Digital Security and Privacy for Human Rights Defenders

2.5 Internet Surveillance

Abstract
  1. Monitoring your Internet and email activity is a simple task that is practised by businesses and governments all round the world.
  2. Cookies record your Internet activity and are stored on your computer and the websites visited.
  3. Email can be filtered by searching for specific words and phrases in your message.
  4. Internet searches and requested webpages can be filtered by disallowing use of specific key words.
  5. Access to certain websites can be blocked for all users from a particular country.
  6. Access is usually blocked by the website’s IP address or DNS name.

Surveillance and intelligence gathering have moved on – from monitoring phone calls and opening people's mail – to the Internet. Because of the Internet's open infrastructure for seeking and passing content, today's surveillance can be carried out by governments, businesses, hackers and criminals. It is relatively simple to establish mechanisms that will record and monitor all of your Internet activity. All websites log information about their visitors (IP address and time of visit) as do the majority of email providers. Internet Service Providers keep logs of all activity that passed through their servers. Such 'record keeping' has even become mandatory in many countries. In 2006, the EU passed legislation requiring the ISPs to store traffic data of all their subscribers for a period of 2 years,36 although member states can choose to store it for longer periods. Let's have a look at how your Internet activity can be monitored.

Monitoring Internet browsing

monitoring ISP

The ISP can monitor your Internet connection

In essence, the Internet is just a bigger version of your office network. It's made up of computers, connected by cables, and assisted by servers, routers and modems. Even though your message on the Internet may cross an ocean via an underground cable, bounce off two different satellites and be delivered to someone's mobile phone on a moving train – the system resembles an updated version of the telephone exchange. And when you are an operator, or a wire tapper, or a jealous boyfriend – all you need to do is create an additional receiver on the communicating line and you will hear the entire conversation that goes on. The same with the Internet. Anyone with appropriate access to the network can intercept and read your message on its way around the world.

Whilst intercepting a phone or an Internet line may require specific skills and clandestine actions, influencing the ISP is a lot simpler. Many countries have only one ISP and it is usually under government control. Countries like Russia, have introduced laws that require all ISPs to install a computer specifically to monitor Internet activity of its customers. This information is then fed direct- ly to the Federal Security Service (FSB) databases37.

Countries connect their citizens to the Internet through a national gateway. All Internet traffic will therefore pass through the national gateway, and is liable to surveillance38. China has installed a system to monitor and restrict Internet traffic on its national gateway. The 'Golden Shield' project filters and regulates Internet access for the entire population of China39.

monitoring national gateway

Internet monitoring at the ISP and the national gateway

In the late Eighties, the US, UK, Canada, Australia and New Zealand began to develop a global surveillance system that would encapsulate all major traffic points on the Internet. The events of September 11 in the United States led to huge investments to improve the system known as ECHELON which oper- ates under the supervision of the National Security Agency (NSA). It is not known for how long ECHELON keeps the traffic data. It may seem that on a global level it is difficult to efficiently analyse and categorise all Internet and telephone communication in real-time, but the NSA claims a 90% success in doing that.40

Monitoring Website Activities

Records of our Internet activity are further stored on websites we visit and on our personal computers. Many websites require the installation of a cookie on our computer. A cookie is a small amount of data that stores specific user information. For instance, it could record our country of residence, so that we are presented with a relevant country page when visiting a particular website. This is often practised by airline websites, for example. Other information could include the links we have followed to arrive at this or that website, or even personal data from our own computers. After browsing the Internet for a month or so, you may have hundreds of different cookies on your computer. Accessing them can reveal information about your interests and affiliations. A cookie on your computer can act as proof of your visiting a particular website. The largest Internet advertising service, DoubleClick, has agreements with thousands of websites and maintains cookies on over 100 million users, each linking to hundreds of details of the user's browsing habits.41

It is possible to delete cookies from your computer. This can be done from your Internet browser or by finding and deleting them manually. It is also pos- sible to tell your browser not to accept cookies at all. This may result in many websites refusing to open on your computer, but will provide you with maximum protection from cookie infiltration. Use the Ccleaner tool in the Security-in-a-Box project to delete cookies from your computer42.

Monitoring Email

Email communication works on similar principles as website browsing, except that each message has an individual (or a group of people) as its destination, also connecting to the Internet through their ISP.
monitoring email

Monitoring email at the ISP and national gateway

Hence, an email message will pass through your ISP, the national gateway of your country, around the Internet proper, and then arrive at the national gateway of the receiver, followed by their ISP, before finally being read. Following this schematic, our email message can be intercepted at all major routing points on its way. If you live in a country with strong legal protection of privacy, its legislation won't apply when your email reaches the ISP of the recipient in a country with different privacy and surveillance laws. Bear in mind that whilst your email is on its way from country A to country B, it could pass the routers of several other countries (and companies) on its way.

Many ISPs and email providers keep a copy of all emails on their servers. Sometimes this is to our benefit, as we may want to access an email that was sent to us 3 years ago. However, it also allows an outside party to request/demand access to our email accounts. Yahoo! has previously handed over to the Chinese government account information of four Chinese democ- racy activists and scholars resulting in their arrest and conviction.43

Website Filtering & Censorship

Apart from monitoring Internet traffic, government and telecommunications companies have the ability to prevent access to certain websites or control the output of results from a search engine query. Filtering access to information on the Internet is in essence a form of censorship and in breach of Articles 18, 19 & 20 in the Universal Declaration of Human Rights (UDHR44) that declare that every person should have the right to freedom of thought, religion, opinion, expression and association, as well as to "..seek, receive and impart information and ideas through any media and regardless of frontiers.''

