Code:
Content, Pictures and Download links visible to registered users only.
REGISTER NOW to access all areas that are invisible to non-members.
This week, an open letter appeared on Chinese blogs and online bulletin boards. ?Hello, internet censorship institutions of the Chinese government,? it said. ?We are the anonymous netizens. We hereby decide that from July 1 2009, we will start a full-scale global attack on all censorship systems you control.?
Beijing?s attempts to manipulate the internet would, the message predicted, ?soon be swept on to the rubbish pile of history?.
Chinese internet users, although skilled at dodging the censors, are angrier than they have ever been. The anonymous declaration of war is just one sign of the strains emerging as the global spread of internet access, and its embrace by activists of all stripes, triggers an unprecedented crackdown by national governments that threatens to transform the way hundreds of millions of people communicate.
China is trying to force censorship software on to every new personal computer, while Iran succeeded this week in virtually eliminating the spread over the internet of first-hand accounts from protests in the streets at the handling of its presidential election.
That stifling of web freedoms that many people around the world take for granted are being accompanied by more novel means of combating cyber opponents. Those methods range from directing stealthy technological attacks that shut down dissident websites to unleashing swarms of paid commentators to argue the government position on supposedly independent blogs.
Both carry the added attraction of deniability: many regimes are employing advanced repressive techniques that are hard to identify in action, let alone circumvent. At a time when new communication technologies, from text messaging to Twitter, promise to put greater power in the hands of the individual, these techniques are having a chilling effect. Internet experts from more open societies fear that this will lead to greater self-censorship by organisations and individuals, which they see as the most effective tool of all.
Even the optimists warn of setbacks. ?In the end, the winners of the race are most likely to be citizens and activists who use these technologies for democratic purposes,? says John Palfrey of Harvard University, an authority on internet filtering. But he adds: ?With respect to individual battles, the states that practise censorship and surveillance are winning some of them.?
The number of such states is in the dozens, researchers say. In Burma and Moldova, governments recently resorted to pulling the plug on mobile phone networks amid unrest magnified by text messages; in Uzbekistan, there is widespread suspicion of internet monitoring but few ways to prove it. That is despite the fact that a lot of the surveillance and security software in the hands of governments across the world comes from western suppliers. In what is by its nature among the most globalised of industries, technology companies are seeing a revenue boost from governmental interest in data mining, search and storage products, though they periodically draw fire from activists for assisting repressive states.
The most gripping evidence of the change at hand has come from Iran. The theocratic regime has been in a protracted struggle over the free flow of information and communication with many of its largely young urban populace since the day after this month?s disputed election.
STRONG-ARM TECHNIQUES
How curbs on net users work:
Internet filters
Method: Set up on the main conduits of the internet, known as backbones, these software filters block traffic from websites on a proscribed list.
Example: ?Great Firewall of China?.
Deep packet inspection
Method: A layer of software that looks to identify the content of individual pieces of information, or ?packets?. This can be used to read, store or block individual messages and connections to websites.
Example: Commercial providers including Phorm and NebuAd.
Denial of service attacks
Method: Large numbers of PCs bombard a website with requests, making it inaccessible to other users.
Example:Sites in Estonia and Georgia during conflicts with Russia.
Toeing the party line
Method: Some regimes recruit people to present their case online, sometimes paying them.
Example: ?50-cent bloggers? in China.
Self-censorship
Method: Governments bring pressure on companies to restrict access to content. Bloggers must register.
Example:MSN Spaces, Microsoft?s blogging service in China, bans phrases including ?human rights?.
Edge-of-network restrictions
Method: Censors push control to a more local level. Internet providers? terms of service make them act as agents of the state. Restrictions at the edges of the network can reach all the way to curbs installed in PCs.
Example: China?s Green Dam/Youth Escort software.
Tehran has a decided advantage in that it runs the country?s leading internet service provider. Called DCI, it throttled back the amount of bandwidth available to its citizens so that web video traffic dropped by as much as 90 per cent and e-mail leaving the country fell by nearly as much.
Data assembled by Arbor Networks, a US internet security company, show the Iranian government was picking and choosing what types of traffic to let through and which parts of the net to leave unimpeded. Just as the security forces adjusted their response to counter the changing nature of the protests on the ground, Iran?s internet police changed which sites could be reached.
F acebook and other social networks were easy to block and fell quickly. Twitter, a web-accessible broadcasting service that can process messages from mobile phones, proved harder to take down without killing off all text messaging.
