-
Notifications
You must be signed in to change notification settings - Fork 0
/
texreport.tex
894 lines (741 loc) · 43.9 KB
/
texreport.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
% CSC 300: Professional Responsibilities Dr. Clark Turner
% Two Column Format
\documentclass[11pt]{article}
%this allows us to specify sections to be single or multi column so that things
%like title page and table of contents are single column
\usepackage{multicol}
\usepackage{indentfirst}
\usepackage[english]{babel}
\usepackage[utf8x]{inputenc}
\usepackage{setspace}
\usepackage{verbatim}
\usepackage{url}
\usepackage{pdfpages}
\usepackage{graphicx}
\usepackage{breakurl}
%%% PAGE DIMENSIONS
\usepackage{geometry} % to change the page dimensions
\geometry{letterpaper}
%\addtocontents{toc}{\protect\thispagestyle{empty}}
\begin{document}
\title{\vfill Peek-a-Boo \\ \large Tor vs Iran}
\author{
By Orion Miller\vspace{10pt} \\
CSC 300: Professional Responsibilities \vspace{10pt} \\
Dr. Clark Turner\vspace{10pt} \\
}
%\date{October 22, 2010} %Or use \today for today's Date
\date{\today}
\maketitle
\vfill %in combinaion with \newpage this forces the abstract to the bottom of
\begin{abstract}
On September 14, 2011 the Iranian government added a filter rule to their
firewall and blocked Tor, a Internet anonymity tool, traffic despite Tor's main
focused intent on preventing such things from ever happening.
\cite{IranBlocksTorSameDayFix} Later that day the Tor project released a patch
which circumvent Iran's firewall filters and suggested users of Tor to upgrade
to version Tor 0.2.2.33 or Tor 0.2.3.4-alpha.\cite{IranBlocksTorSameDayFix}
In this paper we utilize the Software Engineering Code of Ethics to see if Tor
and The Tor Project were ethical in this patch. We focus on two main parts in
regarding the ethics of the release and the Tor project. We first see if the
release of the Tor software was ethical and secondly we examine if Tor is
ethical in features of the software it tries to provide.
\end{abstract}
\thispagestyle{empty} %remove page number from title page
\newpage
\pagenumbering{gobble}
\tableofcontents
\newpage
%end the 1 column format
\pagenumbering{arabic}
%start 2 column format
\begin{multicols}{2}
%Start numbering first page of content as page 1
\setcounter{page}{1}
%%%%%%%%%%%%%%%%%%%%
%%% Known Facts %%%
%%%%%%%%%%%%%%%%%%%%
\section{Facts}
\subsection{Iran's Presidential Election}
In Iran, the sparks of political unrest began to fly in the summer of 2009.
Friction started with the highly anticipated outcome of the Iran's race for
presidency. Elections took place on June 12th. To the surprise of many, Mahmoud
Ahmadinajad won with a landslide victory of well above 60\% of the vote
\footnote{The Interior Ministry was the part of the Iranian government that
tallied the votes of the election} \cite{TheIranianVote,
IranianElectionResultsByProvince} , making this Ahmadinjad's second term as the
President of Iran.
\subsection{The Response}
Iranian citizens and many others were outraged with the results of the election.
Laura Secor from the New Yorker, succinctly summed up the voice of Iranian
dissidents by stating
\begin{quotation}
``there can be no question that on June 12, 2009, the Iranian presidential
election was stolen.'' \cite{TheIranianVote}
\end{quotation}
Citizens swiftly began to vocalize their opinions.
\subsection{Protests Begin}
Protests began on June 13 and picked up force not only offline but online as
well. By the fifth day of protests, hundreds of thousands of demonstrators took to
the streets of Tehran in opposition of the election's outcome
\cite{IranProtestsFifthDayOfUnrest}. At the same time, ``the
Twitterverse\footnote{Twitterverse is a name referring everything relating to
the social network Twitter.} exploded with tweets from people who weren't having
it, both in English and in Farsi.'' \cite{WhyTwitterIsTheMedium}
\subsection{Iran Tries to Stop the Protests}
Iran's government tried to douse out the dissent. They sent
Revolutionary Guards into the streets, cut off the Internet, and shut down
cell-phone communications. \cite{TheIranianVote} The government didn't stop
there, they began specifically arresting, ``at least 500 activists,
opposition figures, journalists.'' \cite{IranProtestsFifthDayOfUnrest} The
Iranian government didn't stop at just arresting protesters; they made certain
locations of protest a threat to life. The government publicly announced that
the police had orders to shoot anyone approaching the Interior Ministry.
