Internet filters are software tools that can help monitor web content viewed on a particular computer or network. In the case of family safety settings, Internet filters can also help parents manage who kids can communicate with or how long kids can use the computer. Internet filter is a software solution, commonly known as a content-filtering solution or web filtering solution that is designed and configured to make decisions on the type of the sites and content on those sites the users are allowed to visit. The content filtering device decides on what content should be made available to the user and what shouldn't be. The reason to have such a solution is basically to have a kind of internet censorship on the users using a particular system where the software is installed. Initially these kinds of solutions were normally used in home environments where the parents would like to have control on the content available to their children while they are browsing the Internet. Basically to keep the children away from pornography, violence, terrorism, etc.
Later on the internet filtering took on a whole new leap and was realized to have potential for corporate internet control and later on even country level internet control. Organization around the world saw the benefits of internet control as a way of limiting the sites that users can navigate to during their work hours. This served the dual purpose of preventing the employees from wasting their work time on entertainment and personal work and protection of the corporate network from the malicious content that the users might visit accidentally while browsing the web.
The internet filtering tool a whole new censorship meaning when countries across the world started adopting the filtering technology at the ISP level and at the internet perimeter of the country to block certain unwanted sites. A good example would be the blocking of pornographic sites in some countries where it is considered illegal to view such content.
For many years the Brethren have warned us of the dangers that accompany the Internet, and have counseled us to employ some technological barriers to the unending flow of filth that permeates the otherwise wonderful and extremely useful virtual world of the Internet. Recall President Hinckley’s warning in 2002, when he said: “Guard your homes. How foolish it seems to install bars and bolts and electronic devices against thieves and molesters while more insidious intruders stealthily enter and despoil”, or more recently when Elder Oaks told us in April conference, 2005: “We must also act to protect those we love. Parents install alarms to warn if their household is threatened by smoke or carbon monoxide. We should also install protections against spiritual threats, protections like filters on Internet connections.”
A common question that arises is whether Internet filters really work. The answer depends on what you are attempting to accomplish with the filter. If you are attempting to prevent accidental access to inappropriate content, then most filters can be considered successful.
Many filters also have other features, such as time controls, chat logging, reporting and other useful capabilities. All of these features help keep our family safe, and help provide us with more information regarding how our computers are being used. From this perspective, it would be safe to say that filters work.
One of the unfortunate side-effects of installing a filter is the false sense of security that it provides. Most teenagers can get around just about any filter if they really want to, and parents need to know how this is done so they can watch for the warning signs. Also be sure to use the tools that the filter provides, such as usage reports, blocked site reports, etc. A filter is not a silver bullet, and it is not a set-it-and-forget-it solution.
Increasing individual accountability is one of the most effective ways of filtering content. It is a good practice to place the computer in a public place, and to limit the use of the Internet to times that others are around. Windows Vista/7 and Mac OS X offer time limits on internet access, as do most filters. Many home routers now also offer availability schedules for protecting non-computer devices.
The only foolproof filter is, as President Faust once explained, the personal moral filter: "As the traffic on the communications highway becomes a parking lot, we must depend more and more on our own personal moral filters to separate the good from the bad."
There are various kinds of filtering techniques that are employed:Through this technique software is installed on the system by the administrator and rules are configured according to the needs of the administrator.
Now when the normal users try to browse internet and the browsing activity is in violence of the rules that have been set by the administrator, the content will be blocked and the user shall not be able to view it.
This methodology is normally adopted by companies and organizations at the gateway level. The company can install a hardware or a software that is capable filtering traffic at the gateway level and rules would be configured that will apply to all the users inside the company network.
Many internet service providers now days are providing such a service at some additional cost along with the internet link.
The companies and organization who do not wish to invest in their own gateway level content filtering device can go for this option and notify the ISP of their content filtering conditions. Based on those conditions, the ISP would filter the traffic at the ISP level itself.
Content filtering is also done at browser level as well, but this methodology is not as effective as the other three options. The reason is that users can change the browser settings and by pass the filtering that has been set through the browser.
Client-side filtering is installed directly onto the PC like any other software program. From there, it monitors Internet activity, blocking inappropriate content. Both home users and businesses can use client-side Internet filtering. Server-side filtering typically resides on the company server, controlling access for all connected computers. BusinessFilters.com warns that server-side filtering isn't very customization making a client-side solution more viable. While both may utilize the same blocking or filtering tactics, client-side software typically has more customization, a broader feature set and more frequent updates.
