An Internet filter is
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
via the
Web
Web most often refers to:
* Spider web, a silken structure created by the animal
* World Wide Web or the Web, an Internet-based hypertext system
Web, WEB, or the Web may also refer to:
Computing
* WEB, a literate programming system created b ...
,
Email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
, or other means. Content-control software determines what content will be available or be blocked.
Such restrictions can be applied at various levels: a government can attempt to apply them nationwide (see
Internet censorship
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
), or they can, for example, be applied by an
Internet service provider
An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privatel ...
to its clients, by an employer to its personnel,
by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an
individual users to their own computers.
The motive is often to prevent access to content which the computer's owner(s) or other authorities may consider objectionable. When imposed without the consent of the user, content control can be characterised as a form of internet censorship. Some content-control software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities.
In some countries, such software is ubiquitous.
In Cuba, if a computer user at a government-controlled
Internet cafe
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
types certain words, the
word processor
A word processor (WP) is a device or computer program that provides for input, editing, formatting, and output of text, often with some additional features.
Word processor (electronic device), Early word processors were stand-alone devices ded ...
or
web browser
A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
is automatically closed, and a "state security" warning is given.
Terminology
The term "content control" is used on occasion by
CNN, ''
Playboy
''Playboy'' is an American men's lifestyle and entertainment magazine, formerly in print and currently online. It was founded in Chicago in 1953, by Hugh Hefner and his associates, and funded in part by a $1,000 loan from Hefner's mother.
K ...
'' magazine, the ''
San Francisco Chronicle
The ''San Francisco Chronicle'' is a newspaper serving primarily the San Francisco Bay Area of Northern California. It was founded in 1865 as ''The Daily Dramatic Chronicle'' by teenage brothers Charles de Young and Michael H. de Young. The pap ...
'', and ''
The New York Times
''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
''. However, several other terms, including "content filtering software", "filtering proxy servers", "secure web gateways", "censorware", "content security and control", "web filtering software", "content-censoring software", and "content-blocking software", are often used. "Nannyware" has also been used in both product marketing and by the media. Industry research company
Gartner
Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
uses "secure web gateway" (SWG) to describe the market segment.
Companies that make products that selectively block Web sites do not refer to these products as censorware, and prefer terms such as "Internet filter" or "URL Filter"; in the specialized case of software specifically designed to allow parents to monitor and restrict the access of their children, "parental control software" is also used. Some products log all sites that a user accesses and rates them based on content type for reporting to an "
accountability partner
An accountability partner is someone who supports another person to keep a commitment or maintain progress on a desired goal. They will often be a trusted friend or acquaintance who will regularly ask an individual about their progress or receive ...
" of the person's choosing, and the term
accountability software
Accountability software, or shameware, is a type of surveillance software that records the user's Internet activity and reports it to an authority figure, such as a parent, teacher, spouse or religious leader, sometimes called an accountability pa ...
is used. Internet filters, parental control software, and/or accountability software may also be combined into one product.
Those critical of such software, however, use the term "censorware" freely: consider the Censorware Project, for example. The use of the term "censorware" in editorials criticizing makers of such software is widespread and covers many different varieties and applications:
Xeni Jardin
Xeni Jardin (; born Jennifer Hamm, August 5, 1970) is an American weblogger, digital media commentator, and tech culture journalist. She is known as a former co-editor of the collaborative weblog ''Boing Boing'', a former contributor to '' ''Wire ...
used the term in a 9 March 2006 editorial in ''The New York Times'' when discussing the use of American-made filtering software to suppress content in China; in the same month a high school student used the term to discuss the deployment of such software in his school district.
In general, outside of editorial pages as described above, traditional newspapers do not use the term "censorware" in their reporting, preferring instead to use less overtly controversial terms such as "content filter", "content control", or "web filtering"; ''The New York Times'' and ''
The Wall Street Journal
''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'' both appear to follow this practice. On the other hand, Web-based newspapers such as
CNET use the term in both editorial and journalistic contexts, for example "Windows Live to Get Censorware."
