Internet censorship is the legal
control or suppression of what can be accessed, published, or viewed on the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
.
Censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
is most often applied to specific
internet domain
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, publ ...
s (such as ''Wikipedia.org'', for example) but exceptionally may extend to all Internet resources located outside the
jurisdiction
Jurisdiction (from Latin 'law' and 'speech' or 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, the concept of jurisdiction applies at multiple level ...
of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet accesssuch as schools and librariesmay choose to preclude access to material that they consider undesirable, offensive,
age-inappropriate or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in
self-censorship Self-censorship is the act of censoring or classifying one's own discourse, typically out of fear or deference to the perceived preferences, sensibilities, or infallibility of others, and often without overt external pressure. Self-censorship is c ...
of material they publish, for moral, religious, or business reasons, to conform to
societal norms
A social norm is a shared standard of acceptable behavior by a group. Social norms can both be informal understandings that govern the behavior of members of a society, as well as be codified into rules and laws. Social normative influences or s ...
, political views, due to intimidation, or out of fear of legal or other consequences.
The extent of Internet censorship varies on a country-to-country basis. While some countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress and silence discussion among citizens.
Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the
Arab Spring
The Arab Spring () was a series of Nonviolent resistance, anti-government protests, Rebellion, uprisings, and Insurgency, armed rebellions that spread across much of the Arab world in the early 2010s. It began Tunisian revolution, in Tunisia ...
. Other types of censorship include the
use of copyrights,
defamation
Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
,
harassment
Harassment covers a wide range of behaviors of an offensive nature. It is commonly understood as behavior that demeans, humiliates, and intimidates a person, and it is characteristically identified by its unlikelihood in terms of social and ...
, and various obscene material claims as a way to deliberately suppress content.
Support for and opposition to Internet censorship also varies. In a
2012 Internet Society survey, 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey, 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "
freedom of expression
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
should be guaranteed on the Internet". Perception of internet censorship in the US is largely based on the
First Amendment and the right for expansive free speech and access to content without regard to the consequences. According to
GlobalWebIndex, over 400 million people use
virtual private network
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
s to
circumvent censorship or for increased user
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
.
Overview
Many of the challenges associated with Internet censorship are similar to those for offline censorship of more traditional media such as newspapers, magazines, books, music, radio, television, and film. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent
access to information
Access may refer to:
Companies and organizations
* ACCESS (Australia), an Australian youth network
* Access (credit card), a former credit card in the United Kingdom
* Access Co., a Japanese software company
* Access International Advisors, a h ...
even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.
[
Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:
* A 1993 '']Time Magazine
''Time'' (stylized in all caps as ''TIME'') is an American news magazine based in New York City. It was published weekly for nearly a century. Starting in March 2020, it transitioned to every other week. It was first published in New York Cit ...
'' article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
, as saying "The Net interprets censorship as damage and routes around it".
* In November 2007, "Father of the Internet" Vint Cerf
Vinton Gray Cerf (; born June 23, 1943) is an American Internet pioneer and is recognized as one of "the fathers of the Internet", sharing this title with TCP/IP co-developer Robert Kahn.
He has received honorary degrees and awards that inclu ...
stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.
* A report of research conducted in 2007 and published in 2009 by the Berkman Klein Center for Internet & Society
The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
at Harvard University stated that: "We are confident that the tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".
* In contrast, a 2011 report by researchers at the Oxford Internet Institute
The Oxford Internet Institute (OII) serves as a hub for interdisciplinary research, combining social and computer science to explore information, communication, and technology. It is an integral part of the University of Oxford's Social Science ...
published by UNESCO
The United Nations Educational, Scientific and Cultural Organization (UNESCO ) is a List of specialized agencies of the United Nations, specialized agency of the United Nations (UN) with the aim of promoting world peace and International secur ...
concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech".[
Blocking and filtering can be based on relatively static ]blacklist
Blacklisting is the action of a group or authority compiling a blacklist of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list; if people are on a blacklist, then they are considere ...
s or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, e.g., in libraries, universities or Internet café
An Internet café, also known as a cybercafé, is a Coffeehouse, café (or a convenience store or a fully dedicated Internet access business) that provides the use of computers with high bandwidth Internet access on the payment of a fee. Usage ...
s. Blocking and filtering may also vary within a country across different ISPs. Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases, the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked website.[
Unless the censor has total control over all Internet-connected computers, such as in ]North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
(who employs an intranet
An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders. The term is used in ...
that only privileged citizens can access), or Cuba
Cuba, officially the Republic of Cuba, is an island country, comprising the island of Cuba (largest island), Isla de la Juventud, and List of islands of Cuba, 4,195 islands, islets and cays surrounding the main island. It is located where the ...
, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity
A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning (orthonym). This also differs from a new name that entirely or legally replaces an individual's ow ...
and data havens (such as Hyphanet) protect free speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, are able to devote significant resources to building and maintaining a comprehensive censorship system.[
The term "]splinternet
The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and diver ...
" is sometimes used to describe the effects of national firewalls. The verb " rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.
Content suppression methods
Technical censorship
Various parties are using different technical methods of preventing public access to undesirable resources, with varying levels of effectiveness, costs and side effects.
Blacklist
Entities mandating and implementing the censorship usually identify them by one of the following items: keywords, domain name
In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority, or control. Domain names are often used to identify services provided through the Internet, such as websites, email services, and more. ...
s and IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es. Lists are populated from different sources, ranging from private supplier through courts to specialized government agencies ( Ministry of Industry and Information Technology of China, Islamic Guidance in Iran).
As per Hoffmann, different methods are used to block certain websites or pages including DNS spoofing
DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e ...
, blocking access to IPs, analyzing and filtering URLs, inspecting filter packets and resetting connections.