\cite{TheIranianVote} Online, the government filtered their Internet traffic and
for periods of times blocked social networks like Twitter \footnote{Twitter is a
microblogging service were anyone can read, write, and share messages, up to 140
characters long. \cite{WhatIsTwitter}}. \cite{IranBlocksFacebookTwitter}
%%TWITTER FOOTNOTE - add source from "What is Twitter, a social network or a
%% News media
\subsection{The Role of Internet}
The Internet provided a medium for political discourse where traditional media
was failing. Blogs and social networks, especially Twitter, began to prove
themselves invaluable. Where traditional means of sharing information such as
newspapers were breaking down, online sources of information were playing a
vital role during the protests by providing a global, uncensored, and near
real-time means of news, communication, and organization. In Iran, ``while the
front pages of Iranian newspapers were full of blank space where censors had
whited-out news stories, Twitter was delivering information from street level,
in real time.'' \cite{WhyTwitterIsTheMedium}
\subsection{Citizens use Tor to Bypass Censorship}
With the government filtering out vital lifelines of information and means of
organization, citizens began to find alternatives to connect to Twitter.
\cite{FindingWayAroundIranianCensorship} One of the tools that proved useful was
Tor.
\subsection{What is Tor}
Tor\footnote{In this paper when the term `Tor' is used it will refer to the
software.} is software that connects and participates in the Tor network that
provides users a means of connecting with websites that is encrypted and
anonymous. In short, The Tor Project publicizes that, ``The Tor software is a
program you can run on your computer that helps keep you safe on the
Internet.''\cite{Tor:FAQ}
\subsection{Iran Blocks Tor}
Two years after, Iran is still under the same regime of Ahmadinajad. On
September 14, 2011 the Iranian government added a filter rule to their firewall
and blocked Tor traffic despite Tors main focused intent on preventing such
things from ever happening. \cite{IranBlocksTorSameDayFix} Later that day the
Tor project released a patch which circumvent Iran's firewall filters and
suggested users of Tor to upgrade to version Tor 0.2.2.33 or Tor
0.2.3.4-alpha.\cite{IranBlocksTorSameDayFix}
%%%%%%%%%%%%%%%%%%%%%%%%%
%%% Research Question %%%
%%%%%%%%%%%%%%%%%%%%%%%%%
\section{Research Question}
Was it ethical for the Tor project to release a same day patch specifically
enabling Iranians to bypass Iran's firewall when the government explicitly
filtered Tor traffic starting September 14, 2011?
\subsection{Importance of Question}
This research question is important because in essence it is asking whether The
Tor Project should be involved in Iran's political discourse and is it acting in
an ethical manor. Most importantly Iranian dissidents are being jailed and some
cases killed.\cite{IranBloggersDeath} Tor and its network could provide a safe
and private means for discourse and dissent to exist.
%%%%%%%%%%%%%%%%%%%%%%%%%
%%% Extant Arguments from External Sources %%%
%%%%%%%%%%%%%%%%%%%%%%%%%
\section{Extant Arguments}
There have been little to no published articles specifically finding the Tor's
patch in response to Iran's Tor block ethical or not. In general arguments for
or against Tor revolve around what it allows people to do rather than the
software itself.
\subsection{Arguments Against Tor}
The Iranian government has and currently firmly believes that it is necessary to
censor the Internet traffic coming in and out of the country. They have
announced that they feel it is right to censor the Internet because they feel
they need to stamp out ``immoral and illegal''
content.\cite{CensorshipFearsRise} It is true that immoral and illegal content
exists on the Internet and Tor can be used to facilitate child porn and
drugs.\cite{Tor:ChildPorn, Tor:SilkRoad} We can safely assume that the Iranian
government finds Tor to be unethical because it can allow people to bypass what
they consider to be necessary Internet filters.\cite{IranBlocksTorSameDayFix}
\subsection{Arguments For Tor}
The arguments for Tor stem from the feeling that anonymity online is fundamental
for people to communicate freely without the fear of repercussion or
retribution.\cite{Tor:ArgumentForAppelbaum} People arguing for Tor do
acknowledge that it can be used for evil but Jacob Appelbaum, an Advocate,
Security Researcher, and Developer for The Tor Project, feels that
\begin{quotation}
``yes, it is possible that [Tor] could be misused. But I believe the problem
of bad speech is not solved by censoring speech or by tracking people down and
harming them, but rather it is solved with more
speech.''\cite{Tor:ArgumentForAppelbaum}
\end{quotation}
Despite Tor's possible negative uses it gives its users,
``anonymity[, which] is not only a core value of the digital age, it is a vital
underpinning of the right to free speech.''\cite{TorCreatesSaferInternet}
\subsection{Arguments Summary}
Tor brings up the debated issue of whether people should have anonymity, and if so
how much. On one hand, it can be a tool to facilitate malicious behavior in the
world, or used as a tool to subvert the rules imposing a nations moral framework. On
the other hand it is argued that even though it can be used for bad, on the whole, it
is better that good people are empowered with this tool so they can exercise
their fundamental rights of privacy and freedom of speech.
%%%%%%%%%%%%%%%%
%%% Analysis %%%
%%%%%%%%%%%%%%%%
\section{Analysis}
For us to analyze the research question and see if The Tor
Project was ethical, we need to utilize an ethical system as a framework
to guide the analysis and and as a foundation to determine what is and is
not ethical. This paper will use the Association for Computing
Machinery's\footnote{On ACM's `About' webpage it states that, ``ACM is widely
recognized as the premier membership organization for computing professionals,
delivering resources that advance computing as a science and a profession;
enable professional development; and promote policies and research that
benefit society.''\cite{ACM:About}} Software Engineering Code of ethics (SE
Code). Before we begin analysis under this code of ethics we need to examine
and determine if the SE Code of ethics applies to the domain of the research
question.