Types of filtering
Filters can be implemented in many different ways: by software on a personal computer, via network infrastructure such as
proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a requ ...
s,
DNS
The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
servers, or
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spre ...
s that provide Internet access. No solution provides complete coverage, so most companies deploy a mix of technologies to achieve the proper content control in line with their policies.
;Browser based filters
:Browser based content filtering solution is the most lightweight solution to do the content filtering, and is implemented via a third party
browser extension
A browser extension is a small software module for customizing a web browser. Browsers typically allow a variety of extensions, including user interface modifications, cookie management, ad blocking, and the custom scripting and styling of web pa ...
.
;E-mail filters
:E-mail filters act on information contained in the mail body, in the mail headers such as sender and subject, and e-mail attachments to classify, accept, or reject messages.
Bayesian filters, a type of statistical filter, are commonly used. Both client and server based filters are available.
;Client-side filters
:This type of filter is installed as software on each computer where filtering is required. This filter can typically be managed, disabled or uninstalled by anyone who has administrator-level privileges on the system. A DNS-based client-side filter would be to set up a
DNS Sinkhole
A DNS sinkhole, also known as a sinkhole server, Internet sinkhole, or Blackhole DNS is a DNS server that has been configured to hand out non-routable addresses for a certain set of domain names. Computers that use the sinkhole fail to access the ...
, such as
Pi-Hole
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network ...
.
;Content-limited (or filtered) ISPs
:Content-limited (or filtered) ISPs are Internet service providers that offer access to only a set portion of Internet content on an opt-in or a mandatory basis. Anyone who subscribes to this type of service is subject to restrictions. The type of filters can be used to implement government, regulatory or parental control over subscribers.
;Network-based filtering
:This type of filter is implemented at the
transport layer
In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model. The protocols of this layer provide end-to-end ...
as a
transparent proxy
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a request ...
, or at the
application layer
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol ...
as a
web proxy
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a request ...
. Filtering software may include
data loss prevention
Data loss prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while ''in use'' (endpoint actions), ''in motion'' (network traffic), and ' ...
functionality to filter outbound as well as inbound information. All users are subject to the access policy defined by the institution. The filtering can be customized, so a school district's high school library can have a different filtering profile than the district's junior high school library.
;DNS-based filtering
:This type of filtering is implemented at the DNS layer and attempts to prevent lookups for domains that do not fit within a set of policies (either parental control or company rules). Multiple free
public DNS services offer filtering options as part of their services.
DNS Sinkhole
A DNS sinkhole, also known as a sinkhole server, Internet sinkhole, or Blackhole DNS is a DNS server that has been configured to hand out non-routable addresses for a certain set of domain names. Computers that use the sinkhole fail to access the ...
s such as
Pi-Hole
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network ...
can be also be used for this purpose, though client-side only.
;Search-engine filters
:Many search engines, such as Google and Bing offer users the option of turning on a safety filter. When this safety filter is activated, it filters out the inappropriate links from all of the search results. If users know the actual URL of a website that features explicit or adult content, they have the ability to access that content without using a search engine. Some providers offer child-oriented versions of their engines that permit only children friendly websites.
Reasons for filtering
The Internet does not intrinsically provide content blocking, and therefore there is much content on the Internet that is considered unsuitable for children, given that much content is given certifications as suitable for adults only, e.g. 18-rated games and movies.
Internet service provider
An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privatel ...
s (ISPs) that block material containing
pornography
Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults, , or controversial religious, political, or news-related content en route are often utilized by parents who do not permit their children to access content not conforming to
their personal beliefs. Content filtering software can, however, also be used to block
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
and other content that is or contains hostile, intrusive, or annoying material including
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
,
spam,
computer virus
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a compu ...
es,
worms Worms may refer to:
*Worm, an invertebrate animal with a tube-like body and no limbs
Places
*Worms, Germany, a city
** Worms (electoral district)
* Worms, Nebraska, U.S.
*Worms im Veltlintal, the German name for Bormio, Italy
Arts and entertai ...
