Internet censorship is the control program which is deployed by the regulators for accessing, publishing, and viewing of initiatives taken by them on the internet. “The individual can develop the self-censorship program for organizing their moral, religious, and legal believes associated with the activities performed by them” (Wang, 2017). The internet censorship program usually occurred during the time of election, protest, and other anticipation program. There are different tools and technologies which are used for deploying censorship on the internet which can be classified as DNS server, proxy server, website mirrors, cached web pages, and others. The sensitive information can be safely interchanged on the internet by making use of internet censorship technology. It is used for managing copyrights of the organization. The structured framework of policies is prepared for deploying the website under the legal laws. The internet censorship is capable of limiting the criminal activities and helps in increasing national security. In this paper, we are looking forward for analysing the positive and negative impact on the society. The government and organizations are used for securing their confidential information from accessing.
Internet censorship is the method which is used for putting restriction on the information which is viewed and published on the internet. The internet censorship is commonly used by government and big organization to restrict the copyright of the information and to prevent confidential information of the business. It is the propaganda method for promoting religions and political agendas.” Traditionally, the traffic management on the internet was done by the internet community but with the passage of time and evolution of internet censorship than the traffic management goes in the hand of the government and organization” (Erixon, 2009). They can manage the flow of data and put restriction according to their requirement and confidentiality. It helps in putting restriction on the interference and freedom of speech. The internet censorship is capable of limiting the criminal activities and helps in increasing national security. The self-monitoring system helps in resolving many issues of the government such as limiting the growth of criminal activity, provides the cultural diversity in the internet user, deployment of political doctrines, and others. Internet censorship is responsible for managing the accessing of information related to copyright and intellectual property of the organization, non-disclosure of sensitive and private information, generating new political ideas for promoting religion and political agenda, controlling the internet related crime, monitoring the discussion between billions of people over the network, and others. The internet censorship is useful for analysing the big data of the organization. It helps in reducing the occurrence of fraud and theft of identity. Filter bubbles are used for managing the views and opinions between different units. The online censorship is responsible for maintaining the email privacy. With the increasing complexity of the internet and associated technologies, it is required to deploy the fundamentals of internet censorship. The new technologies can be securely deployed on the internet by using the technique of internet censorship for putting restriction to the confidential information. This helps in the non-disclosure of confidential information and maintains the privacy of the information. Various types of filtering methods are used for managing decentralised communication between different units. The censor intelligence technique is used for deploying traffic analysis and snowball sampling. The strategies should be developed for implementing wiretapping system, intrusion detection and prevention methods, and firewall. The internet censorship helps in strengthening the national security program. It is capable of predicting and punishing the hackers and the violators. There are number of software used in relation with internet censorship such as CGI proxies, HTTP proxies, Application proxies, re-routing system, and others. The CGI proxies are used for performing the proxy function on the script running deployed on web server. The HTTP proxies are used for sending requests to the intermediate proxy server. Application proxies are associated with different applications. The re-routing system is used for sending request and response to the encrypted data for managing proxy on various proxy server. Peer-to peer relationship should be developed between client and server for managing trust between them.
There are two types of internet censorship program one is the technical censorship and other is the non-technical censorship which are explained below in the table:
Type |
Particulars |
Explanation |
Technical Censorship |
Address blocking through internet protocol |
The restriction put on IP address from accessing. The shared hosting server will block all the website running on it. |
Re-direction and filtering of domain name system |
The DNS resolver is used for protecting the hijacking of DNS by blocking the domain names. HTTP, FTP, and POP protocols are generally used for this purpose. It helps in putting restriction to the modification done in the host file |
|
Filtering of uniform resource locator |
The URL is responsible for scanning of target keywords specified in the domain name of the address. The encrypted protocols such as virtual private network and secure socket layer is used for resolving these issues |
|
Methodologies used for packet filtering |
The controversial keywords which are associated with the transmission of TCP packet should be identified and terminated. HTTP, FTP, and POP protocols are generally used for this purpose. The encrypted protocols such as virtual private network and secure socket layer are used for escaping of HTML contents. The amount of text in the packet can be reduced by using the method of TCP/IP stacks |
|
Resetting of connection |
“The filter is used for blocking the TCP connection. HTTP, FTP, and POP protocols are generally used for this purpose” (Walske, 2015). The circumvention method is used for ignoring the resetting of the packet which are transmitted by the firewall. |
|
Disconnection of network |
The internet censorship is used for cutting down the path from the routers. The termination is terminated by pulling out of cable from hardware and software. |
|
Removal of search result and portal censorship |
The portal and the search engines can be removed from the website to make it invisible to the user. This is called as censorship because it helps in satisfying the legal requirement of the user |
|
Attacks on the computer network |
The blocking of the web services helps in limiting the denial of service attacks. The limiting access of the web pages helps in providing sustainability and longevity to the website. |
|
Over and under blocking of the website |
“These techniques is used for blocking the permissible objects which are provided with less protection mechanism” (Ang, 2015). |
|
It is used for providing sophistication to the content of the website |
||
Non-Technical censorship |
Laws and regulation |