\subsection{Why the SE Code of Ethics Applies}
The Software Engineering Code of Ethics states that, ``Software engineers are
those who contribute by direct participation or by teaching, to the analysis,
specification, design, development, certification, maintenance and testing of
software systems.'' \cite{SE:CodeOfEthics} The Tor Project is a 501(c)(3)
non-profit based in the United States that makes Internet anonymity
software.\cite{Tor:FAQ, Tor:CorePeople} Their Mission Statement states that,
\begin{quotation}
``The Corporation is organized and shall be operated exclusively for scientific,
charitable and educational purposes ... to develop, improve and distribute
free, publicly available tools and \textbf{programs} that promote free speech, free
expression, civic engagement and privacy rights online''\footnote{ The entirety
of The Tor Project's missions statement can be found in Appendix
\ref{Tor:MissionStatement}} \cite{TOR:Sponsorship}
\end{quotation}
Looking at the the keyword programs within The Tor Project's mission statement
we need to make sure it would be considered a software system under the SE
Code's preamble. The Oxford Dictionary defines software as, ``the programs and other operating
information used by a computer.''\cite{defn:Software} Using the Oxford
Dictionary's definition it equates software with programs used by a computer.
Taking Oxford's definition and applying it to Tor's Mission Statement we would
get, ``to develop, improve and distribute free, publicly available tools and
\textbf{software} that promote.''
Because the Tor Project develops, and distributes software, this means they, ``contribute by
direct participation ... to the analysis, specification, design, development,
... , maintenance and testing of software systems'' and thus are Software
Engineers, meaning The Tor Project falls under the requirements of the Software
Engineering Code of Ethics.\cite{Tor:FAQ, Tor:Overview}
\subsection{SE Code 1.07}
To begin our analysis we should examine what sort of considerations were made by
The Tor Project surrounding the release of the patch of Tor on September 14, the
same day that Iran added filters to block out Tor traffic in their firewall. It
is important to examine their consideration because within The Tor Project's
blog post titled \textit{Iran blocks Tor; Tor releases same-day fix} it states,
``once enough relays and bridges upgrade, the many tens of thousands of Tor
users in Iran will resume being able to reach the Tor network, without needing
to change their software.''\cite{IranBlocksTorSameDayFix} This means that The Tor Project
were directly responding to Iran's current affairs and acknowledging that it
would impact users in Iran. The tenet of the SE code that would best allow us
to examine a consideration the release of the Tor patch would be tenet 1.07. It
states
\newline
\begin{center}
\fbox{
\parbox{0.8\linewidth}{
1.07. Consider issues ... and \textbf{other factors} that can
\textbf{diminish access} to the \textbf{benefits} of \textbf{software}.
\cite{SE:CodeOfEthics}
}}
\end{center}
\smallskip
To bring this ethical argument into the domain of the research question a few
modifications to the code need to made. The phrase \textbf{other factors} in
this case is \textbf{Iran's firewall block of Tor}. The phrase \textbf{diminish
access} in this case \textbf{prevents access}. The word \textbf{benefits} in
this case is the \textbf{uncensored Internet}. The word \textbf{software} in
this case is \textbf{Tor}.
\subsubsection{Applying SE Code 1.07 to the Tor Project}
Now that we have taken SE Code 1.07 and brought it into the domain of the
research questions we can construct the modified SE Code.
\newline
\begin{center}
\fbox{
\parbox{0.8\linewidth}{
1.07. Consider the issue of ... \textbf{Iran's firewall block of Tor} that
\textbf{preventents access} to the \textbf{uncensored Internet} from
\textbf{Tor}.
\cite{SE:CodeOfEthics}
}}
\end{center}
\smallskip
For us to effectively analyze the domain of research question using our modified
SE Code we need to construct specific questions as points of analysis. First, how
did Tor circumvent Iran's firewall? Second, how did the Tor software patch
affect uncensored Internet access? Lastly, was Tor ethical under SE Code 1.07?
\subsubsection{Iran's Firewall}
Before we investigate how Tor bypasses Iran's firewall or the considerations and
effects of the Tor patch we need to examine how Iran's firewall works.
\paragraph{Internet Service}
All of the Internet service in Iran is controlled by Data Communications of Iran
(DCI).\cite{FindingWayAroundIranianCensorship} In addition to DCI's monopoly on
Iran's Internet, it is mainly owned by the Iranian government.\cite{
FindingWayAroundIranianCensorship, DCI:Articles} This gives DCI and the
Iranian government, the ability to throttle the total amount of data that enters
and leaves the country, specify what websites are accessible by defining filter
rules on their routers, and the ability to turn off the Internet all together.