,
trojan horses
The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
, and
spyware
Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
.
Most content control software is marketed to organizations or parents. It is, however, also marketed on occasion to facilitate self-censorship, for example by people struggling with addictions to
online pornography
Internet pornography is any pornography that is accessible over the internet, primarily via websites, FTP servers peer-to-peer file sharing, or Usenet newsgroups. The availability of widespread public access to the World Wide Web in late 1990s ...
, gambling, chat rooms, etc. Self-censorship software may also be utilised by some in order to avoid viewing content they consider immoral, inappropriate, or simply distracting. A number of
accountability software
Accountability software, or shameware, is a type of surveillance software that records the user's Internet activity and reports it to an authority figure, such as a parent, teacher, spouse or religious leader, sometimes called an accountability pa ...
products are marketed as ''self-censorship'' or ''accountability software''. These are often promoted by religious media and at
religious gatherings.
Criticism
Filtering errors
Overblocking
Utilizing a filter that is overly zealous at filtering content, or mislabels content not intended to be censored can result in over blocking, or over-censoring. Over blocking can filter out material that should be acceptable under the filtering policy in effect, for example health related information may unintentionally be filtered along with
porn
Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults, -related material because of the
Scunthorpe problem
The Scunthorpe problem is the unintentional blocking of websites, e-mails, forum posts or search results by a spam filter or search engine because their text contains a string (or substring) of letters that appear to have an obscene or otherwise ...
. Filter administrators may prefer to err on the side of caution by accepting over blocking to prevent any risk of access to sites that they determine to be undesirable. Content-control software was mentioned as blocking access to Beaver College before its name change to
Arcadia University
Arcadia University is a private university in Glenside, Pennsylvania. The university enrolls approximately 4,000 undergraduate, master's, and doctoral students. The campus features Grey Towers Castle, a National Historic Landmark.
History ...
. Another example was the filtering of
Horniman Museum
The Horniman Museum and Gardens is a museum in Forest Hill, London, England. Commissioned in 1898, it opened in 1901 and was designed by Charles Harrison Townsend in the Modern Style. It has displays of anthropology, natural history and musical ...
. As well, over-blocking may encourage users to bypass the filter entirely.
Underblocking
Whenever new information is uploaded to the Internet, filters can under block, or under-censor, content if the parties responsible for maintaining the filters do not update them quickly and accurately, and a blacklisting rather than a whitelisting filtering policy is in place.
Morality and opinion
Many would not be satisfied with government filtering viewpoints on moral or political issues, agreeing that this could become support for
propaganda
Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loa ...
. Many would also find it unacceptable that an ISP, whether by law or by the ISP's own choice, should deploy such software without allowing the users to disable the filtering for their own connections. In the United States, the
First Amendment to the United States Constitution
The First Amendment (Amendment I) to the United States Constitution prevents the government from making laws that regulate an establishment of religion, or that prohibit the free exercise of religion, or abridge the freedom of speech, the f ...
has been cited in calls to criminalise forced internet censorship. (See
section below)
Legal actions
In 1998, a United States federal district court in Virginia ruled (
Loudoun v. Board of Trustees of the Loudoun County Library
''Loudoun v. Board of Trustees of the Loudoun County Library'', 24 F. Supp. 2d 552 (E.D. Va. 1998), was a U.S. district court held that a county policy requiring filters on all of its public library Internet computers was an unconstitutional restri ...
) that the imposition of mandatory filtering in a public library violates the First Amendment.
In 1996 the US Congress passed the
Communications Decency Act
The Communications Decency Act of 1996 (CDA) was the United States Congress's first notable attempt to regulate pornographic material on the Internet. In the 1997 landmark case '' Reno v. ACLU'', the United States Supreme Court unanimously st ...
