter.aspx
Narrative Science. (27). Forbes Earnings Previews: Hertz Global. Retrieved April 28, 2012, from http://www.forbes.com/sites/narrativescience/2012/04/27/forbes-earnings-preview-hertz-global-2/
Narrative Science. (n.d.). Forbes Video. ShortForm. Retrieved April 27, 2012, from http://www.shortform.com/forbes/my/watch
Noman, H., & York, J. C. (2011, March). West Censoring East: The Use of Western Technologies by Middle East Censors, 2010-2011 | OpenNet Initiative. OpenNet Initiative. Retrieved April 27, 2012, from http://opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011
Police: Dubai watching the web round the clock. (n.d.).The Washingtion Times. Retrieved from http://www.washingtontimes.com/news/2012/apr/4/police-dubai-watching-the-web-round-the-clock/
Press Trust Of India. (2012, April 2). UK to introduce snooping laws. Business Standard India. Retrieved from http://www.business-standard.com/india/news/uk-to-introduce-snooping-laws/469799/
Reporters sans Frontiers. (2012a). Beset by online surveillance and content filtering, netizens fight on – Reporters Without Borders. Reporters sans Frontiers. Retrieved from http://en.rsf.org/beset-by-online-surveillance-and-13-03-2012,42061.html
Reporters sans Frontiers. (2012b, March 12). INTERNET ENEMIES REPORT 2012. Retrieved April 27, 2012, from http://en.rsf.org/IMG/pdf/rapport-internet2012_ang.pdf
Sadafy, M. A. (n.d.). Dubai Police monitoring social networking sites round the clock. Emirates 24/7. Retrieved from http://www.emirates247.com/news/emirates/dubai-police-monitoring-social-networking-sites-round-the-clock-2012-04-04-1.452143
Vpn Accounts : PPTP SSTP L2TP Services – Purchase Order Buy Connection to Bypass ISP Restrictions UAE Belize China Oman Kuwait Qatar Skype. (n.d.).vpnaccounts.com. Retrieved April 27, 2012, from http://www.vpnaccounts.com/

GD Star Rating
loading...
From Internet Censorship to Real-time Content Manipulation, 9.3 out of 10 based on 3 ratings

, , , , , , , , , , Middle East, News, Security, Thoughts

3 Comments → “From Internet Censorship to Real-time Content Manipulation”

  1. Khaled H 5 years ago   Reply

    eventually also .. youngsters will find ways to break the loop even write counter algorithms. it is really REALLY hard to maintain oppression.

  2. Dr.Shem 5 years ago   Reply

    I hope you’re right. If it were ever to happen, I hope that the introduction of such manipulation algorithms would have some backdoor to thwart them even if installed at the ISP or country level.

Trackbacks For This Post

  1. CISPA & CCDP: Digital Snooping Laws to Rule them All | Dr.Shem - 5 years ago

    […] already touched on Reporters sans Frontières’s recently released Internet Enemies Report in which they discussed countries with poor records of privacy protection or even outright […]

Leave a Reply