Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract:
Tunisia was the first Arab and African country to connect to Internet in 1992[1]. It
presents one of the advanced telecoms, broadband markets and use of ICT in the area.
The country is experiencing many reforms in telecommunication right after the
revolution that emerged in the beginning of January 2011. People protested for more
rights and freedom of speech, which was almost nonexistent. Our interest is on the
Internet censorship that dictator Zine El-Abidine was using especially by filtering many
contents online. This paper will cover an overview about the telecom infrastructure in
Tunisia and the technical parts that the government was using for filtering and monitoring
as well as the techniques used by Tunisians to overcome the censorship. On the other
part, we will switch gears and explain the role that is and will play the Internet Exchange
Point TunIXP. Before the revolution, ATI, the Tunisian Internet Agency was wrongly
considered for years as an Internet regulatory authority and was acting as a surveillance
machine. After the revolution, ATI turned off its censorship history and started its
transformation into a real IXP with regards to the international best practices. We will
discuss also what are the future economical challenges that this IXP will be achieving.
Outline:
1. Introduction
a. Why Tunisia
2. The Tunisian ecosystem
a. Timeline and background
b. Domestic and international connectivity
3. Censorship before the Tunisian revolution
a. Filtering Techniques used by the government
b. Proxy servers
c. Tor usage
d. MIAB Protocols
4. Introduction of TunIXP
a. What is an Internet Exchange Point
b. Benefits to Tunisia as an emerging market
5. Conclusion
1. Introduction
In this introduction, some of the reasons will be presented to justify the choice of
Tunisia as the main subject of this paper. First of all, Tunisia is a great example
for our as a model of countries that switched from a complete oppressing and
Internet censorship to a country where freedom of Speech is preserved. Second,
Tunisia gave birth to the Arab spring through its Tunisian Revolution in January
2011. It was fueled by the use of social medias where the protests were being
organized and supported through online networks (The use was mainly on Twitter
and Facebook since other social networks, video-sharing and blogs such as
Youtube, Dailymotion, Amnesty International website..). The main reasons of
these insurrections were seeking for more freedom of speech as well as the high
rate of unemployment. Third, Tunisia has one of the most advanced ICT
infrastructures in Africa. The World Economic Forum ranked the country 50th in
2011 in term of global ICT competitiveness and 2nd behind the United Arab
Emirates in the MENA region[2]. The information revolution offers Africa a
dramatic opportunity to leapfrog into the future, breaking out of decades of
stagnation or decline. Fourth, Information communication technology sector
might be a solution for the economical challenges that encounter the country and
especially for solving unemployment problems. Internet businesses are cheap; the
perfect fit for a country with lots of human capital and very little cash. Some
projects are thinking about transforming Tunisia to an India for French-speaking
countries. Tunisia aims to become an internationally competitive player in the
global market in term of ICT industry. [3]
lunched (we will talk further in this paper for the reason of this political decision). In the
same year, ATI hosted an L-root DNS Server, one of the thirteen root name servers
operated by ICANN. [6]
-Graph showing the International and domestic connectivity of Internet in Tunisia [5] .
part, we will try to highlight the technique used by the government in censorship and the
techniques used by Internet users to overcome it.
message in videos on Youtube for example, "Ammar 404", like it was called by most
activist, was blocking access to the website rather than re-encoding every video which
takes a high toll of computation. Furthermore, Tunisian were using separate surveillance
infrastructure providing my many multinational companies like the German Ultimaco,
Nokia Siemens Networks, Trovicor, ETI (a subsidiary of BAE Systems) and NetApp.
Tunisia was used as a "test bed" for these different companies in terms of censorship and
surveillance technologies. Like presented by the actual ATI CEO Moez Chakchouk, the
previous regime was giving substantial discount to these corporations in order to "try out"
their technologies on a large scale. Lets look for the techniques used by Internet users in
order to bypass censorship.
b. Proxy Servers
In 2010, a report from Harvards Center for Internet & Society[14] shows that 7 of
the 11 tools with at least 250,000 unique monthly users are simple web proxies. One of
the easiest techniques that were used by Tunisian Internet users to overcome censorship
is to use the available web proxies online which did the government not blacklist. A web
proxy is a server-side application accessed through the web. It plays the role as an
intermediate for the client requests. It refers to the seventh layer of the OSI reference
model (Application layer) as opposite to the Network Address Translation (NAT) part of
the third layer of the OSI reference model which is a technique of modifying network
address information in the IP datagram packet headers while transiting across the network
in order to remap one IP address into another.