, banning indecency on the Internet. Civil liberties groups challenged the law under the First Amendment, and in 1997 the
Supreme Court
A supreme court is the highest court within the hierarchy of courts in most legal jurisdictions. Other descriptions for such courts include court of last resort, apex court, and high (or final) court of appeal. Broadly speaking, the decisions of ...
ruled in their favor. Part of the civil liberties argument, especially from groups like the
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
, was that parents who wanted to block sites could use their own content-filtering software, making government involvement unnecessary.
In the late 1990s, groups such as the Censorware Project began reverse-engineering the content-control software and decrypting the blacklists to determine what kind of sites the software blocked. This led to legal action alleging violation of the "Cyber Patrol"
license agreement
A license (or licence) is an official permission or permit to do, use, or own something (as well as the document of that permission or permit).
A license is granted by a party (licensor) to another party (licensee) as an element of an agreeme ...
. They discovered that such tools routinely blocked unobjectionable sites while also failing to block intended targets.
Some content-control software companies responded by claiming that their filtering criteria were backed by intensive manual checking. The companies' opponents argued, on the other hand, that performing the necessary checking would require resources greater than the companies possessed and that therefore their claims were not valid.
The
Motion Picture Association
The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
successfully obtained a UK ruling enforcing ISPs to use content-control software to prevent
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, ...
by their subscribers.
Religious, anti-religious, and political censorship
Many types of content-control software have been shown to block sites based on the religious and political leanings of the company owners. Examples include blocking several religious sites (including the Web site of the Vatican), many political sites, and homosexuality-related sites. ''X-Stop'' was shown to block sites such as the
Quaker
Quakers are people who belong to a historically Protestant Christian set of Christian denomination, denominations known formally as the Religious Society of Friends. Members of these movements ("theFriends") are generally united by a belie ...
web site, the
National Journal of Sexual Orientation Law
National may refer to:
Common uses
* Nation or country
** Nationality – a ''national'' is a person who is subject to a nation, regardless of whether the person has full rights as a citizen
Places in the United States
* National, Maryland, ce ...
,
The Heritage Foundation
The Heritage Foundation (abbreviated to Heritage) is an American conservative think tank based in Washington, D.C. that is primarily geared toward public policy. The foundation took a leading role in the conservative movement during the preside ...
, and parts of
The Ethical Spectacle
''The'' () is a grammatical article in English, denoting persons or things already mentioned, under discussion, implied or otherwise presumed familiar to listeners, readers, or speakers. It is the definite article in English. ''The'' is the m ...
. CYBERsitter blocks out sites like
National Organization for Women
The National Organization for Women (NOW) is an American feminist organization. Founded in 1966, it is legally a 501(c)(4) social welfare organization. The organization consists of 550 chapters in all 50 U.S. states and in Washington, D.C. It ...
. Nancy Willard, an academic researcher and attorney, pointed out that many U.S. public schools and libraries use the same filtering software that many Christian organizations use. Cyber Patrol, a product developed by The Anti-Defamation League and Mattel's The Learning Company, has been found to block not only political sites it deems to be engaging in 'hate speech' but also human rights web sites, such as Amnesty International's web page about Israel and gay-rights web sites, such as glaad.org.
Content labeling
Content labeling may be considered another form of content-control software. In 1994, the
Internet Content Rating Association
Internet Content Rating Association (ICRA) was an international non-profit organization with offices in the United States and the United Kingdom. In October 2010, the ICRA rating system, and the organization, was discontinued.
Its mission was to h ...
(ICRA) — now part of the
Family Online Safety Institute
The Family Online Safety Institute (FOSI) is an international nonprofit organization. It is registered as a 501(c)(3) tax-deductible nonprofit charity in the United States and a registered charity in the United Kingdom. FOSI was founded in F ...
— developed a content rating system for online content providers. Using an online questionnaire a webmaster describes the nature of their web content. A small file is generated that contains a condensed, computer readable digest of this description that can then be used by content filtering software to block or allow that site.
ICRA labels come in a variety of formats. These include the World Wide Web Consortium's
Resource Description Framework The Resource Description Framework (RDF) is a World Wide Web Consortium (W3C) standard originally designed as a data model for metadata. It has come to be used as a general method for description and exchange of graph data. RDF provides a variety of ...
