Sensors will soon be everywhere–waiting, watching, and working to capture information about you and the environment we inhabit.
In the United States, we have been blessed with tremendous freedom, and these freedoms are enshrined in the Constitution and Bill of Rights. However, in many countries around the world, people do not share these basic freedoms and human rights.
Now in many countries, the limitation and subjugation of people has extended from the physical to the virtual world of the Internet. People are prevented through filtering software from freely “surfing” the Internet for information, news, research and so forth. And they are prohibited from freely communicating their thoughts and feelings in email, instant messages, blogs, social networks and other communications media, and if are identified and caught, they are punished often through rehabilitation by hard prison labor or maybe just disappear altogether.
In fact, many countries are now insisting that technology companies build in filtering software so that the government can control or block their citizen’s ability to view information or ideas that are unwanted or undesirable.
Now however, new technology is helping defend human rights around the world—this is the architecture for anonymity and circumvention technologies.
MIT Technology Review (May/June 2009) has an article entitled “Dissent Made Safer—how anonymity technology could save free speech on the Internet.”
An open source non-profit project called TOR has developed a peer to peer technology that enables users to encrypt communications and route data through multiple hops on a network of proxies. “This combination of routing and encryption mask a computer’s actual location and circumvent government filters; to prying eyes, the Internet traffic seems to be coming from the proxies.”
This creates a safe environment for user to browse the Internet and communicate anonymously and safely—“without them, people in these [repressive] countries might be unable to speak or read freely online.”
The OpenNet Initiative in 2006 “discovered some form of filtering in 25 of 46 nations tested. A more current study by OpenNet found “more than 36 countries are filtering one or more kinds of speech to varying degrees…it is a practice growing in scope, scale, and sophistication.”
Generally, filtering is done with some combination of “blocking IP addresses, domain names… and even Web pages containing certain keywords.”
Violations of Internet usage can result in prison or death for treason.
Aside from TOR, there are other tools for “beating surveillance and censorship” such as Psiphon, UltraReach, Anonymizer, and Dynaweb Freegate.
While TOR and these other tools can be used to help free people from repression around the world, these tools can also be used, unfortunately, by criminals and terrorists to hide their online activities—and this is a challenge that law enforcement must now understand and contend with.
The architecture of TOR is fascinating and freeing, and as they say, “the genie is out of the bottle” and we cannot hide our heads in the sand. We must be able to help those around the world who need our help in achieving basic human rights and freedoms, and at the same time, we need to work with the providers of these tools to keep those who would do us harm from taking advantage of a good thing.