Points of control
Enforcement of the censor-nominated technologies can be applied at various levels of countries and Internet infrastructure:
* Internet backbone
The Internet backbone is the principal data routes between large, strategically interconnected computer networks and core routers of the Internet. These data routes are hosted by commercial, government, academic and other high-capacity network ...
, including Internet exchange points (IXP) with international networks ( Autonomous Systems), operators of submarine communications cable
A submarine communications cable is a cable laid on the seabed between land-based stations to carry telecommunication signals across stretches of ocean and sea. The first submarine communications cables were laid beginning in the 1850s and car ...
s, satellite Internet access
Satellite Internet access is Internet access provided through communication satellites; if it can sustain high-speed Internet, high speeds, it is termed satellite broadband. Modern consumer grade satellite Internet service is typically provide ...
points, international optical fibre links etc. In addition to facing huge performance challenges due to large bandwidths involved, these do not give censors access to information exchanged within the country.
* Internet Service Providers
An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
, which involves installation of voluntary (such as in the UK) or mandatory (such as in Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
) Internet surveillance and blocking equipment.
* Individual institutions, which in most cases implement some form of Internet access controls to enforce their own policies, but, especially in case of public or educational institutions, may be requested or coerced to do this on the request from the government.
* Personal devices, whose manufacturers or vendors may be required by law to install censorship software.
* Application service providers (e.g. social media companies), who may be legally required to remove particular content. Foreign providers with business presence in given country may be also coerced into restricting access to specific contents for visitors from the requesting country.
* Certificate authorities may be required to issue counterfeit X.509 certificates controlled by the government, allowing man-in-the-middle surveillance of TLS encrypted connections.
* Content Delivery Network
A content delivery network (CDN) or content distribution network is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance ("speed") by distributing the service spat ...
providers who tend to aggregate large amounts of content (e.g. images) may be also an attractive target for censorship authorities.
Approaches
Internet content is subject to technical censorship methods, including:[''Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet'']
, Dutton, March 2003
* Internet Protocol (IP) address blocking: Access to a certain IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
, FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and dat ...
and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses. Due to challenges with geopositioning, geo-blocking is normally implemented via IP address blocking.
* Domain name system (DNS) filtering and redirection: Connections to blocked domain name
In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority, or control. Domain names are often used to identify services provided through the Internet, such as websites, email services, and more. ...
s are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative DNS resolver that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file
The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for th ...
or typing the IP address instead of the domain name as part of a URL given to a Web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
.
* Uniform Resource Locator (URL) filtering: URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.
* Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results page
A search engine results page (SERP) is a webpage that is displayed by a search engine in response to a query by a user. The main component of a SERP is the listing of results that are returned by the search engine in response to a Keyword (Inter ...
s are more likely to be censored. Typical circumvention methods are to use encrypted connections – such as VPN and TLS/SSL – to escape the HTML content, or by reducing the TCP/IP
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
stack
Stack may refer to:
Places
* Stack Island, an island game reserve in Bass Strait, south-eastern Australia, in Tasmania’s Hunter Island Group
* Blue Stack Mountains, in Co. Donegal, Ireland
People
* Stack (surname) (including a list of people ...
's MTU/ MSS to reduce the amount of text contained in a given packet.
* Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.
* Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). A circumvention method could be to use a satellite ISP to access Internet.
* Portal censorship and search result removal: Major portals, including search engine
A search engine is a software system that provides hyperlinks to web pages, and other relevant information on World Wide Web, the Web in response to a user's web query, query. The user enters a query in a web browser or a mobile app, and the sea ...
s, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect to censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove Neo-Nazi
Neo-Nazism comprises the post–World War II militant, social, and political movements that seek to revive and reinstate Nazism, Nazi ideology. Neo-Nazis employ their ideology to promote hatred and Supremacism#Racial, racial supremacy (ofte ...
and other listings in compliance with German and French law.
* Computer network attacks: Denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.
Over and under blocking
Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired.[ An example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.
]
Use of commercial filtering software
Writing in 2009, Ronald Deibert
Ronald James Deibert (born 1964) is a Canadian professor of political science, philosopher, founder and director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto.
He was a co-founder and a principal investigator ...
, professor of political science at the University of Toronto
The University of Toronto (UToronto or U of T) is a public university, public research university whose main campus is located on the grounds that surround Queen's Park (Toronto), Queen's Park in Toronto, Ontario, Canada. It was founded by ...
and co-founder and one of the principal investigators of the OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University
Leland Stanford Junior University, commonly referred to as Stanford University, is a Private university, private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth ...
and an op-ed contributor to ''The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'', explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf filtering software sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.
Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
in 2008. SmartFilter has been used by Tunisia
Tunisia, officially the Republic of Tunisia, is a country in the Maghreb region of North Africa. It is bordered by Algeria to the west and southwest, Libya to the southeast, and the Mediterranean Sea to the north and east. Tunisia also shares m ...
, Saudi Arabia, Sudan
Sudan, officially the Republic of the Sudan, is a country in Northeast Africa. It borders the Central African Republic to the southwest, Chad to the west, Libya to the northwest, Egypt to the north, the Red Sea to the east, Eritrea and Ethiopi ...
, the UAE
The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a federal elective monarchy made up of seven emirates, with Abu Dhabi serving as i ...
, Kuwait, Bahrain
Bahrain, officially the Kingdom of Bahrain, is an island country in West Asia. Situated on the Persian Gulf, it comprises a small archipelago of 50 natural islands and an additional 33 artificial islands, centered on Bahrain Island, which mak ...
, Iran, and Oman
Oman, officially the Sultanate of Oman, is a country located on the southeastern coast of the Arabian Peninsula in West Asia and the Middle East. It shares land borders with Saudi Arabia, the United Arab Emirates, and Yemen. Oman’s coastline ...