(RDF) as well as
Platform for Internet Content Selection The Platform for Internet Content Selection (PICS) was a specification created by W3C that used metadata to label webpages to help parents and teachers control what children and students could access on the Internet. The W3C Protocol for Web Des ...
(PICS) labels used by
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
's
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical user interface, graphical web browsers developed by Microsoft which was used in the Microsoft Wind ...
Content Advisor.
ICRA labels are an example of self-labeling. Similarly, in 2006 the
Association of Sites Advocating Child Protection (ASACP)
The Association of Sites Advocating Child Protection (ASACP) is an American nonprofit organization that fights Internet child pornography and works to help parents prevent children from viewing age-inappropriate material online.
Most of ASACP's f ...
initiated the Restricted to Adults self-labeling initiative. ASACP members were concerned that various forms of legislation being proposed in the
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
were going to have the effect of forcing adult companies to label their content. The RTA label, unlike ICRA labels, does not require a webmaster to fill out a questionnaire or sign up to use. Like ICRA the RTA label is free. Both labels are recognized by a
wide variety of content-control software.
The
Voluntary Content Rating
Voluntary may refer to:
* Voluntary (music)
* Voluntary or volunteer, person participating via volunteering/volunteerism
* Voluntary muscle contraction
See also
* Voluntary action
* Voluntariness, in law and philosophy
* Voluntaryism
Volunt ...
(VCR) system was devised by
Solid Oak Software
Solid is one of the four fundamental states of matter (the others being liquid, gas, and plasma). The molecules in a solid are closely packed together and contain the least amount of kinetic energy. A solid is characterized by structural ...
for their
CYBERsitter
An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software det ...
filtering software, as an alternative to the PICS system, which some critics deemed too complex. It employs
HTML
The HyperText Markup Language or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScri ...
metadata tags embedded within web page documents to specify the type of content contained in the document. Only two levels are specified, ''mature'' and ''adult'', making the specification extremely simple.
Use in public libraries
Australia
The Australian Internet Safety Advisory Body has information about "practical advice on Internet safety, parental control and filters for the protection of children, students and families" that also includes public libraries.
NetAlert, the software made available free of charge by the Australian government, was allegedly cracked by a 16-year-old student, Tom Wood, less than a week after its release in August 2007. Wood supposedly bypassed the $84 million filter in about half an hour to highlight problems with the government's approach to Internet content filtering.
The Australian Government has introduced legislation that requires ISP's to "restrict access to age restricted content (commercial MA15+ content and R18+ content) either hosted in Australia or provided from Australia" that was due to commence from 20 January 2008, known as
Cleanfeed.
Cleanfeed is a proposed mandatory ISP level content filtration system. It was proposed by the
Beazley
Beazley is a surname, and may refer to
* Charles Raymond Beazley, British historian
* Christopher Beazley, British politician
* David M. Beazley, American software engineer
* John Beazley, British classical scholar
* Kim Beazley, current Austr ...
led
Australian Labor Party
The Australian Labor Party (ALP), also simply known as Labor, is the major centre-left political party in Australia, one of two major parties in Australian politics, along with the centre-right Liberal Party of Australia. The party forms ...
opposition in a 2006 press release, with the intention of protecting children who were vulnerable due to claimed parental computer illiteracy. It was announced on 31 December 2007 as a policy to be implemented by the
Rudd
''Scardinius'' is a genus of ray-finned fish in the family Cyprinidae commonly called rudds. Locally, the name "rudd" without any further qualifiers is also used for individual species, particularly the common rudd (''S. erythrophthalmus''). The ...
ALP government, and initial tests in
Tasmania
)
, nickname =
, image_map = Tasmania in Australia.svg
, map_caption = Location of Tasmania in AustraliaCoordinates:
, subdivision_type = Country
, subdi ...
have produced a 2008 report. Cleanfeed is funded in the current budget, and is moving towards an Expression of Interest for live testing with ISPs in 2008. Public opposition and criticism have emerged, led by the
EFA and gaining irregular mainstream media attention, with a majority of Australians reportedly "strongly against" its implementation.
