SlideShare a Scribd company logo
1 of 11
THE INTERNET STATE
FILTER
How and why do governments monitor and filter Internet data and in what ways
does this affect us?
“
”
STATES ARE ADOPTING PRACTICES AIMED AT REGULATING AND CONTROLLING THE INTERNET
AS IT PASSES THROUGH THEIR BORDERS. MUCH LIKE GEOGRAPHICAL BOUNDARIES, STATES ARE
SEEKING TO ASSERT INFORMATION SOVEREIGNTY OVER THE INTERNET… INTERNET CONTENT
FILTERING AT THE NATIONAL LEVEL IS IMPOSED ON ENTIRE POPULATIONS, OFTEN WITH LITTLE
ACCOUNTABILITY. IT IS, IN EFFECT, AN INFORMATION CONTROL POLICY IN WHICH WEB
CONTENT, DEEMED TO BE UNDESIRABLE, IS CENSORED THROUGH TECHNICAL MEANS.
Nart Villeneuve (2006)
HOW IT'S DONE
Content is filtered in a number of ways.
Domain Name Service (DNS) filtering is controlled by Internet Service Providers
(ISP) on behalf of governments. However this form of filtering is easy to circumvent
and therefore less common.
Internet Protocol (IP) filtering happens when the ISP blocks the identified IP
address through routers.
URL filtering is more complex as it requires an extra device, but is the most
effective control method (Villeneuve, 2006)
WHY FILTERING OCCURS
Villneuve (2006) highlights the following factors that motivate nations to implement
internet monitoring and filtering:
• Led by business and financial interests such as taxation and rights ownership
• Protection of children from online dangers
• Cultural conventions imposing restrictions on gambling and pornography
• Political ideology attempting to control opposing views and quell dissidents
• Online crime prevention
ONLINE FREEDOM USED AS A FOIL
The onset of Internet technology was seen by many as a path to increased liberty
and freedom of speech for countries that sought to restrict the public's right to
information and public opinion.
However, as Golkar (2011)notes, Iran is an example of a country which has used
this technology to further its control over its populous and extend the strength of
the regime.
THE GREAT FIREWALL OF CHINA
China is one clear example where the state has
taken the decision to block content in the form
of the Great Firewall.
• The Chinese government blocks around 3000 websites (such as the BBC and
Facebook) from around the world. In a meeting with key players at Microsoft
headquarters last year, the Chinese premier outlined the need for a safe and secure
Internet(Day, 2015).
PROBLEMS WITH THE POLICY
Under-blocking, over-blocking and flaws in the system
Regardless of the ethical validity of governments infringing the privacy and restricting
free access to information of its populous, there are other concerns with the
effectiveness of filtering Internet data. As August (2009) points out, there is very little
consistency with what officials in China restrict. Some websites are blocked while
others are missed. Offensive material remains available and seemingly innocuous
content gets blocked. In addition to this with every advance in filtering, new methods
to unlock content become available.
THE WIDER IMPLICATIONS
What are the ramifications of an authority creating restrictions on data flow in the
assumed interest of protecting its citizens?
With many web developers unable to have a working platform that works both in and out of
China, they are forced to choose between the Chinese or international markets.This restriction
has had huge implications on the development of divergent online technology inside
China(Day, 2015).
NOT JUST A TOTALITARIAN ISSUE
It isn't just countries with extreme political ideologies that have implemented systems
to monitor and control Internet traffic. Many Western democratic countries have
been shown to monitor the public's Internet use. In 2008 Australia became the first
Western state to enact legislature to filter the Internet (Bambauer, 2008).
THE FREEDOM FIGHTBACK
In response to attempts by governments
and businesses to gain control of the
flow of information on the Internet, there
has been a rise in what Croeser(2012)
describes as the Digital Liberties
Movement (DLM), which centres on the
challenges faced by users claiming a free
and libertarian Internet for all.
In a show of solidarity, some of the
leading online companies have agreed to
commit to the Global Network Initiative
to ensure that business practices follow
ethical lines that protect public freedom
(Harris, 2009).
REFERENCES
• August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens Online. Wired, 15(11).
• Bambauer, D. (2008). Filtering in Oz: Australia's Foray into Internet Censorship. Brooklyn Law School, Legal Studies Paper, No. 125.
• Croeser, S. (2012). Contested Technologies: the emergence of the digital liberties movement. First Monday, 17(8).
• Day, M. (2015). Internet security a priority, Chinese president tells tech executives. The Seattle Times.
• Golkar, Saeid (2011)Liberation or Suppression Technologies? The Internet, the Green Movement and the Regime in Iran,
International Journal of Emerging Technologies and Society, 2011, Vol.9(1), pp.50-70
• Fallows, D. (2008). Most Chinese Say They Approve of Government Internet Control.
• Harris, L. (2009) Advancing Global Internet Freedom.
• Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in
cyberspace. First Monday, 11(1).