, as well as the United States and the UK. Myanmar
Myanmar, officially the Republic of the Union of Myanmar; and also referred to as Burma (the official English name until 1989), is a country in northwest Southeast Asia. It is the largest country by area in Mainland Southeast Asia and has ...
and Yemen
Yemen, officially the Republic of Yemen, is a country in West Asia. Located in South Arabia, southern Arabia, it borders Saudi Arabia to Saudi Arabia–Yemen border, the north, Oman to Oman–Yemen border, the northeast, the south-eastern part ...
have used filtering software from Websense. The Canadian-made commercial filter Netsweeper is used in Qatar
Qatar, officially the State of Qatar, is a country in West Asia. It occupies the Geography of Qatar, Qatar Peninsula on the northeastern coast of the Arabian Peninsula in the Middle East; it shares Qatar–Saudi Arabia border, its sole land b ...
, the UAE
The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a federal elective monarchy made up of seven emirates, with Abu Dhabi serving as i ...
, and Yemen
Yemen, officially the Republic of Yemen, is a country in West Asia. Located in South Arabia, southern Arabia, it borders Saudi Arabia to Saudi Arabia–Yemen border, the north, Oman to Oman–Yemen border, the northeast, the south-eastern part ...
.["West Censoring East: The Use of Western Technologies by Middle East Censors, 2010–2011"]
, Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011 The Canadian organization CitizenLab has reported that Sandvine and Procera products are used in Turkey and Egypt.
On 12 March 2013, in a ''Special Report on Internet Surveillance'', Reporters Without Borders named five "Corporate Enemies of the Internet": Amesys (France), Blue Coat Systems
__FORCETOC__
Blue Coat Systems, Inc., was a company that provided hardware, software, and services designed for cybersecurity and network management. In 2016 it was acquired by and folded into Symantec and in 2019 as part of Symantec’s Enterpri ...
(U.S.), Gamma
Gamma (; uppercase , lowercase ; ) is the third letter of the Greek alphabet. In the system of Greek numerals it has a value of 3. In Ancient Greek, the letter gamma represented a voiced velar stop . In Modern Greek, this letter normally repr ...
(UK and Germany), HackingTeam (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.
In a U.S. lawsuit filed in May 2011, Cisco
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, s ...
is accused of helping the Chinese government
The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.
Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....[ The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.][ The blocking of ]Dailymotion
Dailymotion is a French online video platform, online video sharing platform owned by Canal+ S.A., Canal+. Prior to 2024, the company was owned by Vivendi. North American launch partners included Vice Media, Bloomberg L.P., Bloomberg, and Hears ...
in early 2007 by Tunisian authorities was, according to the OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
, due to Secure Computing wrongly categorizing Dailymotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked Dailymotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to Dailymotion was gradually restored in Tunisia.
Organizations such as the Global Network Initiative
The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition o ...
, the Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
, Amnesty International
Amnesty International (also referred to as Amnesty or AI) is an international non-governmental organization focused on human rights, with its headquarters in the United Kingdom. The organization says that it has more than ten million members a ...
, and the American Civil Liberties Union
The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million.
T ...
have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.[ ][China: Controls tighten as Internet activism grows](_blank)
"Cisco Systems
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develops, m ...
, Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
, Nortel Networks, Websense and Sun Microsystems
Sun Microsystems, Inc., often known as Sun for short, was an American technology company that existed from 1982 to 2010 which developed and sold computers, computer components, software, and information technology services. Sun contributed sig ...
", citing Amnesty International: People's Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002. Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.[
]
Non-technical censorship
Internet content is also subject to censorship methods similar to those used with more traditional media. For example:[
* Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
* Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
* Publishers and authors may accept ]bribe
Bribery is the corrupt solicitation, payment, or acceptance of a private favor (a bribe) in exchange for official action. The purpose of a bribe is to influence the actions of the recipient, a person in charge of an official duty, to act contrar ...
s to include, withdraw, or slant the information they present.
* Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
* Publishers, authors, and ISPs may be subject to civil lawsuits.
* Equipment may be confiscated and/or destroyed.
* Publishers and ISPs may be closed or required licenses may be withheld or revoked.
* Publishers, authors, and ISPs may be subject to boycott
A boycott is an act of nonviolent resistance, nonviolent, voluntary abstention from a product, person, organisation, or country as an expression of protest. It is usually for Morality, moral, society, social, politics, political, or Environmenta ...
s.
* Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.
* Publishers, authors, and their families may be threatened with or actually lose their jobs.
* Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.[Provision of information in this fashion is in keeping with principles of freedom of expression, as long as it is done transparently and does not overwhelm alternative sources of information.]
* Censors may create their own online publications and Web sites to guide online opinion.[
* Access to the Internet may be limited due to restrictive licensing policies or high costs.
* Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.
* Access to search results may be restricted due to government involvement in the censorship of specific search terms, content may be excluded due to terms set with search engines. By allowing search engines to operate in new territory they must agree to abide to censorship standards set by the government in that country.
]
Censorship of users by web service operators
Removal of user accounts based on controversial content
Deplatforming
Deplatforming, also known as no-platforming, is a boycott on an individual or group by removing the platforms used to share their information or ideas. The term is commonly associated with social media.
As early as 2015, platforms such as Red ...
is a form of Internet censorship in which controversial speakers or speech are suspended, banned, or otherwise shut down by social media
Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
platforms and other service providers that generally provide a venue for free speech or expression.[ Banking and financial service providers, among other companies, have also denied services to controversial activists or organizations, a practice known as " financial deplatforming".
Law professor ]Glenn Reynolds
Glenn Harlan Reynolds (born August 27, 1960) is an American legal scholar who is the Beauchamp Brogan Distinguished Professor of Law at the University of Tennessee College of Law. He is known for his American politics blog, ''Instapundit''.