\cite{FindingWayAroundIranianCensorship}
\paragraph{Censorship}
It is one thing for the Iranian government have control over Iran's
Internet, but is it within their power to actually censor and monitor DCI's
Internet users? In 2009 DCI, for a brief period took down the entire Internet in
Iran.\cite{FindingWayAroundIranianCensorship} Specific websites such a
Facebook, Youtube, Twitter, and Google had been blocked from access.\cite{
FindingWayAroundIranianCensorship, IransElectronicCurtain} The blocking of
these sites did not just block what Iran's government may consider illegitimate
use of such websites, it blocked legitimate use of these sites
for Iranians who others may be trying to communicate with using these sites under
Iran's ethical framework. The Iranian government also took measures to filter
SSL traffic and specifically the Tor network.\cite{Tor:IranPartiallyBlocksSSL,
IranBlocksTorSameDayFix} Blocking SSL traffic may appear just a means for the
government to filter and monitor Internet traffic but it has larger
implications. Encrypting network traffic is fundamental for Internet users to
protect themselves from malicious people gathering sensitive information like
passwords, banking informations, and medical information. Iran's power
over DCI as well as their past and current actions they have taken to exercise that
power demonstrates, that they want to control the information and communications
of its people, especially Iranian dissidents.
\subsubsection{How did Tor circumvent Iran's firewall?}
Now that we have an understanding what the Iranian firewall is capable of it is
important to examine how Tor is capable of bypassing it.
\paragraph{How Tor Works}
\label{HowTorWorks}
We will examine how Tor works by analogy of sending and receiving mail
exchagned between people.
\footnote{The reason for an explanation with analogy is to avoid the prequisite
knowledge of computing and computer networks. For additional information on how
Tor works visit Appendix \ref{Tor:HowTorWorks} or head to
\url{https://www.torproject.org/about/overview.html.en#overview} and
\url{http://freehaven.net/anonbib/}
}
We will define a \textbf{Tor node} as a \textbf{person}, \textbf{data} as a
\textbf{letter}, \textbf{encryption} as an \textbf{envelope}, and
\textbf{directory server} as an \textbf{address book}. Tor in this analogy works
by following the steps as follows. Bill wants to send a letter his friend Alice
while preventing anyone from reading his message or discover what his address is. Bill
is smart so he devises plan. He looks through his address book and finds three
friends and their addresses. These three friends (Zulu, Yankee, X-ray)
have agreed to forward any message that they receive to the
specified address on the envelope. Bill chooses a path for his letter to take take from one friend
to the next to reach Alice. In this analogy it will go from Zulu to Yankee to
X-ray and finally Alice. Before Bill does anything else he a devises a unique
means for each envelope to only be able to be opened by the recipient of that
letter and exchanges that information to said recipient. Then he takes his letter addressed to Alice from Bob and then
puts it in the first envelope addressed From Yankee to X-ray. Then Bob puts the first
envelope into a second envelope addressed from Zulu to Yankee. Finally, Bob puts the second
envelope inside a third envelope addressed from Bill to Zulu. Then he sends
this triple wrapped letter off to Zulu. As each friend receives their envelope addressed to them
they open it and send it off to the friend it is stated on the envelope. This
way, no one along the path from Bill to Alice, except for Bill, knows the source address of
Bill and the destination address of Alice at the same time. The
only ones who can read the message is X-ray and Alice. This is basically how Tor
software works. It should be noted that putting an envelope around the original
letter, protecting Bob's message addressed to Alice from X-ray,
before it's encased by the envelopes for Zulu, Yankee, and X-ray is out of
the scope of the Tor protocol.
\paragraph{Dousing the Firewall}
Continuing from the analogy above, we can analyze how Bill (i.e an Iranian
dissident) could use this technique to subvert the access controls specified by
the Iranan firewall. Iranian dissidents being able to use Tor to connect to the
Tor network would connect other Tor nodes and set up a path. Tor could be
specified to make sure the last node in the path, the exit node, is outside Iran.\cite{
Tor:SpecificExitNode, Tor:FAQ} The data being sent across the designated
path would reach its end address (e.g. Twitter, Facebook) and Iran's firewall
would not be able to censor or monitor that data. The Iranian government
wouldn't be able to censor what websites the Iranian dissident wants to access
since the firewall doesn't know the end address. The Iranian government wouldn't
be able to monitor Iranian dissidents traffic since the data on the path in Iran
is encrypted. However, Iran could and has blocked Tor traffic
itself.
\subsubsection{Did The Tor Project consider the release of the Tor patch?}
At this point we can examine the consideration The Tor Project's made for the
release of Tor 0.2.2.33 and 0.2.3.4-alpha. There was little to no data found on
a consideration to release this specific patch. The next best thing we
can do is to infer a consideration of this patch by looking at information that
plausibly would factor into the consideration of releasing this software. To do
this we shall look at the technical and social topics surrounding this release
that could have impacted the decision process of release.
\paragraph{Quality}
The Tor Project takes Tor and the Tor network very seriously and critically.