Criticisms include its expense, inaccuracy (it will be impossible to ensure only illegal sites are blocked) and the fact that it will be compulsory, which can be seen as an intrusion on free speech rights.
Another major criticism point has been that although the filter is claimed to stop certain materials, the underground rings dealing in such materials will not be affected. The filter might also provide a false sense of security for parents, who might supervise children less while using the Internet, achieving the exact opposite effect. Cleanfeed is a responsibility of
Senator Conroy's portfolio.
Denmark
In Denmark it is stated policy that it will "prevent inappropriate Internet sites from being accessed from children's libraries across Denmark". "'It is important that every library in the country has the opportunity to protect children against pornographic material when they are using library computers. It is a main priority for me as Culture Minister to make sure children can surf the net safely at libraries,' states Brian Mikkelsen in a press-release of the Danish Ministry of Culture."
United Kingdom
United States
The use of Internet filters or content-control software varies widely in public libraries in the United States, since Internet use policies are established by the local library board. Many libraries adopted Internet filters after Congress conditioned the receipt of universal service discounts on the use of Internet filters through the
Children's Internet Protection Act
The Children's Internet Protection Act (CIPA) is one of a number of bills that the United States Congress proposed to limit children's exposure to pornography and explicit content online.
Background
Both of Congress's earlier attempts at restri ...
(CIPA). Other libraries do not install content control software, believing that acceptable use policies and educational efforts address the issue of children accessing
age-inappropriate
Age appropriateness refers to people behaving as predicted by their perspective timetable of development. The perspective timetable is embedded throughout people's social life, primarily based on socially-agreed age expectations and age norms. Fo ...
content while preserving adult users' right to freely access information. Some libraries use Internet filters on computers used by children only. Some libraries that employ content-control software allow the software to be deactivated on a case-by-case basis on application to a librarian; libraries that are subject to CIPA are required to have a policy that allows adults to request that the filter be disabled without having to explain the reason for their request.
Many legal scholars believe that a number of legal cases, in particular ''
Reno v. American Civil Liberties Union
''Reno v. American Civil Liberties Union'', 521 U.S. 844 (1997), was a landmark decision of the Supreme Court of the United States, unanimously ruling that anti-indecency provisions of the 1996 Communications Decency Act violated the First Amen ...
'', established that the use of content-control software in libraries is a violation of the First Amendment. The Children's Internet Protection Act
IPA
IPA commonly refers to:
* India pale ale, a style of beer
* International Phonetic Alphabet, a system of phonetic notation
* Isopropyl alcohol, a chemical compound
IPA may also refer to:
Organizations International
* Insolvency Practitioner ...
and the June 2003 case ''
United States v. American Library Association
United may refer to:
Places
* United, Pennsylvania, an unincorporated community
* United, West Virginia, an unincorporated community
Arts and entertainment Films
* ''United'' (2003 film), a Norwegian film
* ''United'' (2011 film), a BBC Two fi ...
'' found CIPA constitutional as a condition placed on the receipt of federal funding, stating that First Amendment concerns were dispelled by the law's provision that allowed adult library users to have the filtering software disabled, without having to explain the reasons for their request. The plurality decision left open a future "as-applied" Constitutional challenge, however.
In November 2006, a lawsuit was filed against the North Central Regional Library District (NCRL) in Washington State for its policy of refusing to disable restrictions upon requests of adult patrons, but CIPA was not challenged in that matter. In May 2010, the Washington State Supreme Court provided an opinion after it was asked to certify a question referred by the United States District Court for the Eastern District of Washington: "Whether a public library, consistent with Article I, § 5 of the Washington Constitution, may filter Internet access for all patrons without disabling Web sites containing constitutionally-protected speech upon the request of an adult library patron." The Washington State Supreme Court ruled that NCRL's internet filtering policy did not violate Article I, Section 5 of the Washington State Constitution. The Court said: "It appears to us that NCRL's filtering policy is reasonable and accords with its mission and these policies and is viewpoint neutral. It appears that no article I, section 5 content-based violation exists in this case. NCRL's essential mission is to promote reading and lifelong learning. As NCRL maintains, it is reasonable to impose restrictions on Internet access in order to maintain an environment that is conducive to study and contemplative thought." The case returned to federal court.
