recommended reading

Internet repression on the rise since Arab Spring

There's been a ramp up in Internet blocking and what appears to be government-sponsored denial-of-service attacks across several repressive, non-Arab regimes since the Arab Spring uprisings, a State Department official told lawmakers Friday.

It's not clear, though, whether those countries are cracking down in response to uprisings in the Middle East and North Africa or if they're simply responding to local issues, Deputy Assistant Secretary of State for Democracy, Human Rights and Labor Daniel Baer told congressional members of the Helsinki Commission, an independent government agency that helps guide the United States' role in the Organization for Security and Cooperation in Europe.

Baer repeatedly demurred when Helsinki Commission Chairman Rep. Christopher Smith, R-N.J., pressed him to say which nations are the worst violators of online free expression, either in the OSCE region or globally.

He did point to Smith's opening statement, which criticized the imprisonment of bloggers in Russia; the blocking of Facebook, Twitter and other social networking sites in Belarus, and a Turkish government request to Internet service providers to filter out websites that contain a list of words it considers offensive.

Most regimes that limit citizens' Internet access today do so through either second- or third-generation censorship tools, said RafalRohozinski, a senior scholar at the Canada Center for Global Security Studies.

The first generation of Internet censorship consisted of powerful blocking tools that simply filtered out an ever growing list of Web pages, Rohozinski said. The classic example, he said, is the so-called Great Firewall of China, which blocks access to thousands of pages about Tibetan nationalism, the Falun Gong religious movement and other dissident groups.

"The second generation is more active measures," he said. For example, a government will orchestrate distributed denial-of-service attacks that involve flooding a website with more operations than it can handle so other people can't access it.

Second-generation censorship is often aimed at temporarily shutting down a site, such as during the most recent Russian presidential election, he said, rather than permanently disabling it.

It also can involve hacking into a site and "patching it" by changing some words or images to alter the site's message, rather than shutting it down entirely-- a common tactic in Kazakhstan -- he said.

"Third generation is a step further," Rohozinski said. "It includes the use of malware, virus-based attacks on human rights groups, opposition groups."

Such attacks often combine malicious software with paid human plants on social networking sites or messaging sites whosow discord within an opposition group, he said.

In other cases, regimes have simply criminalized some online activities with fines and imprisonment, he said.

First-generation censorship often can be overcome with circumvention technologies that get around government Web probes, Rohozinski said.

"Second- and third-generation attacks are very different," he said. "The solution isn't purely in the technical realm."

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.