They openly admit that their software is not perfect by any means. Despite this,
there have been considerable amounts of academic and government research on
anonymity networks and revision of the Tor project.\cite{Tor:ResearchPaper}
Tor's source code and design documents are fully open to the public to review
and scrutinize, it is even stated on The Tor Project's `Research Ideas'
web-page that, ``we need people to attack the system, quantify defenses, etc.''\cite{
Tor:ResearchIdeas, Tor:2011} Since open source code and design documents
might not be enough they provide a growing repository of tools to take metrics
and attack the Tor network.\cite{Tor:ResearchHome}
It appears that The Tor Project does its best to meet this definition of
security for their users.
\paragraph{Tor Is Blocked}
On September 14th, 2011 the Iranian government added a filter to their firewall
that blocked Tor traffic. They were able to do this by checking Tor's expiration
time of SSL\footnote{SSL (Secure Socket Layer) - Is a cryptographic protocol to
hide information.} session certificates\footnote{Session certificate is a
means of authenticating an SSL connection.}. This was possible because at the
time, Tor's SSL session certificates were set to expire after two hours where normal SSL
certificates would usually last a year or longer. For a short period of time this
effectively blocked Iranian dissidents who used Tor from receiving its benefits
of an uncensored Internet.\cite{IranBlocksTorSameDayFix}
\paragraph{The Patch}
The Tor Project was able to fix this within the same day by changing the
certificates to have a, ``larger expiration time ..., so our certs have more
plausible expiry times.''\cite{IranBlocksTorSameDayFix} \footnote{There appeared to be
nothing written about considering technical and social issues specifically
related to the release of Tor 0.2.2.33 and 0.2.3.4-alpha.} However it was
implied in the blog post \textit{Iran blocks Tor; Tor releases same-day fix}
that the patch was a simple fix.\cite{IranBlocksTorSameDayFix} From this it
would be fair to assume that this change in the software did not drastically
change the robustness of the software from the prior version and therefore did
not put any Iranian dissident users in any new danger.
\paragraph{Social Issues}
With the Iranian government killing, jailing, and generally harassing Iranian
dissidents, it is a good idea that Iranian dissidents make it as hard as
possible to prevent themselves from falling subject to the regime of their
government. Tor, while not perfect, does its best to give its users the benefit
of anonymity and an uncensored Internet. It is not unreasonable to conclude that
The Tor Project believes that Iranian dissidents are better off using The Tor
Project's software than not to use any anonymity software at all. In regards to
the release of the patch, it was probably logical to The Tor Project that the
software be patched as timely as possible and released for use.
\paragraph{Consideration}
From what we have established, it is fair to say that we can infer an
approximate idea of what The Tor Project was considering during this patch.
Since the Tor patch was considered a minimal change to the current robust code
base, there was little to no fear about the update patch causing a negative
technical issue and resulting in diminished access to the uncensored Internet.
In regards to the social issues possibly preventing the release of the patch,
The Tor Project felt that Iranian dissidents would be better off with the
release of the patch.
\subsubsection{Was Tor ethical under SE Code 1.07?}
As we examined the research questions under our domain specific SE Code tenet
1.07 we focused on two questions, ``how did Tor circumvented Iran's firewall?''
and ``how did the Tor software patch affect uncensored Internet access?'' to
determine whether Tor was ethical. In regards to our first question Tor
circumvented Iran's oppressive censoring by a passive means. Tor didn't actively
destroy any equipment or software, Iranian dissident users actively choose to
use it and Tor enabled them to bypass the firewall. In regards to our second
question we inferred that The Tor Project considered the release of Tor because
it acknowledged, considered, and felt that the release of the Tor bettered the
social issues in Iran and did not risk any technical issues. Given all of this
The Tor Project was ethical under SE Code 1.07.
\subsection{SE Code 3.03}
Now that we have determined that The Tor Project was ethical under SE Code 1.07
in considering the release upgrade of Tor we should examine to see if Tor
addresses issues in Iran relevant to its purpose of existing. The tenet of the
SE code that would best allow us to examine if Tor addresses issues that
surround its use would be tenet 3.03. It states
\newline
\begin{center}
\fbox{
\parbox{0.8\linewidth}{
3.03. ... Address \textbf{ethical}, \textbf{economic}, (and)
\textbf{cultural}, ... issues related to \textbf{work projects}.
\cite{SE:CodeOfEthics}
}}
\end{center}
\smallskip
To bring this ethical argument into the domain of The Tor Project aiding Iranian
dissidents, a few modifications to the code need to be made. The
\textbf{ethical} issue in this case is the issue of \textbf{freedom of
expression}. The \textbf{economic} issues in this case is the issue of
\textbf{Tor software's financial cost} (i.e. the financial cost on the users of
the software). The \textbf{cultural} issues in this case is referring to
\textbf{Iran's oppression of online dissidents}. The phrase \textbf{work
projects} in this case refers to \textbf{Tor software}.
\subsubsection{Applying SE Code 3.03 to The Tor Project}
Now that we have taken SE Code 1.07 and brought it into the domain of the
research questions we can construct the modified SE Code.
\newline
\begin{center}
\fbox{
\parbox{0.8\linewidth}{
3.03. ... Address \textbf{freedom of expression},
\textbf{Tor's financial cost}, (and) \textbf{Iran's oppression of dissidents},
... issues related to \textbf{Tor software}.