Ins ...
dubbed 2018 the "Year of Deplatforming", in an August 2018 article in ''The Wall Street Journal
''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
''.[ According to Reynolds, in 2018 "the internet giants decided to slam the gates on a number of people and ideas they don't like."] On 6 August 2018, for example, several major platforms, including YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
and Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
, executed a coordinated, permanent ban on all accounts and media associated with conservative talk show host Alex Jones
Alexander Emerick Jones (born February 11, 1974) is an American Far-right politics, far-right radio host, radio show host and prominent conspiracy theorist. He hosts ''The Alex Jones Show'' from Austin, Texas. ''The Alex Jones Show'' is the lo ...
and his media platform InfoWars, citing "hate speech
Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
" and "glorifying violence."
Official statements regarding site and content removal
Most major web service operators reserve to themselves broad rights to remove or pre-screen content, and to suspend or terminate user accounts, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of service agreements.
* Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
: Among other things, the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".
* Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
".
** Google Search
Google Search (also known simply as Google or Google.com) is a search engine operated by Google. It allows users to search for information on the World Wide Web, Web by entering keywords or phrases. Google Search uses algorithms to analyze an ...
: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."
* Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be copyright infringing without prior notice and at our sole discretion".
* YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".
* Wikipedia
Wikipedia is a free content, free Online content, online encyclopedia that is written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and the wiki software MediaWiki. Founded by Jimmy Wales and La ...
: The site's content may be modified or Deletion of articles on Wikipedia, deleted by any editor as part of the normal process of editing and updating articles. Wikipedia's deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in the encyclopedia can propose its deletion. Such a page can be deleted by any Wikipedia administrators, administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for outright deletion of articles that are so clearly in violation of rules of the website that they do not need to undergo a deletion of articles on Wikipedia#Articles for deletion, full deletion discussion. All deletion decisions may be deletion of articles on Wikipedia#Deletion review and undeletion, reviewed, either informally or formally. An additional means of hiding specific content within Wikipedia articles is revision deletion, or RevDel, by which an administrator can perform redaction, sanitization/redaction of specific revisions of an article, thereby hiding certain information from the view of non-administrators.
* Yahoo: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."
Circumvention
Internet censorship circumvention is one of the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.[
Different techniques and resources are used to bypass Internet censorship, including Proxy server, proxy websites, ]virtual private network
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
s, sneakernets, the dark web and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for an increased level of privacy. The majority of circumvention techniques are not suitable for day to day use.
There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries, individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.
In June 2011, ''The New York Times'' reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."
Another way to circumvent Internet censorship is to physically go to an area where the Internet is not censored. In 2017, a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where the Internet is regularly blocked.
Increased use of HTTPS
The use of HTTPS versus what originally was HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
in web searches created greater accessibility to most sites originally blocked or heavily monitored. Many social media sites including, Facebook, Google, and Twitter have added an automatic redirection to HTTPS as of 2017. With the added adoption of HTTPS use, "censors" are left with limited options of either completely blocking all content or none of it.
The use of HTTPS does not inherently prevent the censorship of an entire domain, as the domain name is left unencrypted in the ClientHello of the TLS handshake. The Encrypted Client Hello TLS extension expands on HTTPS and encrypts the entire ClientHello but this depends on both client and server support.
Common targets
There are several motives or rationales for Internet filtering: politics and power, social norms and morals, and security concerns. Protecting existing economic interests is an additional emergent motive for Internet filtering. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.["Measuring Global Internet Filtering"]
, Robert Faris and Nart Villeneuve, i
''Access Denied: The Practice and Policy of Global Internet Filtering''
, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008
Politics and power
Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.[
Examples include:
* Political blogs and websites
* ''Lèse-majesté'' sites, sites with content that offends the dignity of or challenges the authority of a reigning Sovereignty, sovereign or of a Sovereign state, state
* Falun Gong and Tibetan exile group sites in ]China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
or Buddhist, Cao Dai faith, and indigenous hill tribes sites in Internet censorship in Vietnam, Vietnam
* 50 Cent Party, or "50 Cent Army" that worked to sway negative public opinion on the Chinese Communist Party
* Russian web brigades
* Sites aimed at religious conversion from Islam to Christianity[
* Sites criticizing the government or an authority in the country][
* Sites that comment on political parties that oppose the current government of a country][
* Sites that accuse authorities of corruption][
* Sites that comment on minorities or LGBTQ issues][
* Communist symbols and imagery in Poland, Lithuania, Ukraine, Georgia (country), Georgia, Latvia, Moldova, Hungary, and Indonesia
* ]Neo-Nazi
Neo-Nazism comprises the post–World War II militant, social, and political movements that seek to revive and reinstate Nazism, Nazi ideology. Neo-Nazis employ their ideology to promote hatred and Supremacism#Racial, racial supremacy (ofte ...
and similar websites, particularly in Internet censorship in France, France and Internet censorship in Germany, Germany
Social norms
Social filtering is censorship of topics that are held to be antithetical to accepted societal norms.[ In particular censorship of child pornography and content deemed think of the children, inappropriate for children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries.
Examples include:
* Sites that include ]hate speech
Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
inciting racism, sexism, homophobia, or other forms of bigotry
* Sites seen as promoting Substance abuse, illegal drug use (such as Erowid)
* Eroticism, Sex and erotic, fetishism, prostitution, and pornographic sites
* Child pornography and pedophile-related sites (see also CIRCAMP)
* Gambling sites
* Sites encouraging or inciting violence
* Sites promoting criminal activity[
* Sites that contain blasphemous content, particularly when directed at a majority or state supported religion][
* Sites that contain Defamation, defamatory, slanderous, or libelous content][
* Sites that include political satire][
* Sites that contain information on social issues or "online protests, petitions and campaigns"][
]
Security concerns
Many organizations implement filtering as part of a defense in depth (computing), defense in depth strategy to protect their environments from malware, and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment.
Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.[
Examples include:
* list of North Korean websites banned in South Korea, Blocking of pro–North Korean sites by South Korea
* Blocking of sites of groups that foment domestic conflict in Internet censorship in India, India]
* Blocking of sites of the Muslim Brotherhood in some countries in the Middle East
* Blocking of sites such as 4chan thought to be related to the internet hacker group Anonymous (hacker group), Anonymous
Protection of existing economic interests and copyright
The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.[
Anti-copyright activists Christian Engström, Rick Falkvinge and Oscar Swartz have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.
Examples include:
* File sharing and peer-to-peer (P2P) related websites such as The Pirate Bay
* Skype
* Sites that sell or distribute music, but are not 'approved' by rights holders, such as AllOfMP3
]
Network tools
Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.[
Examples include:
* Media sharing websites (e.g. Flickr and Censorship of YouTube, YouTube)
* Social networking service, Social networks (e.g. Censorship of Facebook, Facebook and Instagram)
* Translation sites and tools
* E-mail providers
* Web hosting sites
* blog, Blog hosting sites such as Blogspot and Medium (website), Medium
* Microblogging sites such as Censorship of Twitter, Twitter and Weibo
* Censorship of Wikipedia, Wikipedia
* Internet censorship circumvention, Censorship circumvention sites
** Anonymizers
** Proxy server, Proxy avoidance sites
* Search engines such as Microsoft Bing, Bing and ]Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
– particularly in Internet censorship in China, Mainland China and Internet censorship in Cuba, Cuba
Information about individuals
The ''right to be forgotten'' is a concept that has been discussed and put into practice in the European Union. In May 2014, the European Court of Justice ruled against Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
in ''Costeja'', a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in ''La Vanguardia'' newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid. He initially attempted to have the article removed by complaining to Spain's data protection agency—''Agencia Española de Protección de Datos''—which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results. Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in ''Costeja'' that search engines are responsible for the content they point to and thus, Google was required to comply with EU data privacy laws. It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.
Index on Censorship claimed that "''Costeja'' ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court's decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."
Resilience
Various contexts influence whether or not an internet user will be resilient to censorship attempts. Users are more resilient to censorship if they are aware that information is being manipulated. This awareness of censorship leads to users finding ways to circumvent it. Awareness of censorship also allows users to factor this manipulation into their belief systems. Knowledge of censorship also offers some citizens incentive to try to discover information that is being concealed. In contrast, those that lack awareness of censorship cannot easily compensate for information manipulation.
Other important factors for censorship resiliency are the demand for the information being concealed, and the ability to pay the costs to circumvent censorship. Entertainment content is more resilient to online censorship than political content, and users with more education, technology access, and wider, more diverse social networks are more resilient to censorship attempts.
Around the world
From 1995 to 2002, the government of South Korea passed the Telecommunications Business Act (TBA), the first internet censorship law in the world.[Peng, H. (1997, January 1). How Countries Are Regulating Internet Content. Retrieved from http://www.isoc.org/INET97/proceedings/B1/B1_3.HTM ] As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle East and North Africa, Middle East/North Africa.
Countries in other regions also practice certain forms of filtering. In the Internet censorship in the United States, United States, state-mandated Internet filtering occurs on some computers in libraries and K–12 schools. Content related to Nazism or Holocaust denial is blocked in Internet censorship in France, France and Internet censorship in Germany, Germany. Child pornography and hate speech
Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
are blocked in many countries throughout the world.[, Jonathan Zittrain and John Palfrey, i]
''Access Denied: The Practice and Policy of Global Internet Filtering''
, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 In fact, many countries throughout the world, including some democracies with long traditions of strong support for freedom of expression
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.
Internet censorship in China is among the most stringent in the world. The government blocks Web sites that discuss the Dalai Lama, the 1989 crackdown on 1989 Tiananmen Square protests and massacre, Tiananmen Square protesters, the banned spiritual practice Falun Gong, as well as many general Internet sites. The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
, Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
, and YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
. According to a study in 2014, censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government.
There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".
International concerns
Generally, national laws affecting content within a country only apply to services that operate within that country and do not affect international services, but this has not been established clearly by international case law. There are concerns that due to the vast differences in freedom of speech between countries, that the ability for one country to affect speech across the global Internet could have chilling effects.
For example, Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
had won a case at the European Court of Justice in September 2019 that ruled that the EU's right to be forgotten only applied to services within the EU, and not globally.
But in a contrary decision in October 2019, the same court ruled that Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
was required to globally comply with a takedown request made in relationship to defamatory material that was posted to Facebook by an Austrian that was libelous of another, which had been determined to be illegal under Austrian laws. The case created a problematic precedent that the Internet may become subject to regulation under the strictest national defamation laws, and would limit free speech that may be acceptable in other countries.
Internet shutdowns
Several governments have resorted to shutting down most or all Internet connections in all or part of the country.
This appears to have been the case on 27 and 28 January 2011 during the 2011 Egyptian revolution, in what has been widely described as an "unprecedented" internet block. About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January. This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."
Full blocks also occurred in Internet in Myanmar#Censorship, Myanmar/Burma in 2007, Free speech in the media during the Libyan civil war (2011), Libya in 2011, Iran in 2019, and Internet censorship in Syria, Syria during the Syrian civil war.
Almost all Internet connections in Sudan
Sudan, officially the Republic of the Sudan, is a country in Northeast Africa. It borders the Central African Republic to the southwest, Chad to the west, Libya to the northwest, Egypt to the north, the Red Sea to the east, Eritrea and Ethiopi ...
were disconnected from 3 June to 9 July 2019, in response to a political opposition sit-in seeking civilian rule. A near-complete shutdown in Ethiopia lasted for a week after the Amhara Region coup attempt. A week-long shutdown in Mauritania followed disputes over the 2019 Mauritanian presidential election. Other country-wide shutdowns in 2019 include Zimbabwe after a gasoline price protests triggered police violence, Gabon during the 2019 Gabonese coup attempt, and during or after elections in Democratic Republic of the Congo, Benin, Malawi, and Kazakhstan.
Local shutdowns are frequently ordered in India during times of unrest and security concerns. Some countries have used localized Internet shutdowns to combat cheating during exams, including Iraq, Ethiopia, India, Algeria, and Uzbekistan.
The Iranian government imposed a 2019 Internet blackout in Iran, total internet shutdown from 16 to 23 November 2019, in response to 2019–2020 Iranian protests, the fuel protests. Doug Madory, the director of Internet analysis at Oracle Corporation, Oracle, has described the operation as "unusual in its scale" and way more advanced. Beginning Saturday afternoon on 16 November 2019, the government of Iran ordered the disconnection of much of the country's internet connectivity as a response to widespread protests against the government's decision to raise gas prices. While Iran is no stranger to government-directed interference in its citizens’ access to the internet, this outage is notable in how it differs from past events. Unlike previous efforts at censorship and bandwidth throttling, the internet of Iran is presently experiencing a multi-day wholesale disconnection for much of its population – arguably the largest such event ever for Iran.
Reports, ratings, and trends
Detailed country by country information on Internet censorship is provided by the OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
, Reporters Without Borders, Freedom House, V-Dem Institute, Access Now and in the US State Department Bureau of Democracy, Human Rights, and Labor's ''Human Rights Reports''. The ratings produced by several of these organizations are summarized in the Internet censorship and surveillance by country and the Censorship by country articles.
OpenNet Initiative reports
Through 2010, the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.[ The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Internet in Egypt#Censorship, Egypt, Internet censorship in France, France, Internet censorship in Germany, Germany, Internet censorship in India, India, Human rights in Ukraine#Media freedom and freedom of information, Ukraine, Internet censorship in the United Kingdom, United Kingdom, and Internet censorship in the United States, United States), while one was found to engage in pervasive filtering in all three areas (]China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Internet censorship in Pakistan, Pakistan), five increased their level of filtering (Internet in Azerbaijan#Filtering, surveillance, and harassment, Azerbaijan, censorship in Belarus, Belarus, Internet censorship in Kazakhstan, Kazakhstan, Internet censorship in South Korea, South Korea, and Internet censorship in Uzbekistan, Uzbekistan), and four maintained the same level of filtering (Internet censorship in the People's Republic of China, China, Internet censorship in Iran, Iran, Internet in Myanmar#Censorship, Myanmar, and Human rights in Tajikistan, Tajikistan).[Due to legal concerns the ]OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship.
Freedom on the Net reports
The ''Freedom on the Net'' reports from Freedom House provide analytical reports and numerical ratings regarding the state of Internet freedom for countries worldwide. The countries surveyed represent a sample with a broad range of geographical diversity and levels of economic development, as well as varying levels of political and media freedom. The surveys ask a set of questions designed to measure each country's level of Internet and digital media freedom, as well as the access and openness of other digital means of transmitting information, particularly mobile phones and text messaging services. Results are presented for three areas: Obstacles to Access, Limits on Content, and Violations of User Rights.
The results from the three areas are combined into a total score for a country (from 0 for best to 100 for worst) and countries are rated as "Free" (0 to 30), "Partly Free" (31 to 60), or "Not Free" (61 to 100) based on the totals.
Starting in 2009 Freedom House has produced nine editions of the report.[''Freedom on the Net 2009'']
, Freedom House, accessed 16 April 2012[''Freedom on the Net 2011'']
, Freedom House, accessed 15 April 2012[''Freedom on the Net 2012'']
, Freedom House, accessed 24 September 2012[''Freedom on the Net 2013'']
, Freedom House, 3 October 2013. Retrieved 12 October 2013.[
There was no report in 2010. The reports generally cover the period from June through May.
:
The 2014 report assessed 65 countries and reported that 36 countries experienced a negative trajectory in Internet freedom since the previous year, with the most significant declines in ]Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
, Censorship in Turkey#Internet censorship, Turkey and Internet in Ukraine#Internet censorship and surveillance, Ukraine. According to the report, few countries demonstrated any gains in Internet freedom, and the improvements that were recorded reflected less vigorous application of existing controls rather than new steps taken by governments to actively increase Internet freedom. The year's largest improvement was recorded in Internet censorship in India, India, where restrictions to content and access were relaxed from what had been imposed in 2013 to stifle rioting in the northeastern states. Notable improvement was also recorded in Censorship in Brazil#Internet freedom, Brazil, where lawmakers approved the bill Marco Civil da Internet, which contains significant provisions governing net neutrality and safeguarding privacy protection.[
]
Reporters Without Borders (RSF)
=RWB "Internet enemies" and "countries under surveillance" lists
=
In 2006, Reporters without Borders (''Reporters sans frontières'', RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet".[List of the 13 Internet enemies](_blank)
Reporters Without Borders (Paris), 11 July 2006, . The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users."["Internet enemies"](_blank)
Reporters Without Borders (Paris), 12 March 2009, . In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added.
Reporters Without Borders (Paris), 18 March 2010, .
Enemies of the Internet:[''Internet Enemies'']
, Reporters Without Borders (Paris), 12 March 2012["Internet Enemies"]
''Enemies of the Internet 2014: Entities at the heart of censorship and surveillance'', Reporters Without Borders (Paris), 11 March 2014. . Retrieved 24 June 2014.