More Related Content

What's hot

POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Tissue Chowtszyan
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?DannyTio
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
Net Neutrality: how its elimination might impact patients & healthcare
Net Neutrality:how its elimination might impact patients & healthcareNet Neutrality:how its elimination might impact patients & healthcare
Net Neutrality: how its elimination might impact patients & healthcareKR_Barker
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivismEva Sánchez
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivismaligi
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 

What's hot (20)

POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Child grooming
Child groomingChild grooming
Child grooming
 
Polinter11
Polinter11Polinter11
Polinter11
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Net Neutrality: how its elimination might impact patients & healthcare
Net Neutrality:how its elimination might impact patients & healthcareNet Neutrality:how its elimination might impact patients & healthcare
Net Neutrality: how its elimination might impact patients & healthcare
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Polinter07
Polinter07Polinter07
Polinter07
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Polinter07
Polinter07Polinter07
Polinter07
 

Similar to The Internet State Filter

C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxAndrewClark295760
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in EducationCraig Geffre
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxwraythallchan
 
Net Nutrality
Net NutralityNet Nutrality
Net NutralityJay Patel
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy SummaryKim Moore
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislationlily_ji
 
The Internet and Global Governance Principles and Norms
 The Internet and Global Governance Principles and Norms  The Internet and Global Governance Principles and Norms
The Internet and Global Governance Principles and Norms MoseStaton39
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaSurya Sharma
 

Similar to The Internet State Filter (17)

C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Net Nutrality
Net NutralityNet Nutrality
Net Nutrality
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy Summary
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislation
 
The Internet and Global Governance Principles and Norms
 The Internet and Global Governance Principles and Norms  The Internet and Global Governance Principles and Norms
The Internet and Global Governance Principles and Norms
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran Sharma
 

Recently uploaded

Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...MOHANI PANDEY
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...Sareena Khatun
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024SOFTTECHHUB
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxjeykeydeveloper
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 

Recently uploaded (20)

Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 

The Internet State Filter

  • 1. THE INTERNET STATE FILTER How and why do governments monitor and filter Internet data and in what ways does this affect us?
  • 2. “ ” STATES ARE ADOPTING PRACTICES AIMED AT REGULATING AND CONTROLLING THE INTERNET AS IT PASSES THROUGH THEIR BORDERS. MUCH LIKE GEOGRAPHICAL BOUNDARIES, STATES ARE SEEKING TO ASSERT INFORMATION SOVEREIGNTY OVER THE INTERNET… INTERNET CONTENT FILTERING AT THE NATIONAL LEVEL IS IMPOSED ON ENTIRE POPULATIONS, OFTEN WITH LITTLE ACCOUNTABILITY. IT IS, IN EFFECT, AN INFORMATION CONTROL POLICY IN WHICH WEB CONTENT, DEEMED TO BE UNDESIRABLE, IS CENSORED THROUGH TECHNICAL MEANS. Nart Villeneuve (2006)
  • 3. HOW IT'S DONE Content is filtered in a number of ways. Domain Name Service (DNS) filtering is controlled by Internet Service Providers (ISP) on behalf of governments. However this form of filtering is easy to circumvent and therefore less common. Internet Protocol (IP) filtering happens when the ISP blocks the identified IP address through routers. URL filtering is more complex as it requires an extra device, but is the most effective control method (Villeneuve, 2006)
  • 4. WHY FILTERING OCCURS Villneuve (2006) highlights the following factors that motivate nations to implement internet monitoring and filtering: • Led by business and financial interests such as taxation and rights ownership • Protection of children from online dangers • Cultural conventions imposing restrictions on gambling and pornography • Political ideology attempting to control opposing views and quell dissidents • Online crime prevention
  • 5. ONLINE FREEDOM USED AS A FOIL The onset of Internet technology was seen by many as a path to increased liberty and freedom of speech for countries that sought to restrict the public's right to information and public opinion. However, as Golkar (2011)notes, Iran is an example of a country which has used this technology to further its control over its populous and extend the strength of the regime.
  • 6. THE GREAT FIREWALL OF CHINA China is one clear example where the state has taken the decision to block content in the form of the Great Firewall. • The Chinese government blocks around 3000 websites (such as the BBC and Facebook) from around the world. In a meeting with key players at Microsoft headquarters last year, the Chinese premier outlined the need for a safe and secure Internet(Day, 2015).
  • 7. PROBLEMS WITH THE POLICY Under-blocking, over-blocking and flaws in the system Regardless of the ethical validity of governments infringing the privacy and restricting free access to information of its populous, there are other concerns with the effectiveness of filtering Internet data. As August (2009) points out, there is very little consistency with what officials in China restrict. Some websites are blocked while others are missed. Offensive material remains available and seemingly innocuous content gets blocked. In addition to this with every advance in filtering, new methods to unlock content become available.
  • 8. THE WIDER IMPLICATIONS What are the ramifications of an authority creating restrictions on data flow in the assumed interest of protecting its citizens? With many web developers unable to have a working platform that works both in and out of China, they are forced to choose between the Chinese or international markets.This restriction has had huge implications on the development of divergent online technology inside China(Day, 2015).
  • 9. NOT JUST A TOTALITARIAN ISSUE It isn't just countries with extreme political ideologies that have implemented systems to monitor and control Internet traffic. Many Western democratic countries have been shown to monitor the public's Internet use. In 2008 Australia became the first Western state to enact legislature to filter the Internet (Bambauer, 2008).
  • 10. THE FREEDOM FIGHTBACK In response to attempts by governments and businesses to gain control of the flow of information on the Internet, there has been a rise in what Croeser(2012) describes as the Digital Liberties Movement (DLM), which centres on the challenges faced by users claiming a free and libertarian Internet for all. In a show of solidarity, some of the leading online companies have agreed to commit to the Global Network Initiative to ensure that business practices follow ethical lines that protect public freedom (Harris, 2009).
  • 11. REFERENCES • August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens Online. Wired, 15(11). • Bambauer, D. (2008). Filtering in Oz: Australia's Foray into Internet Censorship. Brooklyn Law School, Legal Studies Paper, No. 125. • Croeser, S. (2012). Contested Technologies: the emergence of the digital liberties movement. First Monday, 17(8). • Day, M. (2015). Internet security a priority, Chinese president tells tech executives. The Seattle Times. • Golkar, Saeid (2011)Liberation or Suppression Technologies? The Internet, the Green Movement and the Regime in Iran, International Journal of Emerging Technologies and Society, 2011, Vol.9(1), pp.50-70 • Fallows, D. (2008). Most Chinese Say They Approve of Government Internet Control. • Harris, L. (2009) Advancing Global Internet Freedom. • Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1).