Internet Censorship

Numerous countries ban access to certain websites for their citizens. Often these websites carry information on extreme religious viewpoints and propaganda, support and help spread terrorist sentiment, or exist to display and distribute pornographic images of children. Some countries choose to block access to websites that criticise or expose government policy, discuss issues of human rights or provide tools that could enable one to bypass their censorship technology. The OpenNet initiative studies trends and technology of Internet censorship and content filtering around the world45.

arabic blocked website

A screenshot of a blocked website from inside Saudi Arabia

Websites can be blocked from access using one of three common methods: IP address blocking, tampering with copies of the domain name system, and blocking of URLs. In simple terms this means that a website can be blocked according to its Internet address, name, or the system that translates their name into an Internet address.

In some countries, website censorship exists primarily at the behest of the computer user – for example a parent blocking access to some categories of website on a child's computer – or the network manager. This is implemented through the installation of content filtering software on an individual PC or network gateway.

The majority of countries that censor websites because of content have designated the responsibility to ISPs to install and run censorship software (filters). Others, however, have chosen to place filters at the national gateway level. All traffic must pass through these national filters before it reaches the Internet proper. China and Pakistan are examples of countries to implement filtering software, with various aims and consequences, at both levels of the national internet infrastructure,46 whilst Australia and Iran legislate the onus on censoring websites to the ISPs.

Blacklists & DNS Tampering

Note: a basic understanding of how the Internet functions is required before reading the following sections. Please refer to 'Appendix B – Internet explained' Although they vary in costs and point of installation, all website censorship systems operate on a similar principle. Requests made by the user for a par- ticular website are checked against a list of banned URLs. If the match is pos- itive, the request is denied. Similarly, blacklists may contain IP addresses of servers and deny requests to that address.

blocking by IP

Blocking an IP from access

This method will block a website's IP number from being accessible. A problem arises however, when blocking websites by IP. Sometimes these websites sit on large web servers that host several thousands of different websites. These web servers only have one IP. Blocking a website's IP address effectively blocks all other websites sitting on the same webserver.47

blocking by DNS

Blocking the BBC website by its URL

In the example above, the filtering exists to block all requests made to www.bbc.co.uk. Should the website be re-registered or mirrored under a different domain name, it may become accessible again.

These rules can be applied separately or together to create filtering and blocking capacity. Some countries rely on the pre-defined categories of the filtering software and add new websites to its configuration, whilst others employ huge teams of people to scan the Internet and catalogue what should appear in the filter.

DNS hijacking

This method refers to directing a user's request to an alternate website. When you enter an address of a website you wish to visit, you are automatically redirected to another website. Some users may not even notice the difference.
hijacking

This censorship technique may be circumvented, however, by users specifying one of the root servers as their DNS point of reference, rather than to the local copies stored by their ISPs48
china

A screenshot of the Chinese Internet hijacking the www.google.com DNS

On September 8th 2002, users in China were prevented from going to Google's web search page. Instead, they were re-directed to a number of China-based pages. The address in the URL said www.google.com49

Keyword Filtering

A relatively new method of censorship but one that is gaining strength and widespread implementation is keyword filtering. This involves the banning of certain words or phrases, either in a URL or a page's content. The system allows for broader ability to censor websites and Internet communication by content, as well as enabling the blocking of a particular page within a website and not the entire site itself. However, keyword filtering can be crude, and is likely to prevent access to innocuous as well as intended target sites.

A keyword filter might be set to ban the request for any URL containing the phrase 'human rights' or 'freedom of expression'. In reality, it could be programmed to search for thousands of specific words and phrases. Whenever an email or an instant message containing the listed keyword is found, it is either blocked and not allowed to pass further on, or recorded for further investigation of the sender's and recipient's identity. Filtering can occur at any point of the message's routing on the Internet.

The same methodology is applied to search engines and instant messaging tools like Yahoo chat and Skype. When you enter a search query into Google, it is passed through the ISP and a country gateway, before you get a reply. A filtering system could intercept your search for 'human rights' and return a null or wrong result. Below are images of a search result from 2004 on 'falundafa' (a banned spiritual movement in China) performed on Google.com from China.

 

36
Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006

37
Privacy International – Privacy and Human Rights Report 2004 – The Threats to Privacy

38
In some countries satellite connec- tions provide an alternative to using local ISPs. This makes surveillance a lot more difficult to implement.

39
http://www.guardian.co.uk/commentisfree/2008/aug/13/china.censorship

40
Echelon Watch http://www.nsawatch.org

41
Privacy International – Privacy and Human Rights Report 2004 – The Threats to Privacy

42
http://security.ngoinabox.org/ccleaner_main

43
Human Rights Watch - "Race to the Bottom" Corporate Complicity in Chinese Internet Censorship, August 2006

44
Office of the United Nations High Commissioner for Human Rights http://www.ohchr.org

45
http://opennet.net/research

46
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain, eds., Access Denied: The Practice and Policy of Global Internet Filtering, (Cambridge: MIT Press) 2008

47
“..more than 87% of active domain names share their IP addresses with one or more additional domains, while more than two thirds of domain names share their IPs with fifty or more domains..” /Ben Edelman, Web Sites Sharing IP Addresses: Prevalence and Significance, February 2003 http://cyber.law.harvard.edu/people/edelman/ip-sharing/

48
http://www.root-servers.org/

49
Empirical Analysis of Internet Filtering in China, Berkman Center for Internet & Society, Jonathan Zittrain and Benjamin Edelman, 2002

50
This method of blocking has recent- ly changed. Now, Google will dis- play its own message stating that the search query you entered is not allowed by the local authorities.