Blacklist filtering, according to Geeks.com, is one of the more popular methods, because of its ease of use. This type of software requires the parent or administrator to manually enter websites deemed inappropriate. After the website is recorded by the software, further access will be denied. White-list filters use the same principle, just in reverse. This much-stricter method requires the parent or administrator to specify websites that can be accessed instead of ones that can't. In other words, this method filters out the majority of the Internet, allowing access only to specifically pre-determined websites.
Keyword and content filtering software takes a similar approach to black and white-list filters, only filtering out websites with specific words or pre-defined content. For example, a home Internet filter might offer to filter out pornographic content. The software will then try to determine, through the words used on the site and previously data-based information, whether a specific site is pornographic. If so, the user will be denied. According to Geeks.com, this method is often ineffective, because it tends to block legitimate websites misinterpreted as inappropriate. Conversely, if the keyword or content filter is set too low, it may allow unwanted content through, unable to recognize the site for what it is.
While both client- and server-side Internet filtering are two different types, within those types there are methods that specify just how the software goes about filtering content. Understand the methods, such as blacklisting filters and keyword filters, is important to making an informed decision about what to buy. In other words, knowing whether a filter is client- or server-based isn't enough. You should also find out the method used and evaluate whether that's the right method for your family or company.
In Australia internet filtering has only recently been discussed as being implemented by the Australian Government (Foo, 2008). Whilst Australia at the time of writing does not have a national internet filtering policy, parents were able to filter the internet in their own homes using software subsidized by the Australian Government. Foo (2008) quotes Senator Conroy who stated, "With less than 150,000 filters accessed or downloaded and only 20 per cent of these still in use, the program has clearly failed.". This failure of parents to filter the internet in their homes is outside of the scope of this paper but the lack of uptake and continued usage shows that filtering of undesirable content is not being implemented on an individual level.
Filtering in the form that the Australian Government was considering is one of the first that can be considered a democratic decision of the people to implement filtering. (Bambauer, 2008) The Australian filtering program is unique due to it being part of an election campaign policy. Thus filtering can be implemented by law rather than using informal pressure on internet providers as in the United Kingdom. (ibid) Since obtaining government the scope of the filtering program has changed from unlawful material being filtered to also incorporating content that is considered unlawful. (ibid) It is the broadening of the scope that has drawn interest and raises concerns on what is considered filtering and when the filtering constitutes censorship.
Depken (2006) comes to a conclusion that,
"..those with kids, who are married, who are older, who use the internet for religious content, who work in the public sector, and who think pornography or privacy are the predominant issue concerning the Internet tend to favor Internet censorship."
Whilst this conclusion is true not all people fall into the categories mentioned thus demonstrating that not all people are in favor of censorship. Australia is one of the first Western countries to formally and legally implement internet filtering nationally, whilst claiming to protecting their citizens from inappropriate content. The writings have not been conclusive in determining if all filtering is censorship. The Australian model demonstrates the lack of distinction between filtering and possible crossing into censorship due to policy forming part of an election campaign in a democratic election without a clearly defined agenda. The issues of when a country protecting content crossing borders should be allowed but government but is a free manner with defined courses of request for access. In the case of Australia, the government does have the right to filter the internet but the way in which filtering is implemented must be carefully done with openness so it cannot be constituted as censorship.
Internet censorship in the People's Republic of China is conducted under a wide variety of laws and administrative regulations. There are no specific laws or regulations which the censorship follows. In accordance with these laws, more than sixty Internet regulations have been made by the People's Republic of China (PRC) government, and censorship systems are vigorously implemented by provincial branches of state-owned ISP s, business companies, and organizations.
The censorship is not applied in Hong Kong and Macau, as they are special entities recognized by international treaty vested with independent judicial power and not subject to most laws of the PRC,including those requiring the restriction of free flow of information.
China started its Internet censorship with three regulations issued by China’s central government. The first regulation was called the Temporary Regulation for the Management of Computer Information Network International Connection. The regulation was passed in the 42nd Standing Convention of the State Council on 23 January 1996. It was formally announced on 1 February 1996, and updated again on the 20th of May 1997.
