<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/"
>

<channel>
	<title>Index on Censorship &#187; Internet Governance</title>
	<atom:link href="http://www.indexoncensorship.org/tag/internet-governance/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.indexoncensorship.org</link>
	<description>for free expression</description>
	<lastBuildDate>Fri, 17 May 2013 16:22:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
<!-- podcast_generator="Blubrry PowerPress/4.0.8" -->
	<itunes:summary>for free expression</itunes:summary>
	<itunes:author>Index on Censorship</itunes:author>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="http://www.indexoncensorship.org/wp-content/plugins/powerpress/itunes_default.jpg" />
	<itunes:subtitle>for free expression</itunes:subtitle>
	<image>
		<title>Index on Censorship &#187; Internet Governance</title>
		<url>http://www.indexoncensorship.org/wp-content/uploads/powerpress/Free_Speech_Bites_Logo.jpg</url>
		<link>http://www.indexoncensorship.org</link>
	</image>
		<item>
		<title>Digital freedom, internet governance on agenda at two key meetings</title>
		<link>http://www.indexoncensorship.org/2013/05/two-key-summits-exploring-digital-freedom-internet-governance/</link>
		<comments>http://www.indexoncensorship.org/2013/05/two-key-summits-exploring-digital-freedom-internet-governance/#comments</comments>
		<pubDate>Mon, 13 May 2013 14:23:10 +0000</pubDate>
		<dc:creator>Brian Pellot</dc:creator>
				<category><![CDATA[Brian Pellot]]></category>
		<category><![CDATA[brian pellot]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Internet Governance]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=46268</guid>
		<description><![CDATA[<p>Two key meetings being held in Geneva this week are exploring digital expression and internet governance, <strong>Brian Pellot</strong> writes.</p><p>The post <a href="http://www.indexoncensorship.org/2013/05/two-key-summits-exploring-digital-freedom-internet-governance/">Digital freedom, internet governance on agenda at two key meetings</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p>It’s a big week for digital freedom and internet governance, with two key summits taking place in Geneva ahead of <span style="text-decoration: underline;"><a href="http://www.itu.int/en/wtisd/Pages/default.aspx">World Telecommunication and Information Society Day</a></span> on Friday, May 17, <strong>Brian Pellot</strong> reports.</p>
	<p>The week-long <span style="text-decoration: underline;"><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.itu.int%2Fwsis%2Fimplementation%2F2013%2Fforum%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHlJY9xVTLtIK7d2m7krasT0aY2NQ">World Summit on the Information Society (WSIS) Forum</a></span> bills itself as the “largest annual gathering of the ‘information and communication technologies for development’ community”. This multi-stakeholder UN forum brings together government, business and civil society to discuss internet policy and governance issues.</p>
	<p><iframe src="http://www.youtube.com/embed/o4SqnmFGHpE" height="315" width="560" allowfullscreen="" frameborder="0"></iframe></p>
	<p>The forum’s <span style="text-decoration: underline;"><a href="http://www.itu.int/wsis/implementation/2013/forum/agenda/agenda.html">agenda</a></span> this year will address infrastructure, education, gender, disability, literacy and development &#8212; all important digital access issues for freedom of expression. Most country-specific sessions are organised by their host states, which include Russia, Iran, Saudi Arabia and Egypt. These countries’ troubling track records on digital freedom of expression call into question how useful these sessions will be in addressing the most sensitive local issues.</p>
	<p>The first WSIS took place in 2005. Annual fora and the ongoing WSIS+10 review process will culminate in 2015 when the initial <span style="text-decoration: underline;"><a href="http://www.itu.int/en/wtpf-13/Pages/default.aspx">action plan</a></span>’s success will be evaluated on a range of issues including connectivity and access.</p>
	<p>Also in Geneva, the three-day <span style="text-decoration: underline;"><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.itu.int%2Fen%2Fwtpf-13%2FPages%2Fdefault.aspx&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHAobu_0r7Tcm2IAoD0LeaZlhI9Zw">World Telecommunication Policy Forum (WTPF)</a></span> on internet policy issues starts tomorrow. WTPF is less inclusive than WSIS, bringing together the International Telecommunication Union’s member states and sector members but leaving civil society on the sidelines. Unlike December’s <span style="text-decoration: underline;"><a href="http://blog.indexoncensorship.org/2012/12/10/why-arent-we-talking-about-protecting-free-speech-online-at-wcit/">World Conference on International Telecommunications (WCIT)</a></span> in Dubai, decisions made at WTPF will not be binding but are expected to guide the future direction of internet governance discussions over the next two years.</p>
	<p>The push for a top-down government-led approach, which Index on Censorship has opposed, may be a key issue at WPTF. Index set out its positions on digital freedom in this <a href="http://www.indexoncensorship.org/2013/03/what-are-the-biggest-threats-to-digital-freedom/">note</a>. Similar points are made by the Center for Democracy and Technology and Access Now in a <a href="https://www.cdt.org/files/file/analysisofWTPFreport.pdf">joint statement</a>. The open and inclusive multistakeholder model of internet governance will be called into question again. Net neutrality, affordable access, development, privacy and other fundamental rights will also be up for discussion. To combat the lack transparency and civil society’s exclusion at WTPF, <span style="text-decoration: underline;"><a href="http://www.google.com/url?q=http%3A%2F%2Fwcitleaks.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFIrNyTNLfqlyDfb8GL5bDMfddaTA">WCITLeaks.org</a></span> is once again hosting leaked preparatory documents ahead of the summit.</p>
	<p>Check back for more posts on WSIS and WTPF throughout the week.