* : 2012–2014
* : 2006–2008, 2012–2014
* : 2009–2014
* : 2008–2014
* : 2006–2014
* : 2006–2010
* : 2014
* : 2014
* : 2006–2014
* : 2006–2013
* : 2006–2014
* : 2014
* : 2014
* : 2006–2014
* : 2014
* : 2006–2014
* : 2006–2010
* : 2006–2014
* : 2014
* : 2014
* : 2014
* : 2006–2014
* : 2006–2014
Current Countries Under Surveillance:[
* : 2009–present
* : 2009–present
* : 2011–present
* : 2008–2009, 2011–present
* : 2011–present
* : 2008–present
* : 2008–2009, 2011–present
* : 2009–present
* : 2008–2009, 2011–present
* : 2008–present
* : 2011–present
* : 2010–present
* : 2020–present (only the metadata on traffic that crosses Norwegian borders)
Past Countries Under Surveillance:
* : 2008–2009 and 2011
* : 2009–2011
* : 2008–13
* : 2008
* : 2008 and 2011
* : 2010–2013
* : 2008
* : 2008–2013
* : 2011
* : 2008–2009
When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. The list was not updated in 2013. In 2014 the list grew to 19 with an increased emphasis on Internet surveillance, surveillance in addition to censorship. The list has not been updated since 2014.
When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 11. The number grew to 12 with the addition of Norway in 2020. The list was last updated in 2020.
]
=RWB ''Special report on Internet Surveillance''
=
On 12 March 2013, Reporters Without Borders published a ''Special report on Internet Surveillance''.[''The Enemies of the Internet Special Edition : Surveillance'']
, Reporters Without Borders, 12 March 2013 The report includes two new lists:
* a list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights; and
* a list of "Corporate Enemies of the Internet", companies that sell products that are liable to be used by governments to violate human rights and freedom of information.
The five "State Enemies of the Internet" named in March 2013 are: Bahrain
Bahrain, officially the Kingdom of Bahrain, is an island country in West Asia. Situated on the Persian Gulf, it comprises a small archipelago of 50 natural islands and an additional 33 artificial islands, centered on Bahrain Island, which mak ...
, China, Iran, Syria, and Vietnam.[
The five "Corporate Enemies of the Internet" named in March 2013 are: Amesys (France), ]Blue Coat Systems
__FORCETOC__
Blue Coat Systems, Inc., was a company that provided hardware, software, and services designed for cybersecurity and network management. In 2016 it was acquired by and folded into Symantec and in 2019 as part of Symantec’s Enterpri ...
(U.S.), Gamma Group (UK and Germany), HackingTeam (Italy), and Trovicor (Germany).[
]
V-Dem Digital Societies Project
The V-Dem Digital Societies Project measures a range of questions related to internet censorship, misinformation online, and internet shutdowns. This annual report includes 35 indicators assessing five areas: disinformation, digital media freedom, state regulation of digital media, polarization of online media, and online social cleavages. The data set uses V-Dem's methodology of aggregating surveys of experts from around the world. It has been updated each year starting in 2019, with data covering from 2000 to 2021. These ratings are more similar to other expert analyses like Freedom House than remotely sensed data from Access Now.
Access Now #KeepItOn
Access Now maintains an annual list of internet shutdowns, throttling, and blockages as part of the #KeepItOn project. These data track several features of shutdowns including their location, their duration, the particular services impacted, the government's justification for the shutdown, and actual reasons for the shutdown as reported by independent media. Unlike Freedom House or V-Dem, Access Now detects shutdowns using remote sensing and then confirms these instances with reports from civil society, government, in-country volunteers, or ISPs. These methods have been found to be less prone to false positives.
BBC World Service global public opinion poll
A poll of 27,973 adults in 26 countries, including 14,306 Internet users, was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that:
:Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most don't want governments to regulate it.["BBC Internet Poll: Detailed Findings"]
, BBC World Service, 8 March 2010
Findings from the poll include:[
* Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
* Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
* Opinion was evenly split between Internet users who felt that "the internet is a safe place to express my opinions" (48%) and those who disagreed (49%). Users in Internet censorship in Germany, Germany and Internet censorship in France, France agreed the least, followed by users in a highly filtered country such as ]China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, while users in Internet censorship in Egypt, Egypt, Internet censorship in India, India and telecommunications in Kenya, Kenya agreed more strongly.[
* The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to internet privacy, privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%).
* Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion). And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Human rights in Japan#Civil liberties, Japan, 11% in the Internet censorship in the United States, U.S., 11% in Internet in Kenya, Kenya, 11% in Internet censorship in Pakistan, Pakistan, and 10% in Internet censorship in Canada, Canada strongly disagree).][
]
Internet Society's Global Internet User Survey
In July and August 2012, the Internet Society conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.
Transparency of filtering or blocking activities
Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information.[ For example:
* censorship in Saudi Arabia#Censorship on various platforms, Saudi Arabia and the telecommunications in the United Arab Emirates#Internet censorship, United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly pornographic or considered un-Islamic.
* In contrast, countries such as ]China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
and Internet censorship in Tunisia, Tunisia send users a false error indication. China blocks requests by users for a banned website at the Transport layer, router level and a connection error is returned, effectively preventing the user's IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
from making further HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
* In Internet censorship in Uzbekistan, Uzbekistan, users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.
Arab Spring
During the Arab Spring
The Arab Spring () was a series of Nonviolent resistance, anti-government protests, Rebellion, uprisings, and Insurgency, armed rebellions that spread across much of the Arab world in the early 2010s. It began Tunisian revolution, in Tunisia ...
of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, "we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world".
This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt and Free speech in the media during the Libyan civil war (2011), Libya in 2011. In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient News, Orient TV, and Dubai-based Al Arabiya TV.
In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Internet censorship in Tunisia, Tunisia and Internet in Egypt#Censorship, Egypt from its "Internet enemies" list to its list of countries "under surveillance" and in 2012 dropped Free speech in the media during the Libyan civil war, Libya from the list entirely.[ At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring. However, in 2013, Libyan communication company Libya Telecom & Technology, LTT blocked the pornographic websites. It even blocked the family-filtered videos of ordinary websites like ]Dailymotion
Dailymotion is a French online video platform, online video sharing platform owned by Canal+ S.A., Canal+. Prior to 2024, the company was owned by Vivendi. North American launch partners included Vice Media, Bloomberg L.P., Bloomberg, and Hears ...
