Workshop Program

All sessions will be held in Regency D unless otherwise noted.

The workshop papers are available for download in a ZIP archive for registered attendees. Individual papers are available to everyone and can be downloaded from each paper's presentation page. Copyright to the individual works is retained by the author[s].

Downloads for Registered Attendees

Attendee Files 
FOCI '15 Paper Archive Updated 8/10/15 (ZIP)
FOCI '15 Paper Archive (ZIP)
FOCI '15 Attendee List

 

Monday, August 10, 2015

8:00 am–9:00 am Monday

Continental Breakfast

9:00 am–10:30 am Monday

Opening Remarks and Panel

Panel

Panelists: Roya Ensafi, Princeton University; Collin Anderson; Nick Feamster, Princeton University; Roger Dingledine, The Tor Project

10:30 am–11:00 am Monday

Break with Refreshments

11:00 am–12:30 pm Monday

Information Controls in China

The Human Side of Censorship: Keyword Filtering and Censorship Directives on the Chinese Internet

Anne Henochowicz, China Digital Times

Internet censorship is accomplished not only through technological means, but also through manual controls enforced by the state on the private sector and individuals. In China, central and local government bodies issue directives to Internet companies concerning information and activity that should be deleted, filtered, or monitored. Companies must comply with these instructions in order to remain viable, while individual users who discuss “sensitive” issues online may find their social media posts are made invisible or removed, and may even have their accounts shut down. Government directives are often vague, encouraging self-censorship and overcompensation to stay safely away from the invisible "red line."

Internet censorship is accomplished not only through technological means, but also through manual controls enforced by the state on the private sector and individuals. In China, central and local government bodies issue directives to Internet companies concerning information and activity that should be deleted, filtered, or monitored. Companies must comply with these instructions in order to remain viable, while individual users who discuss “sensitive” issues online may find their social media posts are made invisible or removed, and may even have their accounts shut down. Government directives are often vague, encouraging self-censorship and overcompensation to stay safely away from the invisible "red line."

China Digital Times monitors Chinese Internet censorship through several ongoing projects. This presentation will highlight our work on two primary projects: (1) Directives from the Ministry of Truth, which tracks censorship and propaganda directives issued by central and local government bodies to Internet companies, including news Web sites and portals; and (2) Sensitive Words, which records keywords filtered from the search results of the popular microblogging platform Sina Weibo. I will also introduce the Grass-Mud Horse Lexicon, a wiki of creative, subversive Chinese Internet language created to skirt censorship and mock propaganda.

Available Media

An Analysis of China’s “Great Cannon”

Bill Marczak, University of California, Berkeley, and Citizen Lab, University of Toronto; Nicholas Weaver, International Computer Science Institute (ICSI) and University of California, Berkeley; Jakub Dalek, Citizen Lab, University of Toronto; Roya Ensafi, Princeton University; David Fifield, University of California, Berkeley; Sarah McKune, Citizen Lab, University of Toronto; Arn Rey; John Scott-Railton and Ron Deibert, Citizen Lab, University of Toronto; Vern Paxson, International Computer Science Institute (ICSI) and University of California, Berkeley

On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the “Great Cannon”, to engineer a denial-of-service attack on GreatFire.org, an organization dedicated to resisting China’s censorship. We present a technical analysis of the attack and what it reveals about the Great Cannon’s working, underscoring that in essence it constitutes a selective nation-state Man-in-the-Middle attack tool. Although sharing some code similarities and network locations with the Great Firewall, the Great Cannon is a distinct tool, designed to compromise foreign visitors to Chinese sites. We identify the Great Cannon’s operational behavior, localize it in the network topology, verify its distinctive side-channel, and attribute the system as likely operated by the Chinese government. We also discuss the substantial policy implications raised by its use, including the potential imposition on any user whose browser might visit (even inadvertently) a Chinese web site.