\cite{SE:CodeOfEthics}
}}
\end{center}
\smallskip
For us to effectively analyze the domain of our research question using our modified
SE Code we need examine specific topics as as points of analysis. First, what
is the state of freedom of expression in Iran? Second, does Tor software
promote freedom of expression in Iran? Third, what is the financial cost for
Tor users? Fourth, what is the state of physical oppression of Iranian
dissidents? Fifth, does Tor software mitigate Iran's physical oppression of
Iranian dissidents?
Lastly, is Tor ethical under SE code 3.03?
\subsubsection{What is the state of Freedom of Expression in Iran?}
Before we investigate whether Tor addresses freedom of expression in Iran we need
to examine what the current sate of freedom of expression is in Iran.
\paragraph{Freedom of Expression Definition}
For analysis of this paper we will need define `freedom of expression' somewhat
broadly. It will be synonymous with freedom of expression, speech, opinion, and
press. This needs to be the case because of the nature that the Internet,
social networks and blogs have played in this case. The foundation of this
redefinition of `freedom of expression' will be used from a paper titled `The
Complex Road to Happiness' which correlates the freedom of press with and
happiness index of countries, its definition of free press is
\begin{quotation}
``A free press is defined not only by the media's freedom to say what they want
but also by media consumers' freedom to get the information they need.''\cite{
PublicAttitudeTowardFreedomPress, ComplexRoadToHappiness}
\end{quotation}
In addition, we need note that the terms `media' and `media consumers' from the
quote above in our case need to include the people who post content and read
content from blogs, Twitter, social networks, and other forms of communication
online since the importance of these forms of medium have played in Iran but in
addition to that for example Twitter with applied algorithms has been to show
accurate news events. \cite{Twitter:BreakingNewsDetection,
Twitter:IdentificationLiveEvents, Twitter:MeasuringInfluence}
\paragraph{Universal Declaration of Human Rights}
We should examine Iran's relationship to the United Nations to temper our
analysis of their actions in how they censor their citizens.
Iran is and has been a member of the United Nations since 1945.
\cite{UN:IranBecameMember, UN:IranActiveMember} Under the United Nations
\textit{The
Universal Declaration of Human Rights}, it states that ``Member States\footnote{Member
States are countries that are members of the United Nations}
have pledged themselves to achieve, in co-operation with the United Nations, the
promotion of universal respect for and observance of human rights and
fundamental freedoms.''\cite{UniversalDeclerationOfHumanRights}. It appears
that, under this pledge Member States should strive to uphold `The Universal
Declaration of Human Rights' preamble and articles. Article 19 states
\begin{quotation}
``Everyone has the right to freedom of opinion and expression;
this right include freedom to hold opinions without interference and to seek,
receive and impart information and ideas through any media and regardless of
frontiers.''\cite{UniversalDeclerationOfHumanRights}
\end{quotation}
Now that we have established the fact Iran has agreed to uphold Article 19
from \textit{The Universal Declaration of Human Rights} this should mean that
their actions should comply with this article. They should be promoting freedom
of speech and opinion, otherwise they would be contradicting the ethical system
by which they agreed to comply with.
\paragraph{Iranian Government's Internet Censorship}
At this point we should examine censorship of Iranian government and highlight
how it impacts freedom of expression in Iran. As examined before we defined
freedom of expression to include those who publish information and those
who try to read that published information. This definition is important
because the nature of press and expression of what was happening in Iran was via
the Internet . We also examined how the Iranian government, by becoming a
Member State of the United Nations, agreed to comply with Article 19 of the
\textit{The Universal Declaration of Human Rights}. Now we need to see if Iran
promotes our definition of freedom of expression and complies with their
agreement of Article 19.
For us to examine and see if Iran censors its citizens we need to compare it to
what Internet access is like in other countries. In 2011, Freedom House, an
organization that is, ``an independent watchdog organization dedicated to the
expansion of freedom around the world.''\cite{FreedomHouse}, stated that Iran,
in 2011, was the least free country in the world in regards to Internet
freedom.\cite{FreedomOnNet2011, ONI:IranWorst} Given this knowledge we can say
that Iran does censor its citizens and in terms of expression of freedom as we
defined breaks its agreement with Article 19 of \textit{The Universal
Declaration of Human Rights}.
%internet police
%monitorship
%statistics on websites shutdown
%considered how bad it is
%reasons they claim they shutdown
%reasons why other people believe it is being shut down
%Iran's Firewall could be considered not to be just passive access controls on
%the Internet but active response to what is being posted and discussed on the
%Internet. Iran's Internet Police, FATA....
%current setup ability to censor and monitor, internet police that monitors
%internet uses and, case examples of censoring communications, SSL traffic,
%faceboook, youtube, and this paper - tor
\subsubsection{Does Tor promote freedom of expression?}
It is important to take note of not only the actions that are taken, or in this
case what Tor software has done and provides users, but the driving ethos behind
the project by the projects maintainers, The Tor Project.