Activists proved agile at hopping from one medium to another. For more than a week, outsiders would send people in Iran the addresses of ?open proxies?, computers outside the country set up to relay traffic. That way, Iranians could still reach sites they were blocked from accessing directly. But the authorities hunted down most of those proxies and cut off access. Finally, on Thursday, they killed most outgoing traffic, including Twitter blasts.
?It?s a big problem when a government is just willing to shut down communications,? says John Perry Barlow of the Electronic Frontier Foundation, a non-profit organisation based in San Francisco, who was helping dissidents get the word out. ?If they do that, you?re down to smoke signals.?
Iran?s response evolved rapidly, aided by filtering technology in place long before the election. No country, though, has been as thoroughly policed through as many means as China, which has long been on the cutting edge of censorship.
Now, Beijing is trying to cement its control with a decree that from July 1, all computers sold in the country must come with a program called Green Dam/Youth Escort, which the government says will be used to block access to pornography sites. Dell, Hewlett-Packard and other computer makers are protesting and have won the support of US trade officials, who are threatening to bring the matter to the World Trade Organisation.
?Green Dam will be a game-changer, if in fact it goes into effect,? says Harvard?s Mr Palfrey. ?The desktop is the last bastion of personal freedom. It would change the way people use these devices in extraordinary ways.?
Beijing has for years blocked many sites by setting up filters on the country?s largest internet backbones, using a method nicknamed the Great Firewall of China. The central government has more recently heaped additional blocking and monitoring responsibilities on to internet service providers, web companies and local censors, all of which have been upgrading the technology they use.
TRS, a Chinese supplier of internet security products, says growing numbers of police departments are replacing their traditional search engine-based efforts with state-of-the-art data mining applications, which are capable of analysing large bodies of information.
All this has its limits. ?Controlling public networks is very, very difficult,? says Tony Yuan, chief executive of Netentsec, another Chinese security provider. ?Bandwidth and traffic are huge, so normally you don?t have the computing power.?
But the latest effort by China?s central authorities takes them further still, to the PCs that stand at the edge of the network. It is not clear they will succeed. The computer makers and US government are being joined in their opposition by security researchers who have identified flaws in Green Dam that could allow third parties to take control of PCs.
Even if the blanket order is delayed, circumvented or quietly forgotten, the Chinese government has already gained access to many PCs. Earlier this year, Beijing made the bundling of Green Dam a precondition for eligibility of PCs in its subsidy programme for PC sales to rural residents. In May, it ordered all schools to install the program. ?I would estimate that we?re already looking at more than 10m computers in China with Green Dam installed,? says an executive at a Beijing internet portal company.
An estimated 300m Chinese have online access. Though the more determined among them are likely to find ways around Green Dam, many may not even try to defy the message of disapproval being sent by Beijing.
Some of the surveillance and censorship technology in Iran and China is home-grown but much of it is western. Nokia Siemens Networks, a joint venture between the two European companies, says, for example, that it was required to sell Iran equipment for monitoring phone calls as part of a contract for a communications network. Cisco has periodically come under fire for selling its routers to China but says the same equipment is used in both open and closed internet systems.
Under laws in the US and elsewhere, telecommunications companies must make it easy for law enforcement agencies to conduct authorised wiretaps ? and equipment providers say they cannot shut that capability off depending on the customer.
Collection, in fact, is no longer so much the problem: analysing the masses of data is a bigger issue, as is massaging search technology to look for more than simple keywords that alarm officials, such as ?Tibet? and ?democracy?. That technology is becoming much better ? spurred in part by the increasing global attention to cyber security. Notably, the US defence department this week approved a new military cyber command that will answer to the National Security Agency, which in recent years has been exposed for mining Americans? e-mail without warrants.
Concerns about pernicious criminal software and ?denial of service? attacks, which have shut government websites in Estonia and elsewhere with bombardments of useless data, have prompted further efforts to scrutinise internet traffic. But according to some researchers, technologies developed to counter insidious attacks such as these will only serve to advance the techniques of information control ? to the eventual detriment of future mass revolts against oppressive political forces.
?If security starts becoming job one, then a lot of things being used by repressive states will become commercialised and normalised,? says Rafal Rohozinski, a founder of the OpenNet Initiative, which tracks filtering. ?We?ll be doing the same thing as Iran, or using the same technologies. And that?s what I worry about.?