Available Media

Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China

Jeffrey Knockel, University of New Mexico and Citizen Lab, University of Toronto; Masashi Crete-Nishihata, Jason Q. Ng, and Adam Senft, Citizen Lab, University of Toronto; Jedidiah R. Crandall, University of New Mexico

Social media companies operating in China face a complex array of regulations and are liable for content posted to their platforms. Through reverse engineering we provide a view into how keyword censorship operates on four popular social video platforms in China: YY, 9158, Sina Show, and GuaGua. We also find keyword surveillance capabilities on YY. Our findings show inconsistencies in the implementation of censorship and the keyword lists used to trigger censorship events between the platforms we analyzed. We reveal a range of targeted content including criticism of the government and collective action. These results develop a deeper understanding of Chinese social media via comparative analysis across platforms, and provide evidence that there is no monolithic set of rules that govern how information controls are implemented in China.

Available Media
12:30 pm–2:00 pm Monday

Luncheon for Workshop Attendees


2:00 pm–3:30 pm Monday

Practice and Policy of Network Interference and Security

Online Surveillance and Chilling Effects: Recent Developments

Jon Penney, Oxford Internet Institute, Berkman Centre for Internet & Society, and Citizen Lab

Since the Snowden revelations about NSA/PRISM and other governmental online surveillance operations, understanding the impact and potential harms of such surveillance (and related)—particularly any regulatory chilling effects has taken on an even greater urgency. This talk provides an update on recent developments in both constitutional litigation challenging such surveillance practices, as well as empirical research aimed at understanding their impact, including a new study that examines surveillance-related chilling effects stemming from NSA surveillance.

Since the Snowden revelations about NSA/PRISM and other governmental online surveillance operations, understanding the impact and potential harms of such surveillance (and related)—particularly any regulatory chilling effects has taken on an even greater urgency. This talk provides an update on recent developments in both constitutional litigation challenging such surveillance practices, as well as empirical research aimed at understanding their impact, including a new study that examines surveillance-related chilling effects stemming from NSA surveillance.

Understanding Internet Censorship Policy: The Case of Greece

Vasilis Ververis, Humboldt University Berlin; George Kargiotakis; Arturo Filastò, The Tor Project; Benjamin Fabian, Humboldt University Berlin; Afentoulis Alexandros

The Greek government has recently initiated large scale content blocking that leads to Internet censorship. In this article we analyze the techniques and policies used to block content of gambling websites in Greece and present the implications of the detected underblocking and overblocking. We have collected results probing eight major broadband and cellular Internet Service Providers (ISPs) that are a representative sample of Internet usage in Greece, and investigate the methods and infrastructure used to conduct the content filtering. The results of this study highlight issues related to how transparently Internet filtering is implemented in democratic countries and could indicate the presence of unfair competition between ISPs.

Available Media

Half Baked: The Opportunity to Secure Cookie-based Identifiers from Passive Surveillance

Andrew Hilts, Citizen Lab, University of Toronto and Open Effect; Christopher Parsons, Citizen Lab, University of Toronto

Documents released by Edward Snowden have revealed that the National Security Agency, and its Australian, British, Canadian, and New Zealand equivalents, routinely monitor the Internet for the identifiers that are contained in advertising and tracking cookies. Once collected, the identifiers are stored in government databases and used to develop patterns of life, or the chains of activities that individuals engage in when they use Internet-capable devices. This paper investigates the extent to which contemporary advertising and analytics identifiers that are used in establishing such patterns continue to be transmitted in plaintext following Snowden’s revelations. We look at variations in the secure transmission of cookie-based identifiers across different website categories, and identify practical steps for both website operators and ad tracking companies to take to better secure their audiences and readers from passive surveillance.

Available Media
3:30 pm–4:00 pm Monday

Break with Refreshments

4:00 pm–5:00 pm Monday

Panel

Measuring Online Information Controls: From Theory to Practice

Panelists: Fereidoon Bashar, ASL19; Jed Crandall, University of New Mexico; Chris Doten, National Democratic Institute; Stephen Schultze, U.S. Department of State; Tara Whalen, Google

5:00 pm–5:30 pm Monday

Rump Session

Sponsored by Google Open Source Research

This session is a chance to present works in progress or outrageous opinions about FOCI-related topics. Each rump presentation is *strictly* limited to 5 minutes. We will preload all the slides onto a single laptop for efficiency (we will send details about this to the contact e-mail you provide on the sign up form below.

FOCI '15 Rump/WiP Session Sign Up Form