In March 2007, Virginia passed a law similar to CIPA that requires public libraries receiving state funds to use content-control software. Like CIPA, the law requires libraries to disable filters for an adult library user when requested to do so by the user.
Bypassing filters
Content filtering in general can "be bypassed entirely by tech-savvy individuals." Blocking content on a device "
ill not ILL may refer to:
* ''I Love Lucy'', a landmark American television sitcom
* Illorsuit Heliport (location identifier: ILL), a heliport in Illorsuit, Greenland
* Institut Laue–Langevin, an internationally financed scientific facility
* Interlibrar ...
��guarantee that users won't eventually be able to find a way around the filter."
Some software may be bypassed successfully by using alternative protocols such as
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
or
telnet
Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet cont ...
or
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is e ...
, conducting searches in a different language, using a
proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a requ ...
or a circumventor such as
Psiphon
Psiphon is a free and open-source Internet censorship circumvention tool that uses a combination of secure communication and obfuscation technologies, such as a VPN, SSH, and a Web proxy. Psiphon is a centrally managed and geographically diverse ...
. Also cached web pages returned by Google or other searches could bypass some controls as well. Web syndication services may provide alternate paths for content. Some of the more poorly designed programs can be shut down by killing their processes: for example, in
Microsoft Windows through the Windows
Task Manager
In operating systems, a task manager is a system monitor program used to provide information about the processes and applications running on a computer, as well as the general status of the computer. Some implementations can also be used to ...
, or in
Mac OS X
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
using Force Quit or
Activity Monitor. Numerous workarounds and counters to workarounds from content-control software creators exist.
Google
Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
services are often blocked by filters, but these may most often be bypassed by using ''https://'' in place of ''http://'' since content filtering software is not able to interpret content under secure connections (in this case SSL).
An encrypted
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
can be used as means of bypassing content control software, especially if the content control software is installed on an Internet gateway or firewall.
Other ways to bypass a content control filter include translation sites and
establishing a remote connection with an uncensored device.
Products and services
Some ISPs offer
parental control
''Parental Control'' is a reality television show about people looking for love produced by MTV. The two directors, Brendon Carter and Bruce Klassen, have also created other MTV shows.
In Asia, this show was aired on Channel V from 2007–2009. ...
options. Some offer security software which includes parental controls.
Mac OS X v10.4
Mac OS X Tiger (version 10.4) is the 5th major release of macOS, Apple's desktop and server operating system for Mac computers. Tiger was released to the public on April 29, 2005 for US$129.95 as the successor to Mac OS X 10.3 Panther. Some o ...
offers parental controls for several applications (
Mail
The mail or post is a system for physically transporting postcards, letter (message), letters, and parcel (package), parcels. A postal service can be private or public, though many governments place restrictions on private systems. Since the mid ...
,
Finder
Finder may refer to:
* Finder (surname)
* Finder (software), part of the Apple Macintosh operating system
* ''Finder'' (comics), a comic book series by Carla Speed McNeil
* ''Finder'' (novel), a 1994 novel by Emma Bull
* Finder Wyvernspur, a fi ...
,
iChat
iChat (previously iChat AV) is a discontinued instant messaging software application developed by Apple Inc. for use on its Mac OS X operating system. It supported instant text messaging over XMPP/Jingle or OSCAR ( AIM) protocol, audio and vid ...
,
Safari
A safari (; ) is an overland journey to observe wild animals, especially in eastern or southern Africa. The so-called "Big Five" game animals of Africa – lion, leopard, rhinoceros, elephant, and Cape buffalo – particularly form an importa ...
&
Dictionary). Microsoft's
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
operating system also includes content-control software.
Content filtering technology exists in two major forms:
application gateway or
packet inspection. For HTTP access the application gateway is called a web-proxy or just a proxy. Such web-proxies can inspect both the initial request and the returned web page using arbitrarily complex rules and will not return any part of the page to the requester until a decision is made. In addition they can make substitutions in whole or for any part of the returned result. Packet inspection filters do not initially interfere with the connection to the server but inspect the data in the connection as it goes past, at some point the filter may decide that the connection is to be filtered and it will then disconnect it by injecting a TCP-Reset or similar faked packet. The two techniques can be used together with the packet filter monitoring a link until it sees an HTTP connection starting to an IP address that has content that needs filtering. The packet filter then redirects the connection to the
web-proxy which can perform detailed filtering on the website without having to pass through all unfiltered connections. This combination is
quite popular because it can significantly reduce the cost of the system.
Gateway-based content control software may be more difficult to bypass than desktop software as the user does not have physical access to the filtering device. However, many of the techniques in the
Bypassing filters section still work.
See also
*
Adultism
Adultism is "the power adults have over children". More narrowly, adultism is defined as "prejudice and accompanying systematic discrimination against young people". On a more philosophical basis, the term has also been defined as "bias towards ad ...
*
Ad filtering
Ad blocking or ad filtering is a software capability for blocking or altering online advertising in a web browser, an application or a network. This may be done using browser extensions or other methods.
Technologies and native countermeasure ...
*
Comparison of content-control software and providers
This is a list of content-control software and services. The software is designed to control what content may or may not be viewed by a reader, especially when used to restrict material delivered over the Internet via the Web, e-mail, or other mea ...
(incl. parental control software)
*
Computer and network surveillance
Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
*
David Burt
David Burt (1953) is a British actor, known primarily for his many and wide-ranging West End performances.
David Burt is the son of Pip Hinton, better known for her role in '' Crackerjack'' alongside Eamonn Andrews and later Leslie Crowther. ...
, a former librarian and advocate for content-control software
*
Deep content inspection
Deep content inspection (DCI) is a form of network filtering that examines an entire file or MIME object as it passes an inspection point, searching for viruses, spam, data loss, key words or other content level criteria. Deep Content Inspection ...
*
Egress filtering
In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another. Typically, it is information from a private TCP/IP computer network to the Internet tha ...
, control of outbound network traffic
*
Financial Coalition Against Child Pornography The Financial Coalition Against Child Pornography (FCACP) is a coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that are used to fund the ...
*
Internet censorship
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
*
Internet censorship circumvention
Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.
Various techniques and methods are used to bypass Internet censorship, and have differing ease of use, speed, security, and risks. Some method ...
*
Internet safety
Internet safety or online safety or cyber safety and E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the ...
*
Opposition to pornography
*
Parental controls
Parental controls are features which may be included in digital television services, computers and video games, mobile devices and software that allow parents to restrict the access of content to their children. These controls were created to ...
*
Peacefire
Peacefire is a U.S.-based website, with a registered address in Bellevue, Washington, dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18". It was founded in August 1996 by Bennett Haselton ...
, a U.S.-based website dedicated to "preserving First Amendment rights for Internet users, particularly those younger than 18"
*
Russian State Duma Bill 89417-6
Russian Internet restriction bill (russian: закон о блокировке экстремистских сайтов; Federal law of Russian Federation no. 139-FZ of 2012-07-28) is a law passed by the Russian State Duma in 2012 which replace ...
- a proposed bill that would mandate content control software
*
Wordfilter
A wordfilter (sometimes referred to as just "filter" or "censor") is a script typically used on Internet forums or chat rooms that automatically scans users' posts or comments as they are submitted and automatically changes or censors particular ...
, generic name for scripts typically used on Internet forums or chat rooms that automatically scans users' posts or comments as they are submitted and automatically changes or censors particular words or phrases
References
{{DEFAULTSORT:Content-Control Software
Content-control software
An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software det ...
Web browsers
Internet censorship
Digital rights management