\paragraph{Tor Projects's Ethos}
Examining the ethos of The Tor Project allows us to see if it has
intentions that try to address issues and if The Tor Project abides by its own guiding principles. The Tor
Project's ethos in, it's totality, can be seen in its \textit{Mission Statement}
as in Appendix \ref{Tor:MissionStatement}, but more succinctly from their website,
\begin{quotation}
``The Tor project is based on the belief that anonymity is not just a good
idea some of the time — it is a requirement for a free and functioning
society.''\cite{Tor:Users}
\end{quotation}
The Tor Project's ethos shows us that their guiding principle is to promote
the same freedoms that Article 19 from \textit{The Universal Declaration of Human Rights}
requests Iran to comply with and complies with the modified SE Code. Their
intentions alone are not enough to see if they promote free speech, we need to
examine if their actions adhere to their Missions Statement and the modified SE
Code.
\paragraph{Tor and Free Speech}
Tor is created such that anonymity is not just some policy but implemented by
design. This anonymity allows users to have unrestricted access to the Internet.
The other benefits of the software prevent anyone along the path to a server
from knowing the source and destination at the same time. These properties of
Tor make it a lot harder for third parties like the Iranian government to filter
and monitor network traffic of Tor users.
The Tor Project has been acknowledged and promoted for its abilities to provide
privacy and free speech by the Free Software Foundation and the Electronic
Frontier Foundation.
The Free Software Foundation (FSF), a nonprofit organization that, ``promote[s]
computer user freedom and to defend the rights of all free software
users.''\cite{FSF:About}, bestowed The Tor Project the Free Software Award of 2010
for
\begin{quotation}
``[enabling] roughly 36 million people around the world to
experience freedom of access and expression on the Internet while keeping them
in control of their privacy and anonymity. Its network has proved pivotal in
dissident movements in both Iran and more recently
Egypt.''\cite{FreeSoftwareAwards}
\end{quotation}
The Electronic Frontier Foundation (EFF), an organization that ``[confronts]
cutting-edge issues defending free speech, privacy, innovation, and consumer
rights today.''\cite{EFF:About}, has taken it upon themselves to endorse Tor.
Under an EFF article titled `Surveillance Self-Defense' lists Tor as a tool that
can help you, ``protect the confidentiality of your
communications.''\cite{EFF:Tor} The Tor network requires the participation of
members of the network to create a more usable network. The EFF created `The EFF
Tor Challenge' to help support this network by having people volunteer and
hosting a Tor relay.\cite{EFF:TorChallenge} The goal was 500 relays and as of
now 549 relays have been put up.\cite{EFF:TorChallenge}
Tor, with its anonymity by design and support from organizations like the EFF
and the FSF, allow for Iranian dissidents to communicate freely. Tor removes the restrictions
that the Iranian government's firewall imposes and allows users to freely access
any website. Tor also removes the ability of the Iranian government to monitor
users, thus allowing them to freely associate and communicate with whom they
wish.
\subsubsection{What is the financial cost of Tor?}
We should examine the financial costs of Tor not only in the direct cost of the
software but it's indirect costs by being open-source.\footnote{This section
will only examine a topical and broad analysis of financial issues regarding
Iranian dissidents since a full analysis of the financial state of the average
Iranian dissident and those who use Tor probably could be an entire paper in it
itself.}
\paragraph{Tor in Regards to Beer}
To download and use Tor and the Tor network does not cost the user anything. By
making Tor free it does not discriminate on those who can `use' and those who
`cannot use' the software.
It is fair to assume that some dissidents in Iran may not have had the money to
afford Tor if did cost anything. With Tor financial barrier removed and the
possible legitimate concerns of Iranian dissidents who may not be able to afford
Tor with a price, this maximizes the number of dissidents using Tor.
\paragraph{Tor in Regards to Speech}
Tor is `open source', which means anyone can ``[redistribute] and use in source
and binary forms, with or without modification, [is] permitted provided that''
Tor's 3-clause BSD license conditions are met.\footnote{Tor's full license can
be found in Appendix \ref{Tor:License}} \cite{BSD:3-ClauseLicense,
TOR:Download, TOR:BSD-License}
By Tor being distributed as `open source' source code enable some inherent
qualities. It allows the source code for open review, which allows for anyone to
check for design or implementation flaws in the source code. In regards to this
case it allows Iranian dissidents to directly or by proxy check for flaws in
code so they can trust that Tor actually provides anonymity from the Iranian
government when they use Tor. This freedom also allows for anyone to modify the
code to the Tor Project, making it possible to modify the code to meet specific
or local issues. For Iranian dissidents this means that if there was unique
censorship tools or modifications to the Internet within Iran they would have a
code base to operate from to modify the code to their local issue. Indirectly,
Tor being `open source' makes it financially beneficial to Iranian dissidents.
