The Opennet Initiative

1. What is ONI?

The OpenNet Initiative is a collaborative partnership of three institutions: the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group (Ottawa).

2. What is the aim of ONI?

Our aim is to investigate, expose and analyze Internet filtering and surveillance practices in a credible and non-partisan fashion.

3. Indicate 4 strategies to implement Internet Censorship

1) TECHNICAL BLOCKING
There are three commonly used techniques to block access to Internet sites: IP blocking, DNS tampering, and URL blocking using a proxy. These techniques are used to block access to specific WebPages, domains, or IP addresses. These methods are most frequently used where direct jurisdiction or control over websites are beyond the reach of authorities. Keyword blocking, which blocks access to websites based on the words found in URLs or blocks searches involving blacklisted terms, is a more advanced technique that a growing number of countries are employing. Filtering based on dynamic content analysis—effectively reading the content of requested websites—though theoretically possible, has not been observed in our research. Denial of service attacks produce the same end result as other technical blocking techniques—blocking access to certain websites—carried out through indirect means.

2) SEARCH RESULT REMOVALS
In several instances, companies that provide Internet search services cooperate with governments to omit illegal or undesirable websites from search results. Rather than blocking access to the targeted sites, this strategy makes finding the sites more difficult.

3) TAKE-DOWN
Regulators have direct access to and legal jurisdiction over web content hosts, the simplest strategy is to demand the removal of websites with inappropriate or illegal content. In several countries, a cease notice sent from one private party to another, with the threat, is enough to convince web hosts to take down websites with sensitive content. Where authorities have control of domain name servers, making the website invisible to users seeking to access the site.

4) INDUCED SELF-CENSORSHIP
Another common and effective strategy to limit exposure to Internet content is by encouraging self-censorship both in browsing habits and in choosing content to post online. This may take place through the threat of legal action, the promotion of social norms, or informal methods of intimidation. Arrest and detention related to Internet offenses, or on unrelated charges, have been used in many instances to induce compliance with Internet content restrictions. In many cases, the content restrictions are neither spoken nor written. The perception that the government is engaged in the surveillance and monitoring of Internet activity, whether accurate or not, provides another strong incentive to avoid posting material or visiting sites that might draw the attention of authorities.

4. Clearly explain one of the strategies indicated above

SEARCH RESULTS REMOVALS => This strategy consist that companies work together with the goverment to ban and omit illegal or offensive web pages worldwide, this strategy makes difficult to find illegal or offensive web pages.

5. What is "Points of Control"?

There are four types of "Points of control":

- Internet backbone :The state inserts blocking schemes that filters technologies that are carried to the backbone level ( Technologies affecting internet access arround the whole country )

- Internet Service Providers or (ISP`s) :Government-mandated filtering is most commonly implemented by Internet Service Providers (ISPs) using any one or combination of the technical filtering techniques mentioned above.

- Institutions : Filtering at an institutional level f.e.: companies, government organizations, schools and cybercafés

- Individual computers : This level of filtering can be achieved by installing any blocking or filtering software in our computers

6. Indicate the 4 major Points of Control. Clearly explain one of them

7. Make a list of bullet points on the inherent flaws of filtering

8. Make a diagram explaining how ONI studies Internet Filtration