Content-control software

From Seo Wiki - Search Engine Optimization and Programming Languages
Jump to navigationJump to search

Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available.

The restrictions can be applied at various levels: a government can attempt to apply them nationwide (see internet censorship), or they can, for example, be applied by an ISP to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual user to his or her own computer.

The motive is often to prevent persons from viewing content which the computer's owner(s) or other authorities may consider objectionable; when imposed without the consent of the user, content control can constitute censorship. Some content-control software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities.

In some countries, such software is ubiquitous. In Cuba, if a computer user at a government controlled internet cafe types certain words, the word processor or browser is automatically closed, and a "state security" warning is given.[1]

Terminology

This article uses the term "content control", a term also used on occasion by CNN,[2] Playboy magazine[3] and the New York Times.[4] However, two other terms, censorware and web filtering, while more controversial, are often used. Nannyware has also been used in both product marketing and by the media.

Companies that make products that selectively block Web sites do not refer to these products as censorware, and prefer terms such as "Internet filter" or "URL Filter"; in the specialized case of software specifically designed to allow parents to monitor and restrict the access of their children, "parental control software" is also used. Some products log all sites that a user accesses and rates them based on content type for reporting to an "accountability partner" of the person's choosing, and the term accountability software is used. Internet filters, parental control software, and/or accountability software may also be combined into one product.

Those critical of such software, however, use the term "censorware" freely: consider the Censorware Project, for example.[5] The use of the term censorware in editorials criticizing makers of such software is widespread and covers many different varieties and applications: Xeni Jardin used the term in a 9 March 2006 editorial in the New York Times when discussing the use of American-made filtering software to suppress content in China; in the same month a high school student used the term to discuss the deployment of such software in his school district.[6]

Seth Finkelstein, an anti-censorware advocate and recipient of the EFF Pioneer Award, described what he saw as a terminology battle, in a hearing at the Library of Congress in 2003:

I think the best public relations that the censorware companies ever did was to get the word "filter" attached to their products. When you think of a spam filter, for example, you think of something that you do not want to see.
But, again, as I said earlier, censorware is not like a spam filter. What censorware is, is an authority wants to prevent a subject under their control from viewing material that the authority has forbidden to them. This description is general.[7]

In general, outside of editorial pages as described above, traditional newspapers do not use the term censorware in their reporting, preferring instead to use terms such as content filter, content control, or web filtering; the New York Times and the Wall Street Journal both appear to follow this practice. On the other hand, Web-based newspapers such as CNET use the term in both editorial and journalistic contexts, e.g., "Windows Live to Get Censorware."[8]

Types of filtering

Filters can be implemented in many different ways: by a software program on a personal computer or by servers providing Internet access. Choosing an Internet service provider (ISP) that blocks objectionable material before it enters the home can help parents who worry about their children viewing objectionable content.

Most content control software is marketed to organizations or parents. It is, however, also advertised on occasion to facilitate self-censorship by people struggling with internet addiction. Those obsessed by online pornography or gambling, chat rooms or the internet in general, may wish to prevent or restrict their own access. A number of accountability software products marketed as self-censorship or accountability software. These are promoted at churches and via religious media.[9]

Criticism

Those who believe content-control software is useful may still not agree with certain ways in which it is used, or with mandatory general regulation of information. For example, many[who?] would disapprove of filtering viewpoints on moral or political issues, agreeing that this could become support for propaganda. Many[who?] would also find it unacceptable that an ISP, whether by law or by the ISP's own choice, should deploy such software without allowing the users to disable the filtering for their own connections. In addition, some[who?] argue that using content-control software may violate sections 13 and 17 of the Convention on the Rights of the Child. In 1998, a United States federal district court in Virginia ruled that the imposition of mandatory filtering in a public library violates the First Amendment of the U.S. Bill of Rights.[10]

In 1996 the US Congress passed the Communications Decency Act, banning indecency on the Internet. Civil liberties groups challenged the law under the First Amendment and in 1997 the Supreme Court ruled in their favor.[11] Part of the civil liberties argument, especially from groups like the Electronic Frontier Foundation, was that parents who wanted to block sites could use their own content-filtering software, making government involvement unnecessary.[citation needed]