</p>
<p>The post <a href="http://www.indexoncensorship.org/2013/05/two-key-summits-exploring-digital-freedom-internet-governance/">Digital freedom, internet governance on agenda at two key meetings</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2013/05/two-key-summits-exploring-digital-freedom-internet-governance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Freedom to Connect conference: Aaron Swartz remembered, calls for copyright law ammendment</title>
		<link>http://blog.indexoncensorship.org/2013/03/06/freedom-to-connect-conference-aaron-swartz-remembered-calls-for-copyright-law-ammendment/</link>
		<comments>http://blog.indexoncensorship.org/2013/03/06/freedom-to-connect-conference-aaron-swartz-remembered-calls-for-copyright-law-ammendment/#comments</comments>
		<pubDate>Wed, 06 Mar 2013 13:31:28 +0000</pubDate>
		<dc:creator>Brian Pellot</dc:creator>
				<category><![CDATA[Aaron Swartz]]></category>
		<category><![CDATA[Brian Pellot]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[Freedom to Connect]]></category>
		<category><![CDATA[Newswire]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[online censorship]]></category>

		<guid isPermaLink="false">http://blog.indexoncensorship.org/?p=11700</guid>
		<description><![CDATA[<p>Freedom to Connect conference: Aaron Swartz remembered, calls for copyright law ammendment</p><p>The post <a href="http://blog.indexoncensorship.org/2013/03/06/freedom-to-connect-conference-aaron-swartz-remembered-calls-for-copyright-law-ammendment/">Freedom to Connect conference: Aaron Swartz remembered, calls for copyright law ammendment</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a title="Freedom to Connect" href="http://freedom-to-connect.net/" >Freedom to Connect</a>, a conference that usually addresses the “nuts and bolts” of internet connectivity, focused sharply this year on fundamental freedoms.</p><p>Conference organiser <a title="David S. Isenberg - Two words I wish I’d been able to say to Aaron Swartz" href="http://isen.com/blog/" >David Isenberg</a> attributed the need for this shift to recent developments, most notably the January suicide of computer programmer and internet activist Aaron Swartz. Swartz delivered the <a title="Freedom to Connect: Aaron Swartz keynote speech" href="http://www.youtube.com/watch?v=PG-faBBotZI" >keynote speech</a> at last year’s conference. At the time of his death, he faced up to 35 years in prison and $1,000,000 in fines for violating the US Computer Fraud and Abuse Act.</p><p>Power and its subversion were central themes at the two-day conference.</p><p><a title="Darcy Burner " href="http://darcyburner.com/" >Darcy Burner</a>, a Washington state Democrat and former Microsoft executive, delivered the opening “After Aaron” lecture commemorating Swartz. She argued that for the purposes of inciting meaningful change, network power built on consent is much stronger than economic, political or military power.</p><p>Glenn Greenwald, Guardian writer and <a title="Freedom of the Press Foundation" href="https://pressfreedomfoundation.org/" >Freedom of the Press Foundation</a> co-founder, said Aaron Swartz and WikiLeaker Bradley Manning were both victims of prosecutorial excessiveness and abuse. He added that increasing state surveillance “threatens to turn the internet into a weapon that shields, protects and strengthens power” rather than subverting it. Other speakers reiterated this notion that the internet can be both a tool for democratising discourse and a weapon for control and censorship.</p><p>Dan Gilmor, director of the Knight Center for Digital Media Entrepreneurship, discussed corporate abuse of power. He said consumers often prefer convenience to liberty when technology is concerned. Convenience, or perhaps dependence, explains why users opt in to restrictive terms of service and sacrifice elements of their privacy to use certain online platforms and services like Facebook and Twitter.</p><p>Christopher Soghoian, who works on the American Civil Liberties Union’s Speech, Privacy and Technology Project, argued that US telecommunications providers are among the worst corporate abusers of power. Soghoian argued that telcos want power over software without assuming responsibility for updating it, leaving consumers vulnerable to cybersecurity breaches. Access Now highlighted the most egregious violations by wireless carriers in its recent <a title="Access Now - The Telco Hall of Shame" href="https://www.accessnow.org/policy/the-telco-hall-of-shame" >Telco Hall of Shame</a> competition.</p><p>Former Republican staffer Derek Khanna spoke on <a title="Democracy Now" href="http://www.democracynow.org/" >Democracy Now!</a>, which broadcast live from the conference both days, about his <a title="The White House - Make unlocking cell phones legal" href="https://petitions.whitehouse.gov/petition/make-unlocking-cell-phones-legal/1g9KhZG7" >campaign</a> to reverse a recent US decision that made unlocking cell phones illegal. My Index <a title="Index on Censorship - New US phone law a danger to free speech" href="http://blog.indexoncensorship.org/2013/01/26/new-us-phone-law-a-danger-to-free-speech-rights/#commentshttp://blog.indexoncensorship.org/2013/01/26/new-us-phone-law-a-danger-to-free-speech-rights/" >post</a> from January explains the policy, which AT&amp;T and Verizon pushed for, but which the White House announced Monday it favours overturning after an online petition against it garnered more than 100,000 signatures.