Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adam Senft is active.

Publication


Featured researches published by Adam Senft.


ACM Transactions on The Web | 2015

Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data

Phillipa Gill; Masashi Crete-Nishihata; Jakub Dalek; Sharon Goldberg; Adam Senft; Greg Wiseman

In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that had been missed in prior analyses. Our results point to considerable variability in the technologies used for web censorship, across countries, time, and types of content, and even across ISPs in the same country. In addition to characterizing web censorship in countries that, thus far, have eluded technical analysis, we also discuss the implications of our observations on the design of future network measurement platforms and circumvention technologies.


internet measurement conference | 2013

A method for identifying and confirming the use of URL filtering products for censorship

Jakub Dalek; Bennett Haselton; Helmi Noman; Adam Senft; Masashi Crete-Nishihata; Phillipa Gill; Ronald J. Deibert

Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed to improve performance and protect users from inappropriate content, these products are also used to censor the Web by authoritarian regimes around the globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export. Our contribution is to present methods for identifying installations of URL filtering products and confirming their use for censorship. We first present a methodology for identifying externally visible installations of URL filtering products in ISPs around the globe. Further, we leverage the fact that many of these products accept user-submitted sites for blocking to confirm that a specific URL filtering product is being used for censorship. Using this method, we are able to confirm the use of McAfee SmartFilter in Saudi Arabia and the United Arab Emirates (UAE) and Netsweeper in Qatar, the UAE, and Yemen. Our results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms.


usenix security symposium | 2014

Targeted threat index: characterizing and quantifying politically-motivated targeted malware

Seth Hardy; Masashi Crete-Nishihata; Katharine Kleemola; Adam Senft; Byron Sonne; Greg Wiseman; Phillipa Gill; Ronald J. Deibert


First Monday | 2013

Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC

Jedidiah R. Crandall; Masashi Crete-Nishihata; Jeffrey Knockel; Sarah McKune; Adam Senft; Diana Tseng; Greg Wiseman


5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15) | 2015

Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China

Jeffrey Knockel; Masashi Crete-Nishihata; Jason Q. Ng; Adam Senft; Jedidiah R. Crandall


IEEE Internet Computing | 2013

Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls

Masashi Crete-Nishihata; Ronald J. Deibert; Adam Senft


Archive | 2012

Routing Gone Wild: Documenting Upstream Filtering in Oman via India

Jakub Dalek; Ronald J. Deibert; Masashi Crete-Nishihata; Adam Senft; Helmi Noman; Greg Wiseman


Archive | 2013

Permission to Spy: An Analysis of Android Malware Targeting Tibetans

Seth Hardy; Byron Sonne; Masashi Crete-Nishihata; Jakub Dalek; Ronald J. Deibert; Adam Senft


Archive | 2012

Recent Observations in Tibet-Related Information Operations: Advanced Social Engineering for the Distribution of LURK Malware

Seth Hardy; Greg Wiseman; Masashi Crete-Nishihata; Jakub Dalek; Adam Senft


foundations of computational intelligence | 2016

Privacy and Security Issues in BAT Web Browsers

Jeffrey Knockel; Adam Senft; Ronald J. Deibert

Collaboration


Dive into the Adam Senft's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge