Feeds

This is how a government-filtered internet looks

Quite dull really

  • alert
  • submit to reddit

High performance access to file storage

There been alot of argument in Tunis during the World Summit over the fact that the government filters internet access to remove websites it doesn't like.

We thought we'd show you what it looks like if you're on the end of it. As such, here is a screengrab of the Swissinfo.org site as seen from the Tunisian perspective. It is a fake 404 page, implying that the site doesn't exist.

SwissInfo.org blocked

It does of course, except by using a piece of software from US company Secure Computing, called SmartFilter, the Tunisian internet agency ATI can click it out of existence - at least for its own citizens.

The Saudi Arabian version of this internet filtering, which uses the same software, is more honest about its approach and replaces the 404 message with a "Forbidden Content" page.

All ISPs in Tunisia are forced to run their traffic through ATI, which then watches where its citizens go and checks out what is on the other end. If it doesn't like what it sees - usually criticism of the government - it simply blocks the site altogether.

There are a large number of sites it does this to, including Reporters Sans Frontieres (www.rsf.fr), Tunisian opposition political party CPR (www.cprtunisie.com), and Tunisian human rights organisation LTDH (www.ltdh.org), but the one that caused the biggest ruckus this week was Swiss news website Swissinfo.org, which was added to the list while the summit was still going on because it printed details of its president's speech. The speech was very critical of the Tunisian's government censoring and, ironically and inevitably, was itself was censored across Tunisia.

This whole process, incidentally, is extra-legal. That is, there is nothing in Tunisian law that allows the government to do this, and it continues to pretend that it offers a "free and open internet" to its citizens.

But, it would seem from having toured around the Tunisian version of the Internet for a few hours that you need only worry about being effectively wiped off the map if you are writing in French (and possibly Arabic).

There are al ot of Tunisians, especially among the young, that speak enough English to broadly understand what is being said, but it seems that the censors at the ATI haven't benefited from the same education and English websites have so far escaped the Net (pun intended). And so the Internet finds another way around efforts to control it. ®

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.