Illustrated concept of a proxy server. A client ("Alice") asks a computer running a service
("Bob") for the current time, using a proxy server as an intermediary.
c. Tor Usage:
One of the highly used techniques for online anonymity in the oppressive
countries is the use of the tor routers. Tor users in Tunisia were increasing before the
upraising of January [15][16], the usage was never been very high during the last months
before the revolution when a lot of activists like Slim Amamou[17] where arrested and the
need of using anonymous network in order to share content of protests in the social
medias without being under surveillance by the government.
This is graph of Tor clients directly connecting to the rest of the network[15]
Tor stands for the The Onion Router". At the US Navy research
Laboratory, Paul Syverson created it build on the work of the cryptographer David
Chaum. A user wants to visit a website but they doesnt want to reveal their IP address.
As they send the request, three layer of encryption are placed around it like the layers of
an onion. The message is then sent through a series of computers, which had volunteered
to act as relay points. As the message passes from computer to computer, a layer of
encryption is removed. Each time is removed. All the relay computers can see is an order,
which tells it to pass the message on. A final computer relay decrypts the innermost layer
of encryption, revealing the content of communication. Thus, the identity of the user is
always hidden.[18]
However, in most of the censoring countries like Tunisia as well as in China or Iran,
governments are used to know Tor IP addresses and blocked them.[19] This make the use
of Tor not being possible, user can even be identified as Tor users. To overcome this
problem, Internet users deal with Tor bridges, or also called Tor bridge relays which are
an alternative entry points to the Tor network that are not all listed publicly. Using a
bridge makes it harder, but not impossible, for the ATI, or any ISP to identify the use of
Tor.
This is a graph of Tor clients connecting through bridges to the rest of the network[16]
Nawaat.org, an independent collective blog founded by a set of activist and
journalists lunched an anonymous whistleblowing platform in order to support
transparency and corruption. The platform was evolving multiple open source
applications and techniques based on the GlobaLeaks platform and Tor technology which
protects the senders and the team working in the website from being identified. Also,
Sami Ben Gharbia, one of the co-founders of Nawaat.org, founded TuniLeaks, as an
exclusive Tunisian Wikileaks, where he published to public all cables issued from the
local US Embassy and the reveals its exchanges with the US Department of State about
the corruption of Tunisia's President's family. The website was rapidly blocked by the
government by its domain name (tunileaks.appspot.com without the https) then blocked
the Google App Engine's IP Address (209.85.229.141) in order to block Tunileaks under
https as well. [20] Now, after the end of censorship, the ATI, the agency responsible in
d. MIAB Protocol:
Other ways of communicating and bypassing censorship exists. The method presented is
a method that allows a given person Alice who lives in a country ruler by an oppressive
regime to communicate confidentially with a second person Bob who lives in another
country. This method is called Message In A Bottle (MIAB).[21] Alice does not need to
know any information, but Bobs public key. In MIAB, Alice will prepare a message for
Bob and encrypt it with his public key. This ciphertext will be steganographically
embedded in some digital photos. Steganography is the art and science of hiding
information by embedding messages within other. Bob is monitoring some of the ping
servers, looking for steganographic content encrypted with his public
A blog ping is a message sent from a blog to a centralized network service (a ping server)
to notify the server of new or updated content. Search engines use blog pings to
efficiently index new content in real time. The graph below illustrates better the concept.
4. Introduction of TunIXP:
For many years and after its creation in 1996, ATI was wrongly acting as a censorship
machine instead of being used as an organization for Internet development in Tunisia.