The content of the first regulation states, “No units or individuals are allowed to establish direct international connection by themselves.” (Item 6) “All direct linkage with the Internet must go through China-net GBNet, CERNET or CSTNET. A license is required for anyone to provide Internet access to users.” (Item 8) The second regulation was the Ordinance for Security Protection of Computer Information Systems. It was issued on February 18th of 1994 by the State Council to give the responsibility of Internet security protection to the Ministry of Public Security, which is entitled to “supervise, inspect and guide the security protection work”, and to “investigate and prosecute illegal criminal cases” (Item 17)
The Ordinance regulation further led to the Security Management Procedures in Internet Accessing issued by the Ministry of Public Security in December 1997. The regulation defines "harmful information" and further lists five kinds of harmful activities regarding Internet usage, “ (1) Intruding in a computer information network or making use of network resources without authorization; (2) Canceling, altering or adding functions in a computer information network without authorization; (3) Canceling, altering or adding data and application software for the purpose of memory, processing, or transmission in a computer information network without authorization; (4) Intentionally producing, disseminating destructive software such as a computer virus; (5) Other activities that are harmful to the security of a computer information network.” (Item 6)
An intelligence agency in a report submitted to the home ministry suggested that the government should monitor activities on social networking such as Facebook and Twitter round-the-clock 'so that any evil axis cannot hatch conspiracies by launching campaigns against the government on the sites.'
Evaluating the recent unrest in the Arab world and Middle East countries, the agency put forth a number of suggestions in the report 'Analysis of the impact of the political crisis in Arab world on social and political situation of Bangladesh.' The hoe ministry sent to report to other ministries on May 22.
The report analyzed the use of information technology in Egypt's upheaval which became popular as 'generation text' and it warned the government of such a situation and suggested the round-the-clock monitoring of Facebook and Twitter 'so that no evil axis can hatch conspiracies by campaigning against the government.'
The report also made some suggestions on local issues which could trigger public unrest such as managing traffic congestion by making roads off-limit to rickshaws and evicting hawkers from footpaths.
It also emphasized making warm the relations with Middle Eastern counties so that the market of Bangladeshi manpower remains stable.
Senior home ministry officials said the copies of the report had been sent to ministries of food, energy, expatriates' welfare and communications.
At a meeting of the cabinet committee on law and order on January 26, intelligence agencies also suggested that the government should monitor web contents. The suggestion was made after several incidents of violence in the Chittagong Hill Tracts.
Earlier on May 30, 2010, Bangladesh blocked access to Facebook after satirical images of the Prophet Muhammad and the country's leaders were posted online.
The intelligence agency suggested that the government should mobilize public opinion against the opposition's possible attempt of evil politics centering on price spiral and the shortage of gas, power and water. The agency also called for creating a good relation with newspapers and the electronic media.
The report also stressed the need for a single spokesperson for the government to limit scopes for misinterpretation of the government's position.
In the wake of uprising in the Middle East, the agency called for ensuring energy security by exploring petroleum and modernizing energy production and distribution and by importing petroleum from countries outside the Middle East and OPEC members.
The report also suggested that the government should arrange employment of expatriate workers who were forced to return home for the turmoil in the Middle East and other countries.
Internet Filtering Product Guide Schools' and parents' concerns about safe surfing have created a market for products that allow Internet users to control the kind of content they receive on their computers. These various filtering solutions all deny access to a manually created and maintained list of Web sites, called a "not" list. These products rely on vendors' keeping up with the proliferation of "not" sites and adding them to their restricted list.
The major development that has changed schools' filtering requirements is the growth of sophisticated school network infrastructures, linking hundreds or thousands of computers. Any filter that has to be downloaded, installed, and configured on each computer on a large network is not a viable solution for schools with such a network
Internet due to its free nature contains information about each and every subject that you can name. This huge bulk of information contains some inappropriate or objectionable material like pornographic content, classified information and textual or visual material that can be provocative. Research had shown that most of the crimes in developed world are linked directly or indirectly to use of internet. Watching or reading objectionable material can be extremely harmful for the health and safety of your child and loved ones and it becomes your responsibility to save them from this destructive content.
Due to the distributed nature of internet it is very difficult to totally block a website both for individuals and governments. This is where parental control features help you. Parental control refers to special features that can be added to Mobile phones, computer software, televisions, video games and other electronic devices.
This basic purpose of parental control features on these devices is to limit access to certain information, surveillance and security reasons. Almost all the high tech internet security programs such as antivirus software have the parental control feature in them.
Like Norton is an antivirus product from Symantec Corporation, it had got one of the best and advanced parental control features. Similarly other antivirus software like bit defender and kaspersky internet security have parental control features in them. Along with that, Operating systems like Windows 7, Linux, Windows Vista and Mac OSX have parental control features in them.
There are several methods of implementing these features. For example to block a website on your computer you can add that website to the blocked list of your operating system or of antivirus software. Stand alone parental control programs are also available in market. These programs are powerful enough to block any kind of website from opening on your computer.
Parental control software can even block or monitor the API in order to scrutinize internet application like web browser or chatting software. You can also protect your confidential information by using parental control software. To protect sensitive information from being displayed on internet you can add specific keywords such as passwords and pin codes to your blocked database.
The parental control software will monitor the chat window and would intervene to block the flow of information upon finding a match in the banned database. Parental control software has self protection modules and have got passwords to stop unauthorized access. On the basis of their working we can classify parental controls in four categories.
Content filters are the most popular and basic kind of parental control. Content filters simply block access to a website depending on its content. Specific websites or content phrases are stored in database of filter and upon founding a matching entry the access is blocked. Content filters can block images and even media files. Content controls can also be applied on digital televisions to limit access to certain channels.
Usage controls are more technical and sophisticated filters. They can be used in computers, televisions, automobiles and music players. You can turn your television or computer or internet off at certain time or control the volume of music player. Similarly you can control the speed of your child's car sitting miles away and know exactly where he or she is.
Computer usage monitoring tools are specifically designed for computers. They are often incorporated inside an internet security suite or an antivirus program. Stand alone versions of computer monitoring programs are also available. Such features are also available in operating systems such as windows seven, windows vista and Mac OSX. These programs are used to block websites and protect privacy and prevent leakage of confidential information.
Surveillance programs have the same capabilities as spyware. Their basic purpose is to keep record of all the activities being performed on a machine. Surveillance programs are stand alone software that can be installed on any machine. For that you have to be the legal owner of the machine or parents have the authority to monitor their kids activities, if they are aged below 18 then covertly and above that age by their consent.
Examples of surveillance programs are key loggers and monitoring tools. This software is designed to operate in stealth mode. They keep recording all the activities that are being performed on a machine and make a log file of them. This log file can be later viewed by the administrator or even can be e-mailed on his Id.
Most of the antivirus and internet security programs consider key loggers and monitoring bots as spyware, you must be legally eligible to install such software on a machine.
Either way we go, there is always going to be a downfall to censoring the Internet. If we let the government do it for us, we will not only be letting them take our first amendment rights, but also our fourth amendment rights because the internet does not stop at web pages. You will let the government see your e-mail, and go into your computer, and see what you are looking at. If they can take away our fourth amendment rights on the internet, which is to say they won't start pulling over every car, and seeing what is inside. The alternative, filtering programs are not efficient, and block too much information. The ideal way to prevent children from pornography, and not get rid of all of the information on the Internet would be the new system they are trying to organize called Platform Internet Content Selection. What this system will do is make a rating system for web pages, very similar to that of the T.V. each person in your house hold will have a user id, and based on what the administrator specifies on what ratings you can see, you will be able to see certain web sites. The only drawback is who decides what material is objectionable, but this will always be a problem. Censoring the Internet would be taking a huge step back. The Internet is full of ideas, and things we can benefit from and we should censor it.
- Overpowering the Goliath in Our Lives, President Gordon B. Hinckley, Ensign, January 2002
- 2. Pornography, Elder Dallin H. Oaks, Ensign, May 2005
- 3. The Power of Self-Mastery, President James E. Faust, Ensign, May 2000
- www.securitysupervisor.com/security-q-a/parental-control/188-what-is-internet-filter (21 July 2011)
- www.ehow.com/list_6889202_types-internet-filters.html (21 July 2011)
- www2.scholastic.com/browse/article.jsp?id=4395 (21 July 2011)
- tech.lds.org/wiki/Internet_filtering_%28Family_Safety%29 (3 August 2011)
- bdosintmonitors.blogspot.com/2011/06/internet-censorship-bangladesh.html (1 August 2011)