</p><p>Khanna was recently fired for arguing in a House Republican Study Committee<a title="The Republican Study Committee - Three myths about copyright law and where to start to fix it:" href="http://www.mbw.name/Derek_Khanna-RSC_Policy_Brief.pdf" > report</a> that the US copyright system should be reformed to expand fair use and limit copyright terms. Copyright was another recurring theme throughout the conference, touched on by artists, entrepreneurs and psychedelic soul legend Lester Chambers.</p><p>Gwenn Semmel, an artist, decided not to show the audience where she drew inspiration from for her paintings, saying, “I don’t want to call down the wrath of the copyright gods, because they are temperamental and expensive.”</p><p>Ben Huh, CEO of the lolcats and internet meme empire Cheezburger Network, Alexis Ohanian, co-founder of Reddit, and Mike Godwin, famed internet lawyer, discussed their fight against the 2012 US copyright bills SOPA and PIPA.</p><p>One of the most interesting presentations came from dominatrix, performance artist and blogger Mistress Clarissa who made the free speech pitch for porn, arguing that the industry pushes cultural boundaries and provides invaluable opportunities for expression and self-exploration.</p><p>Several speakers promoted community-owned networks, arguing that the internet represents critical infrastructure that should not be left solely in the hands of self-interested monopolies. Nineteen US states currently impose legal barriers that restrict the building of community-owned fibre broadband systems.</p><p>Vint Cerf, famed “father of the internet” and Google’s Chief Internet Evangelist, wrapped up the conference by criticising new copyright alert systems in the US and France, the lack of fair and open ICT competition in many regions, and troubling internet governance developments to come out of December’s World Conference on International Telecommunications in Dubai. Cerf will move to London for six months later this year to concentrate on developments likely to affect our freedom to connect in Europe, the Middle East and Africa. In an increasingly connected world, regional debates have unavoidable global implications.</p><p>Freedom to Connect’s increased focus on political freedoms and free speech comes amid increased obstacles to an open and uncensored internet. Taking action on our discussions at this conference will be crucial if we wish to continue preserving and promoting digital freedom of expression.</p> <p>The post <a href="http://blog.indexoncensorship.org/2013/03/06/freedom-to-connect-conference-aaron-swartz-remembered-calls-for-copyright-law-ammendment/">Freedom to Connect conference: Aaron Swartz remembered, calls for copyright law ammendment</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://blog.indexoncensorship.org/2013/03/06/freedom-to-connect-conference-aaron-swartz-remembered-calls-for-copyright-law-ammendment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The future of internet governance? I wouldn’t start from here</title>
		<link>http://www.indexoncensorship.org/2012/12/internet-governance-wcit-freedom/</link>
		<comments>http://www.indexoncensorship.org/2012/12/internet-governance-wcit-freedom/#comments</comments>
		<pubDate>Mon, 17 Dec 2012 09:58:15 +0000</pubDate>
		<dc:creator>Rohan Jayasekera</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[ITU]]></category>
		<category><![CDATA[Rohan Jayasekera]]></category>
		<category><![CDATA[WCIT]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=43349</guid>
		<description><![CDATA[<p>After two weeks of negotiations, the threat of extended government influence over the internet remains. <strong>Rohan Jayasekera</strong> looks back on WCIT

<strong>Plus: <a href="http://blog.indexoncensorship.org/2012/12/17/wcit12-the-uk-stood-up-for-internet-freedom/">Dominique Lazanski</a> on how the UK stood up for online freedoms at WCIT</strong> </p><p>The post <a href="http://www.indexoncensorship.org/2012/12/internet-governance-wcit-freedom/">The future of internet governance? I wouldn’t start from here</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[<br />
<p>The post <a href="http://www.indexoncensorship.org/2012/12/internet-governance-wcit-freedom/">The future of internet governance? I wouldn’t start from here</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/12/internet-governance-wcit-freedom/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How the law caught up with the internet</title>
		<link>http://www.indexoncensorship.org/2012/12/freedom-law-caught-up-internet/</link>
		<comments>http://www.indexoncensorship.org/2012/12/freedom-law-caught-up-internet/#comments</comments>
		<pubDate>Mon, 03 Dec 2012 22:34:21 +0000</pubDate>
		<dc:creator>Jennifer Granick</dc:creator>
				<category><![CDATA[digital]]></category>
		<category><![CDATA[From the magazine]]></category>
		<category><![CDATA[Headline Featured]]></category>
		<category><![CDATA[News and Analysis]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[digital freedom]]></category>
		<category><![CDATA[Digital Frontiers]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[online cenosrship]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[The innocence of Muslims]]></category>
		<category><![CDATA[Volume 41 number 4]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=42680</guid>
		<description><![CDATA[<p>As online freedom comes under attack from big business and governments alike, <strong>Jennifer Granick</strong> assesses the legal landscape</p><p>The post <a href="http://www.indexoncensorship.org/2012/12/freedom-law-caught-up-internet/">How the law caught up with the internet</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p><strong>As online freedom comes under attack from big business and governments alike, Jennifer Granick assesses the legal landscape</strong><br />
<span id="more-42680"></span></p>
	<p><img class="aligncenter size-full wp-image-43106" title="Digital Frontiers banner" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/banner.jpg" alt="" width="630" height="78" /></p>
	<p>The decentralised, ungovernable nature of the early internet was an intentional design feature and not a bug. As a result, today’s internet is an open network, where unprecedented creative and economic innovation, art, commentary and <a title="Index on Censorship - Posts tagged citizen journalism" href="http://www.indexoncensorship.org/tag/citizen-journalism/" target="_blank">citizen journalism</a> flourish.</p>
	<p>But child pornography, hate speech and <a title="Index on Censorship - Whether it’s porn or piracy, ISPs should not be forced to police the internet" href="http://blog.indexoncensorship.org/2012/05/01/whether-its-porn-or-piracy-isps-should-not-be-forced-to-police-the-internet/" target="_blank">copyright</a> infringement have also thrived, leading to mounting pressures to bring online activity under government control. As nations push for these changes, global interconnectivity and freedom of expression are at risk.</p>
	<p>As long as computers speak the TCP/IP protocol, or ‘language’, they can exchange information without centralised controls, standardised operating systems or consideration of geographic location. Users do not need to register or identify themselves. These networks are both simple and robust, and there is no single point of failure.</p>
	<p><div id="attachment_41147" class="wp-caption alignright" style="width: 399px"><img class="wp-image-41147 " style="margin-left: 10px; margin-right: 10px;" title="The Innocence of Muslims film was widely censored" src="http://www.indexoncensorship.org/wp-content/uploads/2012/10/Google-protest-Brian-Minkoff1.jpg" alt="" width="389" height="259" /><p class="wp-caption-text">The Innocence of Muslims film was widely censored</p></div></p>
	<p>The laissez-faire design principles of the network are reinforced by the legal regime of its birthplace, the <a title="Index on Censorship - Analysis: Index’s experts on Hillary Clinton’s internet freedom speech" href="http://www.indexoncensorship.org/2010/01/hilary-clintons-internet-freedom/" target="_blank">United States.</a> The US allows private, unregulated businesses to connect to and innovate on the network without government permission. The First Amendment guarantees that the vast majority of online communications will not result in governmental sanction. Section 230 of the <a title="Cornell University Law School - Legal information institute " href="http://www.law.cornell.edu/uscode/text/47/230" target="_blank">Communications Decency Act</a> of 1996 (CDA), which states that online platforms should not be treated as if they are the speaker or publisher of user-generated content, ensures that online companies are not required to review user posts in advance to avoid liability, a precaution that would be impossible anyway, considering 72 hours of video are uploaded to platforms like YouTube every minute.</p>
	<p>While the founding fathers of the internet weren’t envisioning Facebook or YouTube, the TCP/IP protocol made these innovations possible. Photos of cats, indie music and films from around the world can all be found online, along with fraudsters, Nazi propaganda and videos about how to be anorexic.</p>
	<p>Activist and co-founder of the <a title="Electric Frontier Foundation" href="https://www.eff.org/" target="_blank">Electronic Frontier Foundation</a> John Gilmore said in 1993: ‘The net interprets censorship as damage and routes around it.’ But in the face of the darker uses of the network, Gilmore’s celebration has become a rallying cry for regulation. Apprehending individuals who behave illegally online can be difficult.</p>
	<p>An individual posting illegal content might be pseudonymous and their identity not readily ascertained. Or the user might be based outside the jurisdiction where legal proceedings have been initiated. If one service provider blocks access to content or removes a video or song, another user, or users, will almost certainly repost the material, giving it far more attention than it originally received and far wider distribution.</p>
	<p>This phenomenon is so common it has been given a name, <a title="Index on Censorship - Twitter, free speech, injunctions and the Streisand effect" href="http://www.indexoncensorship.org/2011/05/twitter-free-speech-injunctions-and-the-streisand-effect/" target="_blank">the Streisand Effect,</a> based on Barbra Streisand’s extensive but ineffectual legal attempts to stop online publication of photographs of her Malibu, California beach house.</p>
	<h5>Tools for government control</h5>
	<p>Nevertheless, despite the assertion that technology has outpaced the ability of the law to regulate it, as a result of technological, economic and political changes, online speech on today’s internet is no longer beyond governmental control.</p>
	<p>The vast majority of activity is not anonymous – it’s branded with a unique identifier that links details to a particular network account. Internet Service Providers (ISPs) collect and store which IP address information was assigned to what subscriber for billing and operational purposes. Moreover, online businesses increasingly collect IP address information to identify repeat customers, tailor services and target advertising.</p>
	<p>These services associate IP address data with other information that can be used to profile, track, physically locate or otherwise identify a user. Governments and civil litigants are learning how to use this information to identify individuals. The old joke was that on the internet, no one knew you were a dog.</p>
	<p>Today, everyone knows your breed and what kind of kibble you buy. Not long after the implementation of TCP/IP protocol, its creators decided that easy-to-remember domain names like stanford.edu or facebook. com were better monikers for networked sites than the original IP addresses, which consisted of a long string of numbers.</p>
	<p>They set up the domain name system (DNS), a system of databases that translates unique identities into machine-readable addresses. Without accurate and cooperative DNS servers, users cannot find and connect to pages. DNS has become a powerful tool for governments to control the internet.</p>
	<p>DNS redirection or filtering, called DNS poisoning, is increasingly common. The Chinese government uses this technique extensively. When a user attempts to connect to sites the government does not want them to access, he or she is simply redirected elsewhere. Domain names themselves are targets for <a title="Index on Censorship - The mechanics of China’s internet censorship" href="http://uncut.indexoncensorship.org/2012/08/china-internet-censorship/" target="_blank">government control</a>.</p>
	<p>In 2011, the United States Immigration and Customs Enforcement (ICE) agency automatically shut down over 700 websites for alleged copyright infringement, including the sports streaming sites rojadirecta.com and rojadirecta.org and music site http://dajaz1.com. In many cases, ICE was able to seize these domain names without an adversarial hearing, meaning that website owners were not able to defend their practices in court.</p>
	<p>The secrecy of the proceedings was another huge challenge. For both rojadirecta and dajaz1, the government eventually gave the names back, without providing probable cause for the seizure. But the harm was done. In a fast moving economic environment, a business that loses its domain name for even a few months is basically dead.</p>
	<p>Governments have also found ways to <a title="Index on Censorship - Policing the internet" href="http://www.indexoncensorship.org/2012/10/internet-censorship/" target="_blank">control</a> online expression by controlling the services people use to connect to the network: electricity providers, ISPs, broadband and cellular providers. Companies that lay power lines or fibre optic wires to users’ homes or operate cellular networks to which internet-enabled devices connect are usually highly regulated and have a cosy relationship with the government. In some countries, these services cannot operate without government approval.</p>
	<h5>The Arab Spring</h5>
	<p><div id="attachment_43099" class="wp-caption alignright" style="width: 286px"><img class="size-full wp-image-43099" title="facebookegypt" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/facebookegypt.jpeg" alt="" width="276" height="183" /><p class="wp-caption-text">During the 2011 protests the Egyptian authorities cut internet access</p></div></p>
	<p>During the 2011 Arab Spring protests, some reports say that the Egyptian <a title="Index on Censorship - Cracks widening in Egypt’s internet wall  " href="http://www.indexoncensorship.org/2011/01/cracks-widening-in-egypt%E2%80%99s-internet-wall-%C2%A0/" target="_blank">government</a>simply shut off power at an important internet exchange point where ISP lines connected to the network outside the country. The government contacted those ISPs that were not directly affected by this move and instructed them to discontinue services or risk losing their communications licences.</p>
	<p>Similarly, <a title="Index on Censorship -  Internet and mobile outage in Syria" href="http://www.indexoncensorship.org/2012/11/internet-and-mobile-blackout-in-syria/" target="_blank">Syria</a> has only one domestic internet provider and it is owned by the government. So Syrian authorities have a direct avenue for monitoring, filtering and blocking traffic. Authorities in that country have also disconnected the mobile 3G network to prevent access through the phone network; they have been known to disconnect the electricity supply to control citizens during clashes between the military and protesters or rebel forces.</p>
	<p>Unable to use normal means of communication, activists have no choice but to give news and footage to those who know how to circumvent bans so that the information gets out to the world. These kinds of wholesale shutdowns obviously produce a lot of collateral damage for ‘innocent’ users of electricity and communications services.</p>
	<p>There is a public cost to this kind of obvious, direct censorship. In the case of <a title="Index on Censorship - “The internet is freedom”: Index speaks to Tunisian Internet Agency chief" href="http://www.indexoncensorship.org/2012/02/tunisia-internet-moez-chakchouk/" target="_blank">Tunisia,</a> the tactics were less obvious. There were reports that the government manipulated Facebook login pages to obtain activists’ passwords and delete their accounts, along with pages organising protests. During Iran’s 2009 Green Revolution, the government prevented citizens from accessing popular dissident websites and used DNS blocking to redirect activists attempting to organise protests via Facebook or Twitter. Since much of the data transmitted over the Iranian (and global) network is unencrypted, the Iranian government has an easy time spying on its citizens.</p>
	<h5>Blocking offensive material</h5>
	<p>Communications platforms like Gmail, Twitter, Facebook and YouTube are ripe targets for censorship. In September, Google refused to delete the YouTube-hosted video <a title="Index on Censorship - A new argument for censorship?" href="http://www.indexoncensorship.org/2012/09/islam-blasphemy-censorship/" target="_blank">The Innocence of Muslims,</a> which depicted the Prophet Mohammed and insulted many around the world. The video has been widely regarded to be connected to attacks on the US consulate in Libya, in which the US ambassador and three other State Department employees were killed. As word of the video spread, there were <a title="Index on Censorship - Free expression in the face of violence" href="http://blog.indexoncensorship.org/2012/10/19/free-expression-in-the-face-of-violence/" target="_blank">violent protests</a> around the world and governments faced demands to remove the video from the internet.</p>
	<p>As a result of the protests, Google initially blocked access to the video in Libya and Egypt by blocking IP addresses associated with those countries’ ISPs so that they could not connect to the YouTube server. It also blocked access in India and Indonesia and, in response to government requests, in Saudi Arabia and Malaysia. Google also blocked the video using geographical filtering. Eventually, it restored access in Libya and Egypt. The video continues to be accessible to the rest of the world and people in blocked countries may view the clip by routing requests through non-local IP addresses.</p>
	<p>It’s not surprising that the video remains online – the First Amendment and a decentralised network guaranteed that. What’s surprising is that Google actually blocked the video. The company has such considerable international business interests that following local law in the jurisdictions concerned was in its best interests.</p>
	<p>A purely US-based company or an online speech platform with no business interests might have chosen to do nothing. But these days it’s rare for an internet platform to ignore international demands for censorship or for user data. Companies have a potentially international user base and in order for them to exploit it, they increasingly give foreign government demands substantial weight, and not only when they have staff or assets on the ground.</p>
	<p><img class="alignright size-full wp-image-43100" title="pirate bay" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/pirate-bay.jpeg" alt="" width="276" height="183" />When intermediaries like ISPs fail to comply, this doesn’t stop national censorship. Thailand has blocked the entire YouTube site for hosting videos that mock the Thai king. Turkey has blocked access to webpages about evolution. A decade ago, France successfully stopped Yahoo!’s local subsidiary from hosting auctions for Nazi memorabilia and fined its US division for failure to block French users. Today copyright holders are pressuring European ISPs to block <a title="Index on Censorship - UK: The Pirate Bay must be blocked by ISPs, court rules" href="http://www.indexoncensorship.org/2012/04/uk-the-pirate-bay-must-be-blocked-by-isps-court-rules/" target="_blank">The Pirate Bay</a>, a website dedicated to the sharing of copyrighted materials.</p>
	<p>Network problems like unwanted spam and malware have encouraged providers to develop tools that can analyse and disrupt traffic. The economic consolidation of network providers and entertainment companies has encouraged conglomerates to look at favouring and disfavouring – essentially blocking – certain content or applications on their networks. Some countries are now asking these providers to block access to certain content, or to collect transactional data about users’ internet access for subsequent monitoring and potential prosecution.</p>
	<p>In 2009, a German man convicted of murder sued Wikipedia and various news outlets for posting information about his crime, asserting his ‘right to be forgotten’, which is recognised in Germany. Wikipedia’s German language service removed the entry, but the English language version has so far refused.</p>
	<p>In 2010, Italy criminally convicted three Google executives in response to a YouTube video depicting a disabled child being bullied. Though the content was removed within hours of the company receiving notification, the court faulted it for not screening the video prior to posting. And a court in Brazil ordered the arrest of Brazil Google’s senior executive for failing to remove a video critiquing a mayoral candidate, which violates local election laws.</p>
	<p>Also in 2010, various US businesses and government agencies took steps to block the <a title="Index on Censorship - Posts tagged Wikileaks" href="http://www.indexoncensorship.org/tag/wikileaks/" target="_blank">WikiLeaks</a> website after it published a classified cache of leaked diplomatic cables. Private companies, including Amazon and PayPal, stopped doing business with WikiLeaks on the grounds that it violated their terms of service, although, according to reports, the US State Department encouraged the decision. Copyright is a particularly salient cause for censorship in the West.</p>
	<p>In one you-can’t-believe-it’s-true example from earlier this year, Amazon remotely deleted copies of George Orwell’s 1984 and Animal Farm from Kindle devices because the books had been added to the Kindle store by a company that did not have the rights to distribute them. No censor could ever hope to seize and burn every paper copy of Fahrenheit 451, and yet digital books can easily be disappeared.</p>
	<h5>The end of the global network?</h5>
	<p>Today, our global network is evolving into a parochial one. China already has its own surveilled and monitored internet. <a title="Index on Censorship - Iran: Leader orders creation of internet oversight agency in bid to control web" href="http://www.indexoncensorship.org/2012/03/iran-leader-orders-creation-of-internet-oversight-agency-in-bid-to-control-web/" target="_blank">Iran</a> is in the process of creating its own domestic network and has started blocking American companies like Google from providing online services to its citizens. As companies block or are blocked in compliance with international assertions of sovereignty from countries around the world, we are in danger of fragmenting the network along national borders.</p>
	<p>International efforts to regulate the network are even more frightening. Taking place behind closed doors, the <a title="Index on Censorship - Posts tagged ITU" href="http://www.indexoncensorship.org/tag/itu/" target="_blank">International Telecommunications Union</a> (ITU), a United Nations organisation representing 193 countries, is reviewing international agreements governing telecommunications with a view to expanding its regulatory authority over the internet.</p>
	<p>During the meeting, many countries hope to seize power over internet policy, taking it out of the hands of the US. Authoritarian and democratic countries would have equal say. Of those 193 countries, 40 of them currently block or otherwise censor the internet. Voices around the world, including the US Congress and <a title="Fast Net News - ITU and Internet Governance" href="http://fastnetnews.com/itu" target="_blank">Vint Cerf</a>, one of the creators of TCP/IP, have called for the ITU to keep its hands off the internet.</p>
	<p>Under the ITU, the internet would be pushed towards the lowest common denominator, with the potential for rampant civil rights abuses, widespread surveillance and fragmentation of creative and political freedoms. Most experts believe that the days are long gone when internet companies could simply follow US law alone.</p>
	<p>Some international legal regulation of the internet is inevitable. Still, it’s important for any changes to be made slowly and incrementally, and to be aware that any major changes applied to internet technology or its network might be hard to reverse. Nations must understand the risk of fragmentation and companies must resolve to restrain sovereign demands.</p>
	<p><a title="Index on Censorship - Index tells policy makers to keep the internet free" href="http://www.indexoncensorship.org/2012/11/internet-governance-forum/" target="_blank">Multi-stakeholder</a> agreements on how to manage cross-border problems, even without the force of law, may alleviate the urgency of addressing some online crimes. Choices made by communications intermediaries, rather than just governments, will continue to have a disproportionate effect on individual freedoms, so we must be very careful about imposing liability on those platforms for their users’ conduct.</p>
	<p>Policy should encourage provider diversity and network neutrality, or else deviation from the internet’s original design as a global, open network will threaten economic growth, creativity and political activism. None of these precautions will be taken, however, until we accept the fact that the law is, indeed, catching up with the internet.</p>
	<p><a href="http://indexoncensorship.org/Magazine/digital-frontiers/"><img class="alignright  wp-image-42390" title="Front cover of Digital Frontiers" src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/Front-cover-of-Digital-Frontiers-198x300.jpg" alt="" width="119" height="180" /></a><em>Jennifer Granick is an American attorney and educator. She tweets from @granick</em></p>
	<h5><em>Digital Frontiers.</em><em> Click here for subscription options and more</em></h5>
	<p>&nbsp;</p>
	<p>&nbsp;
</p>
<p>The post <a href="http://www.indexoncensorship.org/2012/12/freedom-law-caught-up-internet/">How the law caught up with the internet</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/12/freedom-law-caught-up-internet/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Beacons of freedom: The changing face of Anonymous</title>
		<link>http://www.indexoncensorship.org/2012/12/beacons-freedom-hacking-anonymous/</link>
		<comments>http://www.indexoncensorship.org/2012/12/beacons-freedom-hacking-anonymous/#comments</comments>
		<pubDate>Mon, 03 Dec 2012 22:30:57 +0000</pubDate>
		<dc:creator>Gabriella Coleman</dc:creator>
				<category><![CDATA[digital]]></category>
		<category><![CDATA[From the magazine]]></category>
		<category><![CDATA[News and Analysis]]></category>
		<category><![CDATA[ACTA]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[digital freedom]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[Gabriella Coleman]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[online censorship]]></category>
		<category><![CDATA[Volume 41 number 4]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=42544</guid>
		<description><![CDATA[<p>Online irreverent political protest is here to stay. But, asks Gabriella Coleman, what will be the legacy for digital freedom?