.
Russian invasion of Ukraine
During the Russian invasion of Ukraine in 2022, Russia was reported to have blocked the internet websites Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
and Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
. Facebook was noted as being suspended due to an objection to its policy of reviewing news stories for authenticity where they were produced by Russian state-backed media before allowing them to be published on its platform. It was subject to a total ban whereas Twitter was suspended regionally. Reports have identified that VPN use has enabled people to circumvent the restrictions by installing software.
It been reported that the European Union would seek to censor Russian media outlets regarded as producing propaganda.
See also
Organizations and projects
* Anonymous (hacker group), Anonymous – an online hacktivist collective that express its opposition to Internet censorship through protests and online hacking in several countries.
* CIRCAMP (Cospol Internet Related Child Abusive Material Project) – a project of the European Chiefs of Police Task Force to combat commercial and organized distribution of child pornography
* The Clean IT project – a European Union-funded project with the stated aim of suppressing terrorist activity
* Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
– an international non-profit digital rights advocacy and legal organization
* Financial Coalition Against Child Pornography – a coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that fund these operations
* Freedom House – a U.S.-based non-profit that produces the ''Freedom on the Net'' reports, among others.
* Global Internet Freedom Consortium (GIFC) – a consortium of organizations that develop and deploy anti-censorship technologies
* Global Internet Freedom Task Force (GIFT) – an initiative within the U.S. Department of State
* IFEX (organization), IFEX – a global network of non-governmental organizations that promotes and defends the right to freedom of expression
** Tunisia Monitoring Group – a coalition within IFEX that monitors free expression in Tunisia
* Internet Governance Forum (IGF) – a United Nations multi-stakeholder policy dialogue initiative
* Internet Watch Foundation – a government-supported charity that manages the blacklist used by UK ISPs to block access to websites hosting child abuse content
* Lumen (website), Lumen (formerly Chilling Effects) – a joint project of the Electronic Frontier Foundation and several U.S. university law schools and clinics
* NetBlocks - a global watchdog organization that monitors cybersecurity and the Internet governance, governance of the Internet
* OONI - a free software, global observation network created to detect censorship, surveillance and traffic manipulation on the internet
* Open Technology Fund (OTF) – a U.S. Government funded program created in 2012 at Radio Free Asia to support global Internet freedom technologies
* OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
– a joint project to monitor and report on Internet filtering and surveillance practices by nations
* Peacefire – a U.S.-based website dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18"
* Pirate Parties International – a political movement that aims to reform laws regarding copyright and patents, strengthen the right to privacy, and increase the Transparency (behavior), transparency of state administration
* ''Reporters sans frontières'' (Reporters Without Borders) – a France-based international non-governmental organization that advocates freedom of the press
Topics
*
* Block (Internet) – a technical measure intended to restrict access to information or resources
* Cleanfeed (content blocking system), Cleanfeed – a content blocking system in use in the UK and Canada
* Computer and network surveillance
*
**
* Criticism of copyright
* Cyber-dissident
* The Digital Imprimatur – a 2003 article about Internet censorship and digital rights management by John Walker (programmer), John Walker, co-founder of the computer-aided design software company Autodesk
*
*
**
* Internet censorship circumvention
* Internet filter
* Internet police
* Internet activism
* National Information Network of Iran
** 2019 Internet blackout in Iran
* Internet safety
* Laws and proposed laws:
** List of copyright acts by country
** Anti-Counterfeiting Trade Agreement (ACTA) – multinational treaty
** Communications Decency Act – a US law ruled unconstitutional
*** Black World Wide Web protest
** Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA) – a US law
** Copyright law of the European Union
** Copyright (New Technologies) Amendment Act 2008 – New Zealand
*** New Zealand Internet Blackout
** HADOPI law – a French law
** DDL intercettazioni#Paragraph 29, Paragraph 29 of DDL intercettazioni – a proposed Italian law
*** Italian Wikipedia#2011 mass blanking protest, 2011 mass blanking protest – Italian Wikipedia
** SOPA and PIPA, proposed US laws:
*** PROTECT IP Act, PROTECT Intellectual Property Act (PIPA) – a proposed US law
*** Stop Online Piracy Act (SOPA) – a proposed US law
*** Protests against SOPA and PIPA
** Russian Internet Restriction Bill (Federal law of Russian Federation no. 139-FZ of 2012-07-28) – a Russian law
** Trans-Pacific Partnership (TPP) – a proposed multilateral Free Trade Agreement that includes controversial intellectual property provisions
* List of content-control software
*
*
*
*
*
*
*
*
*
*
Sources
*
''This article incorporates creativecommons:by/3.0/us/, licensed material from the OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
web site.[ creativecommons:by/3.0/deed.en, Creative Commons Attribution 3.0 Unported license, see the lower right corner of pages at th]
OpenNet Initiative web site
''
References
Further reading
* King Gary, Pan, Jennifer, & Robert, Margaret. (2013). "doi:10.1017/S0003055413000014, How Censorship in China Allows Government Criticism but Silences Collective Expression." American Political Science Review, 107(2), 326–343.
External links
Censorship Wikia
an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship.
"Index on Censorship"
website of Index on Censorship, a London-based organization and magazine that promotes freedom of expression.
Internet censorship wiki
() provided information about different methods of access filtering and ways to bypass them.
We Fight Censorship project of Reporters Without Borders.
"Media Freedom Internet Cookbook"
by the OSCE Representative on Freedom of the Media, Vienna, 2004.
''How to Bypass Internet Censorship''
also known by the titles: ''Bypassing Internet Censorship'' or ''Circumvention Tools'', a FLOSS Manual, 10 March 2011, 240 pp.
* : A Survey of Worldwide Censorship Techniques
{{Authority control
Internet censorship,
Korean inventions
Privacy