Critics argue that content-filtering software allows private companies to censor as they please. (See #Religious or Political censorship, below). They further argue that government encouragement of content filtering, or legal requirements for content-labeling software, would be equivalent to censorship.[citation needed]

In the late 1990s, groups such as the Censorware Project began reverse-engineering the content-control software and decrypting the blacklists to determine what kind of sites the software blocked. This led to legal action alleging violation of the "Cyber Patrol" license agreement.[12] They discovered that such tools routinely blocked unobjectionable sites while also failing to block intended targets. (See #Over-zealous filtering, below).

Some content-control software companies responded by claiming that their filtering criteria were backed by intensive manual checking. The companies' opponents argued, on the other hand, that performing the necessary checking would require resources greater than the companies possessed and that therefore their claims were not valid.[13]

Over-zealous filtering

An example of over-zealous filtering was the tendency, in some filters, to filter of all sites containing the word "breast", on the assumption that this word could only be mentioned in a sexual context. This approach had the consequence of blocking sites that discuss breast cancer, women's clothing, and even chicken recipes.

Similarly, over-zealous attempts to block the word "sex" would block words such as "Essex" and "Sussex". For some reason, one filter blocked looking up the word "swallow".[citation needed]

Content-control software has been cited[14] as one of the reasons Beaver College decided to change its name to Arcadia University, as content-control software had been blocking access to the college Web site. Another example was the filtering of Horniman Museum.[15]

Religious or political censorship

Many types of content-control software have been shown to block sites based on the religious and political leanings of the company owners. Examples include blocking several religious sites[16][17] (including the Web site of the Vatican), many political sites, and sites about gay/lesbians.[18] X-Stop was shown to block sites such as the Quaker web site, the National Journal of Sexual Orientation Law, the Heritage Foundation, and parts of The Ethical Spectacle.[19] CYBERsitter blocks out sites like National Organization for Women.[20] Nancy Willard, an academic researcher and attorney, reported on the close relationships between conservative Christian organizations and filtering software companies providing filters in U.S. public schools and libraries.[21] From her review of publicly available documentation, she concluded that seven of the filtering software companies were blocking Web sites based on religious or other inappropriate bias.[22] They may block sites about things like birth control, drug use and date rape.[23]

The site Peacefire.org posted information about some pages that were blocked and it was then added to the blocklist. Solid Oak Software has vowed that Peacefire's reports about CYBERsitter "will be blocked wherever they may be."[citation needed]

Content labeling

Content labeling may be considered another form of content-control software. In 1994, the Internet Content Rating Association (ICRA) — now part of the Family Online Safety Institute — developed a content rating system for online content providers. Using an online questionnaire a webmaster describes the nature of his web content. A small file is generated that contains a condensed, computer readable digest of this description that can then be used by content filtering software to block or allow that site.

ICRA labels come in a variety of formats.[24] These include the World Wide Web Consortium's Resource Description Framework (RDF) as well as Platform for Internet Content Selection (PICS) labels used by Microsoft's Internet Explorer Content Advisor.[25]

ICRA labels are an example of self-labeling. Similarly, in 2006 the Association of Sites Advocating Child Protection (ASACP) initiated the Restricted to Adults self-labeling initiative. ASACP members were concerned that various forms of legislation being proposed in the United States were going to have the effect of forcing adult companies to label their content.[26] The RTA label, unlike ICRA labels, does not require a webmaster to fill out a questionnaire or sign up to use. Like ICRA the RTA label is free. Both labels are recognized by a wide variety of content-control software.

The Voluntary Content Rating (VCR) system was devised by Solid Oak Software for their CYBERsitter filtering software, as an alternative to the PICS system, which some critics deemed too complex. It employs HTML metadata tags embedded within web page documents to specify the type of content contained in the document. Only two levels are specified, mature and adult, making the specification extremely simple.

Use in public libraries

USA

The use of Internet filters or content-control software varies widely in public libraries in the United States, since Internet use policies are established by the local library board. Many libraries adopted Internet filters after Congress conditioned the receipt of universal service discounts on the use of Internet filters through the Children's Internet Protection Act (CIPA). Other libraries do not install content control software, believing that acceptable use policies and educational efforts address the issue of children accessing age-inappropriate content while preserving adult users' right to freely access information. Some libraries use Internet filters on computers used by children only. Some libraries that employ content-control software allow the software to be deactivated on a case-by-case basis on application to a librarian; libraries that are subject to CIPA are required to have a policy that allows adults to request that the filter be disabled without having to explain the reason for their request.

Many legal scholars believe that a number of legal cases, in particular Reno v. American Civil Liberties Union, established that the use of content-control software in libraries is a violation of the First Amendment.[27] The Children's Internet Protection Act [CIPA] and the June 2003 case United States v. American Library Association found CIPA constitutional as a condition placed on the receipt of federal funding, stating that First Amendment concerns were dispelled by the law's provision that allowed adult library users to have the filtering software disabled, without having to explain the reasons for their request. The plurality decision left open a future "as-applied" Constitutional challenge, however. In November 2006, a lawsuit was filed against the North Central Regional Library District (NCRL) in Washington State for its policy of refusing to disable restrictions upon requests of adult patrons, but CIPA was not challenged in that matter.[28]

In March 2007, Virginia passed a law similar to CIPA that requires public libraries receiving state funds to use content-control software. Like CIPA, the law requires libraries to disable filters for an adult library user when requested to do so by the user.[29]

Australia

The Australian Internet Safety Advisory Body has information about "practical advice on Internet safety, parental control and filters for the protection of children, students and families" that also includes public libraries.[30]

NetAlert, the software made available free of charge by the Australian government, was allegedly cracked by a 16 year old student, Tom Wood, less than a week after its release in August 2007. Wood supposedly bypassed the $84 million filter in about half an hour to highlight problems with the government's approach to Internet content filtering.[31]

The Australian Government has introduced legislation that requires ISP's to "restrict access to age restricted content (commercial MA15+ content and R18+ content) either hosted in Australia or provided from Australia" that was due to commence from 20 January 2008, known as Cleanfeed.[32]

Cleanfeed is a proposed mandatory ISP level content filtration system. It was proposed by the Beazley led Australian Labor Party opposition in a 2006 press release, with the intention of protecting children who were vulnerable due to claimed parental computer illiteracy. It was announced on 31 December 2007 as a policy to be implemented by the Rudd ALP government, and initial tests in Tasmania have produced a 2008 report. Cleanfeed is funded in the current budget, and is moving towards an Expression of Interest for live testing with ISPs in 2008. Public opposition and criticism have emerged, led by the EFA and gaining irregular mainstream media attention, with a majority of Australians reportedly "strongly against" its implementation.[33] Criticisms include its expense, inaccuracy (it will be impossible to ensure only illegal sites are blocked) and the fact that it will be compulsory, which can be seen as an intrusion on free speech rights.[33] Cleanfeed is a responsibility of Senator Conroy's portfolio.

Denmark

In Denmark it is stated policy that it will "prevent inappropriate Internet sites from being accessed from children's libraries across Denmark."[34] "'It is important that every library in the country has the opportunity to protect children against pornographic material when they are using library computers. It is a main priority for me as Culture Minister to make sure children can surf the net safely at libraries,' states Brian Mikkelsen in a press-release of the Danish Ministry of Culture."[35]

Bypassing filters

Some software may be bypassed successfully by using alternative protocols such as FTP or telnet or HTTPS, conducting searches in a different language, using a proxy server or a circumventor such as Psiphon. Also cached web pages returned by Google or other searches could bypass some controls as well. Web syndication services may provide alternate paths for content. Some of the more poorly-designed programs can be shut down by killing their processes: for example, in Microsoft Windows through the Windows Task Manager, or in Mac OS X using Activity Monitor. Numerous workarounds and counters to workarounds from content-control software creators exist. Google services are often blocked by filters, but these may most often be bypassed by using https:// in place of http://.