\subsubsection{What is the State of Physical Oppression of Dissidents?}
Before we investigate whether Tor addresses physical oppression of dissidents in
Iran, we need to examine what the current sate of physical oppression
is.\footnote{We will begin examining Iran's state of oppression with the beginning
of protests in response to Iran's 2009 presidential elections because this
appears origin of what is relevant to this paper.}
\paragraph{Death}
``Why is it that in our country political prisoners go to jail vertically but return
horizontally?'', Iranian Member of Parliament, Ahmed Bakhshayes, asked the Iranian Parliament on
November 14, 2012.\cite{IranBloggersDeath} The Iranian government has been
responding to political dissidence by putting people to death. In the past ten
years at least eighteen people have died while imprisoned by the Iranian
government, including the Iranian-Canadian photographer Zahra Kazemi, student
activist Amir Javadifar, a journalist Hoda Saber, and most recently a 35 year
old blogger, Sattar Beheshti. \cite{IranBloggersDeath}
%specific blogger killed
%addressed other bloggers jailed and killed
\subsubsection{Does Tor software mitigate Iran's physical oppression of
Iranian dissidents?}
Let us call a spade a spade, Tor is not a `silver bullet' for the physical
oppression going on in Iran. It however does have privacy by design. This does
make it much more challenging for the Iranian government to censor and monitor
Iranian dissidents. By Tor empowering Iranian dissidents to communicate in
privacy and journal events and opinions of Iranian current affairs, it prevents
the Iranian government from correlating the vocalized opinions it disagrees with
and revealing who are saying them. This veil of secrecy is what indirectly helps
Iranian dissidents from physical oppression.
\subsubsection{Was Tor ethical under SE code 3.03?}
Now that we have addressed all the focal points of analysis, did Tor address
freedom of expression, financial costs, and physical oppression of dissidents?
In regards to freedom of expression, the Tor Project's ethos is the driving force
behind Tor which strives and effectively promotes free speech around the world.
Relating to financial costs, Tor is open source and free which not only prevents
anyone from immediate use due to financial issues but it provides a groundwork
for future development and intellectual capital that Iranian dissidents can
utilize if needed. Lastly Tor's privacy by design, while it does not guarantee
Iranian dissidents from physical oppression, gives a strong barrier of protection
between them and the Iranian government. Through examining all of the questions
as focus points for analysis of tenet 3.03 of the SE Code, Tor has addressed,
freedom of oppresion, financial cost, and physical oppression related to Tor
software in Iran. Because of this Tor was ethical under SE code 3.03.
%%%%%%%%%%%%%%%%%%
%%% Conclusion %%%
%%%%%%%%%%%%%%%%%%
\section{Conclusion}
The Tor Project's consideration of the the release of the Tor patch and Tor
providing free and transparent means of private and uncensored Internet access
has aided Iranian dissidents. The Tor Project and Tor have been seen to be
ethical under both tenet 3.03 and 1.07 of the SE Code. Tor and The Tor Project
provides a means to an end for Iranian dissidents in obtaining the private
communications they desire. Roger Dingledine, a Project Leader, Director, and
Research for The Tor Project\cite{Tor:CorePeople}, during a talk about Tor last
year stated that, ``it should not be up to me how [Iran] \footnote{This quote
originally said China however it could apply to any country so it was changed
to fit the domain of this paper.} changes, we write tools to let people all
around the world change the world in the way they think their world needs to
change.'' \cite{Tor:28c3} Under both of these tenets of the SE Code, we can
conclude that The Tor Project and Tor was as ethical in releasing a same day
patch enabling Iranians to bypass Iran's firewall when the government
explicitly filtered Tor traffic starting September 14, 2011, under the SE
Code of ethics.
\section{Acknowledgements}
The author is grateful for the help received from Jake Tobin and K.T. Nelson.
Jake Tobin helped the author architect, and edit the paper. K.T. helped to edit
and refine the paper.
%end the two column format
\end{multicols} \newpage
\appendix
\section{Basics of How Tor Works}
\label{Tor:HowTorWorks}
This was an excerpt from Tor's \textit{Overview} web-page.\cite{Tor:Overview}
\begin{center}
\includegraphics[natwidth=510bp,natheight=326bp,width= 0.7\linewidth]{appendix/htw1.png}
\end{center}
\verbatiminput{appendix/htw1.txt}
\begin{center}
\includegraphics[natwidth=510bp,natheight=326bp,width= 0.7\linewidth]{appendix/htw2.png}
\end{center}
\verbatiminput{appendix/htw2.txt}
\begin{center}
\includegraphics[natwidth=510bp,natheight=326bp,width= 0.7\linewidth]{appendix/htw3.png}
\end{center}
\section{The Tor Project's Mission Statement}
\label{Tor:MissionStatement}
This is The Tor Project's mission statement from their \textit{Sponsorsship}
web-page.\cite{TOR:Sponsorship}
\verbatiminput{appendix/mission-statement.txt}
\section{Tor's License}
This is the software license for Tor.\cite{TOR:BSD-License}
\label{Tor:License}
\verbatiminput{appendix/TOR-LICENSE.txt}
\newpage
%cite all the references from the bibtex you haven't explicitly cited
\nocite{*}
\bibliographystyle{IEEEannot}
\bibliography{texreport}
\end{document}