FINDING · EVALUATION

Surveillance systems are fundamentally more selective than censorship systems due to storage constraints: as of 2009 the NSA could store only 7.5% of received traffic across 592 tapped 10 Gbps links with only 69 10 Gbps backhaul links, and the authors' campus network retains non-alert metadata for ~36 hours and IDS alerts for ~1 year. Censorship systems by contrast are transaction-focused and retain only enough data to process real-time requests. This asymmetry creates an exploitable gap: traffic that does not stand out from the population is discarded before reaching human analysts.

From 2015-jones-canCan Censorship Measurements Be Safe(r)? · §2.1–§2.2 · 2015 · Hot Topics in Networks

Implications

Tags

censors
generic
techniques
ml-classifiermeasurement-platform
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.