Right after the Tunisian Upraising in 2011, ATI turned off its dark surveillance and
censorship history and reformed its whole structure. In 2013, it operated TunIXP
(AS37551), the first Tunisian Internet Exchange Point in the region. It provides IP
connectivity to ISP, operators and data centers. [22]
This is a graph is explaining architecture of Internet using IXPs (seen in purple here)
These static caches can be hosted in the exchange point. Furthermore, thanks to all these
services, IXPs will create a more robuste and independant infrastructure that may
encourage creating new employment opportunities like experienced Argentina and Kenya
because local developers were having more ability to create their local contents and
contribute in business continuity. [26]
5. Conclusion
This paper presented a model of countries that experienced a change in the Internet
infrastructure model and focused especially on the political choices to switch from using
Internet infrastructure for online surveillance to using it for the growth of the local
economy. We presented the Tunisian ecosystem as well as the situation before and after
the Tunisian revolution in January 2011.
References:
1. Kilani, Fatma Fekih-Ahmed, The role of IT for societal transformation towards
democracy, in Electronics Goes Green 2012+ (EGG), September 9th-12th, 2012
(Berlin Germany), IEEE, Electronics Goes Green 2012+ (EGG), 2012.
2. Gelvanovska, Natalija; Rogy, Michel; Rossotto, Carlo Maria. 2014. Broadband
Networks in the Middle East and North Africa: Accelerating High-Speed Internet
Access. Washington, DC: World Bank. World Bank.
https://openknowledge.worldbank.org/handle/10986/16680 License: CC BY 3.0
IGO.
3. Aarti shahani, "Tunisia's Emerging Tech Sector Hampered By Old Policies",
Tunis, Oct 20, 2014, NPR
News retrieved from http://www.npr.org/blogs/alltechconsidered/2014/10/20/357
590073/in-tunisia-democracy-doesn-t-create-jobs retrieved November 6, 2014
18. Li, Bingdong; Erdin, Esra; Gne, Mehmet Hadi; Bebis, George; Shipley, Todd
(14 June 2011). "An Analysis of Anonymity Usage". In Domingo-Pascual, Jordi;
Shavitt, Yuval; Uhlig, Steve. Traffic Monitoring and Analysis: Third International
Workshop, TMA 2011, Vienna, Austria, April 27, 2011, Proceedings. Berlin:
Springer-Verlag. pp. 113116. ISBN 978-3-642-20304-6. Retrieved 6 August
2012.
19. Zittrain, Jonathan and Edelman, Benjamin G., Internet Filtering in China. IEEE
Internet Computing, March/April 2003. Available at
SSRN: http://ssrn.com/abstract=399920 or http://dx.doi.org/10.2139/ssrn.399920
20. Sami Ben Gharbia, March 27, 2014, Nawaat Annonces a special website and
secure for leaking secret files (Arabic Language Only)
http://nawaat.org/portail/2014/03/27/
- / (Arabic Language only) retrieved November 20,
2014
21. Luca Invernizzi, Christopher Kruegel, Giovanni Vigna, "Message in a bottle:
sailing past censorship" in ACSAC 13, Proceedings of the 29th Annual Computer
Security Applications Conference, (New York, USA, 2013), ACM, Pages 39-48
22. TunIXP quick facts, retrieved from http://www.ati.tn/TunIXP/, retrieved in
November 6th, 2014
23. Martin J.Levy, Global view of internet Peering, internet peering from a global
networks point of view, Tunisia IXP Workshop (Tunis, 29th-30th April 2013),
Hurricane Electric
24. Mike Jensen, Promoting the use of internet Exchange points, a guide to policy,
management and technical issues, May 14th 2009, Internet Society, P6
25. tristian Dreisbach, New Internet Infrastructure to lower costs and improve
service, May 3, 2013,
http://www.tunisia-live.net/2013/05/03/new-internetinfrastructure-to-lower-costs-and-improve-service/, accessed November 30, 2014
26. Michael Kende, Charles Hurpy, Assessment of impact of Internet Exchange
Points - empirical study of Kenya and Nigeria, April 2012, Internet Society, Ref:
20945-144