Many content filters have an option which allows authorized people to bypass the content filter. This is especially useful in environments where the computer is being supervised and the content filter is aggressively blocking Web sites that need to be accessed.

As a reaction to the fact that some filters can be so easily bypassed, new computer auditing software has emerged to fill the gap between what a filter can block and what it cannot. SurfRecon is one company whose auditing software focuses on pornography detection.

Products and services

Some ISPs offer parental control options. Some offer security software which includes parental controls. Mac OS X v10.4 offers parental controls for several applications (Mail, Finder, iChat, Safari & Dictionary). Microsoft's Windows Vista operating system also includes content-control software.

Some companies implement content-control solutions using network gateway security appliances[36][37][38][39][40][41] or proxy servers.

Content filtering technology exists in two form: Proxy and Passive. Proxy based solutions offer detailed rules based configuration at the price of performance and simplicity. Proxy technology prevents traffic from continuing to the targeted destination until inspection has occurred and deemed acceptable. As points of failure investment in hardware can be significant to ensure quality of service as rules are added. The more rules defined the more inspection that occurs requiring administrators to balance cost to performance. Passive solutions differ in that they are by-pass or side scan filters leveraging signatures. Passive technology allows packets to pass the filter to the destination. Inspection terminates the tariff by using TCP/IP resets for HTTP protocol and application level knowledge for peering protocols. Signature escalation enables passive solutions high performance at a significantly lower total 'cost to performance' ratio.

Gateway Based Content Control Solutions may be more difficult to bypass than desktop software solutions, since they are less easily removed or disabled by the local user.