The content from the website should be excluded or removed from the website on the basis of laws and regulation |
Formal and informal request sent to publisher and authors |
The Formal and informal request sent to publisher and authors for removing and altering data available on the website |
|
Punishment |
The authors can be given punishment for wrong deeds |
|
Confiscated |
Destroying of the equipment |
|
Creation of own publication |
The censor should create their own website for guiding the people about online publication restriction |
|
Restricting licensing policies |
Licensing policies should be followed while working on the internet |
There are wide range of comprehensive tools to establish internet censorship to prevent the system from denial of service attacks and other. The following table shows the list of tools used in deploying censorship:
Tools |
Explanation |
TCP/ IP header filtering tool |
The censor router is used for inspecting the IP address and associated port number. |
TCP / IP content filtering tool |
The censor router is used for inspecting the content of the packet by establishing the technique of pattern matching. |
Tampering of domain name server |
The user can easily fetched the details of the domain name server from the IP address of the destination. The tampering process is used for restricting the access of domain name to the user. |
Proxy filtering by using hypertext transfer protocol |
Proxy filtering by using hypertext transfer protocol is more powerful than TCP / IP content filtering tool and Tampering of domain name server because it keeps monitoring of the traffic available on the internet. |
Proxy filtering using Hybrid TCP/IP and HTTP |
It is used for developing the list of IP address and the prohibition of content associated with it. |
Denial of service attacks |
“The host server is affected by the denial of service attacks” (Bitso, 2016). The denial of service attacks arises when large number f computers provide services to only one single computer and the system is inefficient in handling those requests. |
Server take down |
Putting extra load on the server will automatic disconnect the server from the internet. |
Surveillance |
“The logging transfers is used for managing constant technical monitoring between host and internet user” (Chiang, 2014. The legal action can be taken against the user if he is trying to access the banned data from the internet. It could create a sense of fear in violators. |
Social Techniques |
The user should show their photo identification card before using the internet cafes and public computers. |
Cached pages |
The blocking of the cached pages |
Mirror and archive sites |
Removal of the copies of website from the internet |
Web to email services |
The web pages should not be sent as an email services |
RSS aggregators |
Google reader and bloglines are used for blocking the access of the website |
Virtual private networks |
The internet censorship can be created by using the virtual private network which provides secure connection for browsing the internet globally. |
SSH Tunneling |
SSH tunnelling is used for managing encrypted channel over the traffic for managing request and response between blocking sites |
Reverse proxy |
Reverse proxy is used for managing load, encryption and decryption technique, caching, and authentication technique. |
Sneakernets |
“These are used for transferring the electronic information between computer files and data storage unit. It is capable of moving the data on restricted network platforms” (Smith, 2014). |
The internet is the common platform to cover all the activities of day to day life. The censoring techniques are used for removing the ubiquity from the internet. The negative impacts of internet censorship on society are listed below:
Conclusion:
Internet censorship is the method which is used for putting restriction on the information which is viewed and published on the internet. The internet censorship can be created by using the virtual private network which provides secure connection for browsing the internet globally. It has been seen that implementation of internet censorship has limited the occurrence of criminal activities such as terrorist group recruitment, personnel bank account hacking process, phishing attack, theft of identity information, online spamming, and others. The internet censorship is useful for analysing the big data of the organization. It helps in reducing the occurrence of fraud and theft of identity.
References:
Ang, P. (2015). Censorship and internet: A singapore perspective. 1st ed. [ebook] Available at: https://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan004065.pdf [Accessed 01 June. 2017].
Bitso, C. (2016). Trend in transition from classical censorship to internet censorship. 1st ed. [ebook] Available at: https://www.ifla.org/files/assets/faife/publications/spotlights/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf [Accessed 01 June. 2017].
Chandio, M. (2014). Use of internet and its effect on our society. 1st ed. [ebook] Available at: https://www.szabist.edu.pk/Publications/Session%20VIII%20Paper%20No%202%20(P%20157-161).pdf [Accessed 01 June. 2017].
Chiang, M. (2014). A taxonomy of internet censorship and anti-censorship. 1st ed. [ebook] Available at: https://www.princeton.edu/~chiangm/anticensorship.pdf [Accessed 01 June. 2017].
Erixon, F. (2009). Protectionism Online: Internet censorship and international trade law. 1st ed. [ebook] Available at: https://www.ecipe.org/app/uploads/2014/12/protectionism-online-internet-censorship-and-international-trade-law.pdf [Accessed 01 June. 2017].
Khattack, S. (2015). A look at the consequences of internet censorship. 1st ed. [ebook] Available at: https://www.icir.org/vern/papers/censorship-response.imc14.pdf [Accessed 01 June. 2017].
Majette, S. (2017). Internet censorship. [Blog] Computer Forensic. Available at: https://theimpactnews.com/items-we-barely-use/retired-columnists/weird/2012/12/13/internet-censorship/ [Accessed 2 Jun. 2017].
Smith, M. (2017). The impact of information technology security upon society. [Blog] Digital Guardian. Available at: https://eprints.qut.edu.au/6082/1/6082.pdf [Accessed 2 Jun. 2017].
Sorak, N. (2013). Internet censorship and corruption. 1st ed. [ebook] Available at: https://qog.pol.gu.se/digitalAssets/1609/1609805_qogwp_2016_17_sorak.pdf [Accessed 01 June. 2017].
Vivan, M. (2014). Surveillence and internet censorship: The impact of technology on human right. International Conference paper for information and communication, [online] 4(3). Available at: https://www.europarl.europa.eu/RegData/etudes/STUD/2015/549034/EXPO_STU(2015)549034_EN.pdf [Accessed 2 Jun. 2017].
Walske, Z. (2015). Internet censorship: Protecting citizens or trampling freedom. 1st ed. [ebook] Available at: https://books.google.co.in/books/about/Internet_Censorship.html?id=U2QMxWxq46kC&redir_esc=y [Accessed 01 June. 2017].
Wang, S. (2017). Internet censorship: Protecting citizens or trampling freedom. The Sunday Times. [online] Available at: https://www.szabist.edu.pk/Publications/Session%20VIII%20Paper%20No%202%20(P%20157-161).pdf [Accessed 2 Jun. 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download