Many countries in the world perform extensive network surveillance, filtering in the form of website blocking or protocol specific censorship; recently many networked authoritarian events in the Middle East/North Africa and across most of the world have come to light. During some specific political uprisings came increased invasive filtering events. I've run a series of tests in many of these countries, during these events with the specific purpose of identifying specific hardware and software in use. Some of the technical details are not novel but their application certainly makes a positive contribution. In some contexts, it's possible to identify specific network links that flag, drop, or inject data at the country level. I intend to show real world data such as block pages, network traces, scans of filters, interesting network blocks and I will discuss techniques for gathering useful data.