Censor Restrictive government, corporate firewall, etc. Discovery Attacks: Notice unusual-looking Web traffic. monitors Web access for "inappropriate use" watch Web traffic for inappropriate access attempts watch for suspicious looking Web access patterns watch for use of circumvention software Disruptive Attacks: Keep the endpoints from talking. blocks access to certain Web sites attempts to block access to circumvention software (e.g., blocking SSL, disrupting communication, etc.)