See also

References

  1. "Going online in Cuba: Internet under surveillance". Reporters Without Borders. 2006. http://www.rsf.org/IMG/pdf/rapport_gb_md_1.pdf. 
  2. "CNN.com - Young, angry ... and wired - May 3, 2005". Edition.cnn.com. http://edition.cnn.com/2005/WORLD/asiapcf/04/27/eyeonchina.internet/. Retrieved 2009-10-25. 
  3. [1], the San Francisco Chronicle [2]
  4. Bickerton, Derek (1997-11-30). "Digital Dreams - The". New York Times. http://query.nytimes.com/gst/fullpage.html?res=9403E1D8143BF933A05752C1A961958260. Retrieved 2009-10-25. 
  5. Censorware Project
  6. [3]
  7. "DMCA 1201 Exemption Transcript, April 11 - Censorware". Sethf.com. http://sethf.com/anticensorware/hearing_dc.php. Retrieved 2009-10-25. 
  8. "Windows Live to get censorware - ZDNet.co.uk". News.zdnet.co.uk. 2006-03-14. http://news.zdnet.co.uk/software/windows/0,39020396,39257292,00.htm. Retrieved 2009-10-25. 
  9. PostBlog. "SafeFamilies.org | Accountability Software: Encyclopedia of Urban Ministry". Urbanministry.org. http://www.urbanministry.org/wiki/accountability-software. Retrieved 2009-10-25. 
  10. "Mainstream Loudon v. Board of Trustees of the Loudon County Library, 24 F. Supp. 2d 552 (E.D. Va. 1998)". Tomwbell.com. http://www.tomwbell.com/NetLaw/Ch04/Loudoun.html. Retrieved 2009-10-25. 
  11. ruling transcript[dead link]
  12. "Microsystems v Scandinavia Online". Electronic Frontier Foundation. http://www.eff.org/legal/cases/Microsystems_v_Scandinavia_Online/?f=20000316_verif_complaint.html. Retrieved 2009-10-25. 
  13. [4] National Academies whitepaper
  14. [5] Slashdot article
  15. Porn filters have a field day on Horniman Museum
  16. Kelly Wilson (2008-11-06). "Hometown Has Been Shutdown - People Connection Blog: AIM Community Network". Hometown.aol.com. http://hometown.aol.com/Mjolnir13/test.htm. Retrieved 2009-10-25. 
  17. "Notice!!". Members.tripod.com. http://members.tripod.com/~Trifold/NOTICE.html. Retrieved 2009-10-25. 
  18. [6][dead link]
  19. "The Mind of a Censor". Spectacle.org. http://www.spectacle.org/cs/burt.html. Retrieved 2009-10-25. 
  20. "CYBERsitter: Where do we not want you to go today?". Spectacle.org. http://www.spectacle.org/alert/peace.html. Retrieved 2009-10-25. 
  21. "See: Filtering Software: The Religious Connection". Csriu.org. http://www.csriu.org/onlinedocs/documents/religious2.html. Retrieved 2009-10-25. 
  22. "Filtering Software: The Religious Connection". Csriu.org. http://www.csriu.org/onlinedocs/documents/religious2.html. Retrieved 2009-10-25. 
  23. "Chicago Tribune: Web porn filters block health data, study finds". Encyclopedia.com. 2002-12-10. http://www.encyclopedia.com/doc/1G1-119917597.html. Retrieved 2009-10-25. 
  24. "ICRA: Technical standards used". FOSI. http://www.fosi.org/icra/#tech. Retrieved 2008-07-04. 
  25. "Browse the Web with Internet Explorer 6 and Content Advisor". Microsoft. March 26, 2003. http://www.microsoft.com/windows/ie/ie6/using/howto/security/contentadv/config.mspx. 
  26. "ASACP Participates in Financial Coalition Against Child Pornography". November 20, 2007. http://www.asacp.org/page.php?content=news&item=511. Retrieved 2008-07-04. 
  27. Wallace, Jonathan D. (November 9, 1997). "Purchase of blocking software by public libraries is unconstitutional". http://www.spectacle.org/cs/library.bak. 
  28. "ACLU Suit Seeks Access to Information on Internet for Library Patrons". ACLU of Washington. November 16, 2006. http://www.aclu-wa.org/detail.cfm?id=557. 
  29. Sluss, Michael (March 23, 2007). "Kaine signs library bill: The legislation requires public libraries to block obscene material with Internet filters". The Roanoke Times. http://www.roanoke.com/politics/wb/wb/xp-109919. 
  30. "NetAlert". NetAlert. 2009-06-30. http://www.netalert.gov.au/. Retrieved 2009-10-25. 
  31. Higginbottom, Nick (2007-08-26). "Student cracks Government's $84m porn filter | News.com.au Top stories". News.com.au. http://www.news.com.au/story/0,23599,22304224-2,00.html. Retrieved 2009-10-25. 
  32. "New restricted access arrangements". ACMA. http://www.acma.gov.au/WEB/STANDARD/pc=PC_310905. Retrieved 2009-10-25. 
  33. 33.0 33.1 "Learn - No Clean Feed - Stop Internet Censorship in Australia". No Clean Feed. http://nocleanfeed.com/learn.html. Retrieved 2009-10-25. 
  34. "Danish Ministry of Culture Chooses SonicWALL CMS 2100 Content Filter to Keep Children's Libraries Free of Unacceptable Material". Prnewswire.com. http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/07-27-2006/0004404991&EDATE=. Retrieved 2009-10-25. 
  35. "Danish Minister of Culture offers internet filters to libraries". Saferinternet.org. http://www.saferinternet.org/ww/en/pub/insafe/news/articles/0606/dk.htm. Retrieved 2009-10-25. 
  36. "telemate". telemate. http://www.telemate.net. Retrieved 2009-10-25. 
  37. "Netsweeper". Netsweeper. http://www.netsweeper.com. Retrieved 2009-10-25. 
  38. Webmaster (webmaster@smoothwall.net). "SmoothWall". SmoothWall. http://www.smoothwall.net. Retrieved 2009-10-25. 
  39. "Bloxx". Bloxx. http://www.bloxx.com. Retrieved 2009-10-25. 
  40. "SecPoint Protector". Secpoint.com. http://www.secpoint.com/protector.html. Retrieved 2009-10-25. 
  41. "CensorNet". CensorNet. http://www.censornet.com. Retrieved 2009-10-25. 

External links

If you like SEOmastering Site, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...