SlideShare uma empresa Scribd logo
1 de 26
Social media, activism and
democracy : friend or foe?

         LILIAN EDWARDS
      PROF OF E-GOVERNANCE
     STRATHCLYDE LAW SCHOOL

            MARCH 2012
   LILIAN.EDWARDS@STRATH.AC.UK
             PANGLOSS:
  HTTP://BLOGSCRIPT.BLOGSPOT.COM
          @LILIANEDWARDS
Summary

 The myth of social media as the ally of activism, free
    speech and democracy – Clay Shirky, 2008 –
    ―techno utopianism‖
   Vs
   1. Twitter’s ―censorship‖ policy announced Jan 2012
   2. The London riots summer 2011 and state
    surveillance of social media
   3. The Wikileaks takedowns of late 2010 – private
    intermediary activity
―Friend‖ : Arab Spring 2011
Social media and the Arab Spring

• Doubts? – Evgeney Morozow, Tor
―Foe‖: Do social media actually enable/ reinforce
                 state control?

 Obvious examples of state control: Great Chinese
  Firewall
 Freedom of the Net Survey 2011 of 37 countries cites
    Increased web blocking
    Filtering and content manipulation
    Cyber attacks (DDOS)
    Coercion of website owners, punishment of ordinary users
 Egypt ―internet kill switch‖ – January 2011; Syria, June
  2011; Bahrain, deliberate slowing of net
 Issues: bottlenecks to net (4/5 Egyptian major ISPs),
  economic costs – OECD estimate 5 day Egypt block cost
  $90m (Feb 11)
 State sponsored spin – China, US, Russia..
UK use of social media?
AND –Twitter, Jan 26 2012

 ―Starting today, we give ourselves the ability to reactively
  withhold content from users in a specific country — while
  keeping it available in the rest of the world. We have also
  built in a way to communicate transparently to users
  when content is withheld, and why.‖
 Transparency – notice to tweeter if possible, Chilling
  Effects Clearinghouse, content marked
 On what authority? Court order? Notice from private
  body? ―authorised body‖?
 What if Egypt had requested all tweets re Tahrir Sq
  banned? ―…we will enter countries that have different
  ideas about the contours of freedom of expression. Some
  differ so much from our ideas that we will not be able to
  exist there.‖ ??
1. Social media as surveillance tool

 Summer riots in London and rest of England
 12,000 arrests in London, C 1400 persons prosecuted
    & sentenced in UK
   Over half 20 or under, ¼ under 17, 43% of juveniles
    no previous criminal record, main offence burglary not
    violence
   Sentences over twice as serious as would be normal for
    offence
   ―In my judgement the context in which the offences of
    the night of 9th August were committed takes them
    completely outside the usual context of criminality. ―
   2 jailed for 4 years for inciting riots via FB pages - even
    tho no riot ensued (Blackshaw/Sutcliffe)
Technology sur(?)veillance & its legality?

 Surveillance of “walls” and profiles on social
    networking sites – evidence extensively used in
    the trials from FB, Twitter
   Surveillance via hashtags eg #Ukuncut
   Face recognition technology to match rioters to FB pages
    and vice versa? (cf Acquisti et al work, 2011 identified
    1/3 by matching pic taken outside to FB pic - > real
    name etc)
   Use of fake profiles to ―Friend‖ suspects & get data?
   ―Interception‖ and ―decrypting‖ of encrypted texts sent
    on Blackberry Message (BBM) network.
   RIM ―engaged with authorities‖ – voluntarily searched
    db and decrypted results? By keywords eg ―riots‖?
LONDON RIOTS , Summer 2011

"Everyone from all sides of London meet up at the heart of
London (central) OXFORD CIRCUS!!, Bare SHOPS are gonna
get smashed up so come get some (free stuff!!!) fuck the feds
we will send them back with OUR riot! >:O Dead the ends and
colour war for now so if you see a brother... SALUT! if you see
a fed... SHOOT!―
Blackberry Message (BBM)
Legal controls over surveillance of SNS posts?

 ―Of course‖ police can surveille public posts - they’re
  public!
vs
 Bartow ―Facebook [is] a giant surveillance tool, no
  warrant required, which the government can use in a
  mind bogglingly creative range of ways with almost no
  practical constraints from existing laws‖
 (review Semitsu 31 Pace L Rev 291)
 Why? US - No reasonable expectation of privacy -
  established acceptance of evidence in crime,
  matrimonial, insurance, employment etc litigation
 -> No Fourth Amendment anti-search rights
 No general US privacy law.. No DP..
Legal controls – UK? - 1

 SNS profile data clearly personal data, possibly
    sensitive personal data - > ―explicit consent‖
   Data Protection Act 1998 – strict controls on
    collecting/processing data without consent
   BUT – s29 DPA – exempts personal data where
    processed for prevention or detection of crime
   How often will this not be invocable re activism?
   And DPA Sched 3 r 5 – consent NOT required even
    to processing SPD where data ―has been made public
    as a result of steps deliberately taken by data subject‖
Legal controls – UK? - 2

 Regulation of Investigatory Powers Act – RIPA 2000
  – UK attempt to ―art 8 proof‖ police interceptions etc
  after ECtHR criticism
 O’Floinn and Ormerod 2011 Crim LR 766 argue
  repeated surveillance or monitoring of public FB
  profile could be ―direct surveillance‖ ->
  authorisation needed
 Especially if data also recorded and systematically
  processed eg data mined & profiled
RIPA & SNS monitoring as ―direct surveillance‖

 DS needs to be : covert but not intrusive; likely to
    result in obtaining ―private information ― re person;
    aimed at specific person, investigation not just
    general monitoring
   Covert: What is user expectation re public profile?
    That police will/may read it? Once? More than once?
    Record it?
   Cf privacy in public – von Hannover ECHR case
   Is the info “private‖? S26 (10) ―includes any
    information relating to his private or family life‖
   Investigation? #UKuncut or %―Start a riot‖– not
    ―Jordan Blackshaw‖
Interim conclusions

 Privacy protections designed to implement art 8 of ECHR
    don’t map well to a world of semi-public semi-private SNS
    posts
   Activism use of SNSs is unlikely to be Friends Only? If
    purpose is to gain support.
   ―Private info‖ online is searchable, identifiable (via SNS/ISP
    etc), recordable, able to be profiled and connectable to ―real
    world‖ via face recogn
   Wide DP exemptions re crime can be (and are) easily
    extended / abused (might Draft EC Directive 2012 on police
    and DP help?)
   Regulation has thought about sur-veillance – Panopticonism
    – not sous- or co-veillance..? (Brin, Mann)
2. Online free speech and privatised censorship – the
                       Wikileaks affair
 28 Nov 2010: ―patriot‖ DDoS attack hits WikiLeaks as first set
    of US diplomatic cables is published.
   3 December 2010: Amazon Web Services stops hosting
    Wikileaks, citing ToS; hit by DDOS attacks
   3 December 2010: WikiLeaks.org ceases to work for web users
    after everyDNS.com claims DDOS attacks against WikiLeaks
    were disrupting its service provided to other customers.
   4 December 2010: PayPal permanently restricts
    account used by WikiLeaks (later, M/card, Visa,
    Postfinance)
   8 December 2010: DDoS attacks take down PayPal, Visa,
    Mastercard, ―Anonymous‖ /Operation Payback claims
    responsibility, using LOIC to create DoS attacks
   13 December 2010 : Amazon in Europe goes down for 30 mins
    - denies DDOS cause
Anonymous’s grounds for ―censorship‖
 "We're against                 The First Great Infowar?
  corporations and
  government interfering on
  the internet," Coldblood
  added. "We believe it
  should be open and free for
  everyone. Governments
  shouldn't try to censor
  because they don't agree
  with it‖.
 Guardian 8 December
 But DDOS is criminal in
  most jurisdcitions
AWS’s grounds for ―censorship‖

 AWS: ― ―you represent and warrant that you own or
    otherwise control all of the rights to the content… that
    use of the content you supply does not violate this policy
    and will not cause injury to any person or entity.‖ It’s
    clear that WikiLeaks doesn’t own or otherwise control all
    the rights to this classified content. ―
   = copyright infringement argument.
   Notice -> liability as publisher (DMCA) unless takedown
   But in US government documents are free of copyright ?
    (cf UK)
   AWS retain discretion to interpret T of S and probably
    further discretion.
Intermediary legal risks as hosts
 Should Amazon have taken down Wikileaks?
   Possible criminal liability as publisher under US Espionage Act
   Possible civil liability: copyright documents? (tho under US
    law , probably not); trade secrets?
   Libel?

   Protection? S 230 © CDA does not cover criminal liability. (In
    EU, ECD protection vanishes on notice to take down.)
   Risks to revenues/shareholders

   Risks to staff/CEA including jail

   PR risks , loss of goodwill – much opposition to Wikileaks in
    US, collateral damage from DDOS
 Yet in Europe..
   ―if you don’t support freedom of expression, why are you
    selling books?‖
So what did happen to Wikileaks?
"Suppose you are the proprietor of an information service. …The
information you provide is greatly upsetting to powerful people
who would prefer to keep it a secret. You have been charged
with no crime, much less convicted of one. But one day, you
discover that all of these payment systems – quite
obviously responding to pressure from the government
but citing no actual legal authority – are refusing to
accept money from your customers on your behalf.
        This, sadly, is not a supposition. It is nearly the precise
situation that WikiLeaks has encountered since late last year..
forcing the whistleblowing media operation to suspend all
activity except fundraising in a struggle merely to survive… …if
this was happening to any traditional media company, it would
be a scandal, and the media in general would be screaming
about the threat to free speech it represented.
 Dan Gilmore, Guardian, Oct 24 2o11
Wikileaks March 2012

 ―WikiLeaks: 463 days of banking blockade - no
 process
 Assange: 460 days detainment - no charge
 Manning: 657 days in jail - no trial‖

 ―We are forced to put all our efforts into raising
 funds to ensure our economic survival. For almost a
 year we have been fighting an unlawful financial
 blockade. We cannot allow giant US finance
 companies to decide how the whole world votes with
 its pocket.‖
More interim thoughts

 Who was the corporate social responsibility of AWS owed
  to? To their users? Shareholders? The public? ―Freedom of
  speech?‖
 Are Internet host/cloud intermediaries in any way
  comparable in ethics to traditional publishing
  intermediaries like newspapers – ―publish and be damned‖
  – responsible journalism?
 Search intermediaries? Get site blocked on Google =
  disappears. Being attempted by © lobby also. Google does
  maintain Transparency Report re govt (and court order)
  take downs etc.
 Even less traditionally ethical – payment intermediaries
Overall conclusion…

 Naughton , Guardian 26 Feb 2012
 ―Facebook is now a semi-public space in which political
 and other potentially controversial views are expressed.
 Amazon is well on its way to becoming a dominant
 publisher. Google has the power to render any website
 effectively invisible. Given that freedom of speech is
 important for democracy, that means that these giant
 companies are now effectively part of our political
 system. But the power they wield is, as Stanley Baldwin
 famously observed of the British popular press in the
 1920s, "the harlot's prerogative" – power without
 responsibility.‖
Solutions?

 Corporate social responsibility and ethical frameworks? re
  online intermediaries – Global Network Initiative, inc
  Google, M$, Yahoo!; EC working with IT industry on CSR
  but not re freedom of speech.
 International rules on immunity. US hosts have CDA s
  230© total immunity re publication torts (though not
  crime or ©). EC hosts are fully liable on notice , hence
  ―Notice and Take Down ‖ (NTD) paradigm.
 International Internet Bills of Rights re freedom of speech
  online? IGF; CoE work. ECHR unhelpful. Brown and Korpff
  call for less national margin of appreciation, more certitude
  on ―horizontal effect‖, requirements of judicial warrant/
  transparency for takedown.

Mais conteúdo relacionado

Mais procurados

Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)Felipe Prado
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Hackers and the fight against censorship – An insight into Aaron Swartz
Hackers and the fight against censorship – An insight into Aaron SwartzHackers and the fight against censorship – An insight into Aaron Swartz
Hackers and the fight against censorship – An insight into Aaron SwartzMark Coetzer
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powersrcorrigan
 

Mais procurados (20)

SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
The new internet part i
The new internet part   iThe new internet part   i
The new internet part i
 
SOPA
SOPASOPA
SOPA
 
Presentación3
Presentación3Presentación3
Presentación3
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Hackers and the fight against censorship – An insight into Aaron Swartz
Hackers and the fight against censorship – An insight into Aaron SwartzHackers and the fight against censorship – An insight into Aaron Swartz
Hackers and the fight against censorship – An insight into Aaron Swartz
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powers
 
Hate speech
Hate speechHate speech
Hate speech
 
Prism
PrismPrism
Prism
 

Semelhante a Social media, surveillance and censorship

Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxbagotjesusa
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 

Semelhante a Social media, surveillance and censorship (11)

Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 

Mais de lilianedwards

Privacy and care robots
Privacy and care robotsPrivacy and care robots
Privacy and care robotslilianedwards
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!lilianedwards
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...lilianedwards
 
Anti social networking v 2
Anti social networking v 2Anti social networking v 2
Anti social networking v 2lilianedwards
 
Digital Lives Full Vn
Digital Lives Full VnDigital Lives Full Vn
Digital Lives Full Vnlilianedwards
 
Deb Act Talk April 2010
Deb Act Talk April 2010Deb Act Talk April 2010
Deb Act Talk April 2010lilianedwards
 

Mais de lilianedwards (13)

Privacy and care robots
Privacy and care robotsPrivacy and care robots
Privacy and care robots
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Anti social networking v 2
Anti social networking v 2Anti social networking v 2
Anti social networking v 2
 
Digital Lives Full Vn
Digital Lives Full VnDigital Lives Full Vn
Digital Lives Full Vn
 
Deb Act Talk April 2010
Deb Act Talk April 2010Deb Act Talk April 2010
Deb Act Talk April 2010
 
Ratemylegalrisknew
RatemylegalrisknewRatemylegalrisknew
Ratemylegalrisknew
 
Sible 09
Sible 09Sible 09
Sible 09
 
Death And The Web
Death And The WebDeath And The Web
Death And The Web
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Social media, surveillance and censorship

  • 1. Social media, activism and democracy : friend or foe? LILIAN EDWARDS PROF OF E-GOVERNANCE STRATHCLYDE LAW SCHOOL MARCH 2012 LILIAN.EDWARDS@STRATH.AC.UK PANGLOSS: HTTP://BLOGSCRIPT.BLOGSPOT.COM @LILIANEDWARDS
  • 2. Summary  The myth of social media as the ally of activism, free speech and democracy – Clay Shirky, 2008 – ―techno utopianism‖  Vs  1. Twitter’s ―censorship‖ policy announced Jan 2012  2. The London riots summer 2011 and state surveillance of social media  3. The Wikileaks takedowns of late 2010 – private intermediary activity
  • 3. ―Friend‖ : Arab Spring 2011
  • 4. Social media and the Arab Spring • Doubts? – Evgeney Morozow, Tor
  • 5.
  • 6. ―Foe‖: Do social media actually enable/ reinforce state control?  Obvious examples of state control: Great Chinese Firewall  Freedom of the Net Survey 2011 of 37 countries cites  Increased web blocking  Filtering and content manipulation  Cyber attacks (DDOS)  Coercion of website owners, punishment of ordinary users  Egypt ―internet kill switch‖ – January 2011; Syria, June 2011; Bahrain, deliberate slowing of net  Issues: bottlenecks to net (4/5 Egyptian major ISPs), economic costs – OECD estimate 5 day Egypt block cost $90m (Feb 11)  State sponsored spin – China, US, Russia..
  • 7. UK use of social media?
  • 8. AND –Twitter, Jan 26 2012  ―Starting today, we give ourselves the ability to reactively withhold content from users in a specific country — while keeping it available in the rest of the world. We have also built in a way to communicate transparently to users when content is withheld, and why.‖  Transparency – notice to tweeter if possible, Chilling Effects Clearinghouse, content marked  On what authority? Court order? Notice from private body? ―authorised body‖?  What if Egypt had requested all tweets re Tahrir Sq banned? ―…we will enter countries that have different ideas about the contours of freedom of expression. Some differ so much from our ideas that we will not be able to exist there.‖ ??
  • 9. 1. Social media as surveillance tool  Summer riots in London and rest of England  12,000 arrests in London, C 1400 persons prosecuted & sentenced in UK  Over half 20 or under, ¼ under 17, 43% of juveniles no previous criminal record, main offence burglary not violence  Sentences over twice as serious as would be normal for offence  ―In my judgement the context in which the offences of the night of 9th August were committed takes them completely outside the usual context of criminality. ―  2 jailed for 4 years for inciting riots via FB pages - even tho no riot ensued (Blackshaw/Sutcliffe)
  • 10. Technology sur(?)veillance & its legality?  Surveillance of “walls” and profiles on social networking sites – evidence extensively used in the trials from FB, Twitter  Surveillance via hashtags eg #Ukuncut  Face recognition technology to match rioters to FB pages and vice versa? (cf Acquisti et al work, 2011 identified 1/3 by matching pic taken outside to FB pic - > real name etc)  Use of fake profiles to ―Friend‖ suspects & get data?  ―Interception‖ and ―decrypting‖ of encrypted texts sent on Blackberry Message (BBM) network.  RIM ―engaged with authorities‖ – voluntarily searched db and decrypted results? By keywords eg ―riots‖?
  • 11.
  • 12. LONDON RIOTS , Summer 2011 "Everyone from all sides of London meet up at the heart of London (central) OXFORD CIRCUS!!, Bare SHOPS are gonna get smashed up so come get some (free stuff!!!) fuck the feds we will send them back with OUR riot! >:O Dead the ends and colour war for now so if you see a brother... SALUT! if you see a fed... SHOOT!― Blackberry Message (BBM)
  • 13. Legal controls over surveillance of SNS posts?  ―Of course‖ police can surveille public posts - they’re public! vs  Bartow ―Facebook [is] a giant surveillance tool, no warrant required, which the government can use in a mind bogglingly creative range of ways with almost no practical constraints from existing laws‖  (review Semitsu 31 Pace L Rev 291)  Why? US - No reasonable expectation of privacy - established acceptance of evidence in crime, matrimonial, insurance, employment etc litigation  -> No Fourth Amendment anti-search rights  No general US privacy law.. No DP..
  • 14. Legal controls – UK? - 1  SNS profile data clearly personal data, possibly sensitive personal data - > ―explicit consent‖  Data Protection Act 1998 – strict controls on collecting/processing data without consent  BUT – s29 DPA – exempts personal data where processed for prevention or detection of crime  How often will this not be invocable re activism?  And DPA Sched 3 r 5 – consent NOT required even to processing SPD where data ―has been made public as a result of steps deliberately taken by data subject‖
  • 15. Legal controls – UK? - 2  Regulation of Investigatory Powers Act – RIPA 2000 – UK attempt to ―art 8 proof‖ police interceptions etc after ECtHR criticism  O’Floinn and Ormerod 2011 Crim LR 766 argue repeated surveillance or monitoring of public FB profile could be ―direct surveillance‖ -> authorisation needed  Especially if data also recorded and systematically processed eg data mined & profiled
  • 16. RIPA & SNS monitoring as ―direct surveillance‖  DS needs to be : covert but not intrusive; likely to result in obtaining ―private information ― re person; aimed at specific person, investigation not just general monitoring  Covert: What is user expectation re public profile? That police will/may read it? Once? More than once? Record it?  Cf privacy in public – von Hannover ECHR case  Is the info “private‖? S26 (10) ―includes any information relating to his private or family life‖  Investigation? #UKuncut or %―Start a riot‖– not ―Jordan Blackshaw‖
  • 17. Interim conclusions  Privacy protections designed to implement art 8 of ECHR don’t map well to a world of semi-public semi-private SNS posts  Activism use of SNSs is unlikely to be Friends Only? If purpose is to gain support.  ―Private info‖ online is searchable, identifiable (via SNS/ISP etc), recordable, able to be profiled and connectable to ―real world‖ via face recogn  Wide DP exemptions re crime can be (and are) easily extended / abused (might Draft EC Directive 2012 on police and DP help?)  Regulation has thought about sur-veillance – Panopticonism – not sous- or co-veillance..? (Brin, Mann)
  • 18. 2. Online free speech and privatised censorship – the Wikileaks affair  28 Nov 2010: ―patriot‖ DDoS attack hits WikiLeaks as first set of US diplomatic cables is published.  3 December 2010: Amazon Web Services stops hosting Wikileaks, citing ToS; hit by DDOS attacks  3 December 2010: WikiLeaks.org ceases to work for web users after everyDNS.com claims DDOS attacks against WikiLeaks were disrupting its service provided to other customers.  4 December 2010: PayPal permanently restricts account used by WikiLeaks (later, M/card, Visa, Postfinance)  8 December 2010: DDoS attacks take down PayPal, Visa, Mastercard, ―Anonymous‖ /Operation Payback claims responsibility, using LOIC to create DoS attacks  13 December 2010 : Amazon in Europe goes down for 30 mins - denies DDOS cause
  • 19. Anonymous’s grounds for ―censorship‖  "We're against  The First Great Infowar? corporations and government interfering on the internet," Coldblood added. "We believe it should be open and free for everyone. Governments shouldn't try to censor because they don't agree with it‖.  Guardian 8 December  But DDOS is criminal in most jurisdcitions
  • 20. AWS’s grounds for ―censorship‖  AWS: ― ―you represent and warrant that you own or otherwise control all of the rights to the content… that use of the content you supply does not violate this policy and will not cause injury to any person or entity.‖ It’s clear that WikiLeaks doesn’t own or otherwise control all the rights to this classified content. ―  = copyright infringement argument.  Notice -> liability as publisher (DMCA) unless takedown  But in US government documents are free of copyright ? (cf UK)  AWS retain discretion to interpret T of S and probably further discretion.
  • 21. Intermediary legal risks as hosts  Should Amazon have taken down Wikileaks?  Possible criminal liability as publisher under US Espionage Act  Possible civil liability: copyright documents? (tho under US law , probably not); trade secrets?  Libel?  Protection? S 230 © CDA does not cover criminal liability. (In EU, ECD protection vanishes on notice to take down.)  Risks to revenues/shareholders  Risks to staff/CEA including jail  PR risks , loss of goodwill – much opposition to Wikileaks in US, collateral damage from DDOS  Yet in Europe..  ―if you don’t support freedom of expression, why are you selling books?‖
  • 22. So what did happen to Wikileaks? "Suppose you are the proprietor of an information service. …The information you provide is greatly upsetting to powerful people who would prefer to keep it a secret. You have been charged with no crime, much less convicted of one. But one day, you discover that all of these payment systems – quite obviously responding to pressure from the government but citing no actual legal authority – are refusing to accept money from your customers on your behalf. This, sadly, is not a supposition. It is nearly the precise situation that WikiLeaks has encountered since late last year.. forcing the whistleblowing media operation to suspend all activity except fundraising in a struggle merely to survive… …if this was happening to any traditional media company, it would be a scandal, and the media in general would be screaming about the threat to free speech it represented.  Dan Gilmore, Guardian, Oct 24 2o11
  • 23. Wikileaks March 2012  ―WikiLeaks: 463 days of banking blockade - no process Assange: 460 days detainment - no charge Manning: 657 days in jail - no trial‖  ―We are forced to put all our efforts into raising funds to ensure our economic survival. For almost a year we have been fighting an unlawful financial blockade. We cannot allow giant US finance companies to decide how the whole world votes with its pocket.‖
  • 24. More interim thoughts  Who was the corporate social responsibility of AWS owed to? To their users? Shareholders? The public? ―Freedom of speech?‖  Are Internet host/cloud intermediaries in any way comparable in ethics to traditional publishing intermediaries like newspapers – ―publish and be damned‖ – responsible journalism?  Search intermediaries? Get site blocked on Google = disappears. Being attempted by © lobby also. Google does maintain Transparency Report re govt (and court order) take downs etc.  Even less traditionally ethical – payment intermediaries
  • 25. Overall conclusion…  Naughton , Guardian 26 Feb 2012  ―Facebook is now a semi-public space in which political and other potentially controversial views are expressed. Amazon is well on its way to becoming a dominant publisher. Google has the power to render any website effectively invisible. Given that freedom of speech is important for democracy, that means that these giant companies are now effectively part of our political system. But the power they wield is, as Stanley Baldwin famously observed of the British popular press in the 1920s, "the harlot's prerogative" – power without responsibility.‖
  • 26. Solutions?  Corporate social responsibility and ethical frameworks? re online intermediaries – Global Network Initiative, inc Google, M$, Yahoo!; EC working with IT industry on CSR but not re freedom of speech.  International rules on immunity. US hosts have CDA s 230© total immunity re publication torts (though not crime or ©). EC hosts are fully liable on notice , hence ―Notice and Take Down ‖ (NTD) paradigm.  International Internet Bills of Rights re freedom of speech online? IGF; CoE work. ECHR unhelpful. Brown and Korpff call for less national margin of appreciation, more certitude on ―horizontal effect‖, requirements of judicial warrant/ transparency for takedown.

Notas do Editor

  1. Occupy movement – not just Arab spring – western anti-cuts, #ukuncut, #occupy, anti capitaism, anti Walll St – e are the 99% etc“Blogs, video and social networking sites have become a key forum for political debate and organisation” – Brown and KorpffI even wrote myself in 2010 about use of social media in the fiht against the Sigital Economy Act – deliberative democracy
  2. This 37 included 8 C of E members – 4 ranked free – Estonia, Germany, Italy, UK4 “Partially free” – Azerbaijan, Georgia ,Russia, Turkey
  3. Before going on to explore other ways in which content can be blocked, restricted or buries online, not just by state but by private intermediaries, want to look at how state authorities used social media during the London riots48% of 1000 adults polled said they would approve this (Nov 2011) and that LEAs should be able to access dat from social networks to improve public safety
  4. But noteTwitter lets you set your location as Worldwide so nothing will be filtered &Fact that tweet is blocked one jurisdn not globally means Streisand effect/ RT g will cut inThus deterring most from seeking to get Twitter to censorBut still meaning Twitter can protct itself from legal risk (NTD)
  5. Surveillance – sousveillance – post Panopticism
  6. 3. Surveillance via facebook
  7. ECHR crits – not acc to law, not necessary in democratic society (that one OK after Klass ) , not proportionate
  8. But in fact AMAZOn censored – not US govt at least not overtly.4 chanAnti corporations anti those opposing filsharing, taking doiwn P2P sites etc
  9. Copyright law – the answer to anything even Julian Assange
  10. Wikileaks had found other hosts and mirrors but..Gillmorsuggests payment organisations like Paypal or Visa be treated like "common carrier"sie akin to telcos and postal services , with a duty to accept and pass on payments to any customer who presents themselves in return for limitation of liability as to what messages they carry.
  11. Hard law – could be based on Art 10 ECHR – similar speech guarantees elsewhere – CoE has soft guidelines on responsibilities of search engines , Isps etc.