</p><p>The post <a href="http://www.indexoncensorship.org/2012/12/beacons-freedom-hacking-anonymous/">Beacons of freedom: The changing face of Anonymous</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p><strong>Online irreverent political protest is here to stay. But, asks Gabriella Coleman, what will be the legacy for digital freedom?</strong><span id="more-42544"></span></p>
	<p><img class="aligncenter size-full wp-image-43106" title="Digital Frontiers banner" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/banner.jpg" alt="" width="630" height="78" /></p>
	<p>It’s late January 2012. Governments all over the world are considering signing up to a new US-led trade proposal intended to curtail copyright violation, the<a title="Electric Frontier Foundation - Anti-Counterfeiting Trade Agreement" href="https://www.eff.org/issues/acta" target="_blank"> Anti-Copyright Trade Agreement</a> (ACTA). There have been widespread protests, on and offline: the loose-knit collective of activists, hackers and internet denizens of all stripes known as ‘Anonymous’ believe ACTA represents an attempt by governments to limit and control the core freedoms of the internet, in particular the massive cultural exchange of ideas and information made possible by file-sharing online.</p>
	<p>In Poland, the agreement has already been signed off; all that is needed for it to be adopted into law is a majority vote in parliament. The government website is offline, taken down by a distributed denial of service (DDoS) <a title="International Business Times - ACTA: Anonymous hacks Polish government for passing copyright bill" href="http://www.ibtimes.com/acta-anonymous-hacks-polish-government-passing-copyright-bill-401180" target="_blank">attack</a> launched by Anonymous, which sends a message to politicians who are considering voting in favour. By the final week of January, over 10,000 people gather in Krakow in a last-ditch protest to influence the vote.</p>
	<p><div id="attachment_42575" class="wp-caption alignright" style="width: 334px"><img class=" wp-image-42575" style="margin-left: 10px; margin-right: 10px;" title="Members of the Palikot Movement Party protest against the ratification of the Anti-Counterfeiting Trade Agreement " src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/Polish-masks1.gif" alt="" width="324" height="297" /><p class="wp-caption-text">Members of the Palikot Movement Party protest against the ratification of the Anti-Counterfeiting Trade Agreement</p></div></p>
	<p>And then something unexpected happens: on 26 January 2012, while casting their votes in parliament, some members of the Polish government conceal their faces with paper Guy Fawkes masks. The mask, by now the signature icon for Anonymous, has become common protest regalia among rabble-rousers across the globe, from Egypt’s Tahrir Square to London’s Occupy protests. But this is the first case of public servants adopting the symbol. The image is circulated far and wide on social media platforms. Although Polish politicians used it to launch a specific protest against ACTA, the gesture and its photographic memorialisation worked in a much broader capacity to legitimate <a title="Anonymous: We are legion" href="http://anonyops.org/" target="_blank">Anonymous</a>. ‘These parliamentarians were wearing Anonymous Guy Fawkes masks,’ one Anonymous activist blogged, ‘while the parliament’s website was down due to DDoS by Anonymous. We can’t emphasise that point enough – this is a game-changer.’</p>
	<p>Less than a month later a very different image of Anonymous was circulated. On 21 February 2012, the Wall Street Journal <a title="Wall Street Journal - Alert on Hacker Power Play" href="http://online.wsj.com/article/SB10001424052970204059804577229390105521090.html" target="_blank">reported</a> that General Keith Alexander, the director of the United States National Security Agency (NSA), had briefed officials at the White House in secret meetings, claiming Anonymous ‘could have the ability within the next year or two to bring about a limited power outage through a cyberattack’. So only weeks after the ‘game changer’, the group was described as an imminent and credible threat.</p>
	<p>The ‘ability’ to bring about a power outage was undefined. Could it mean that hackers had already acquired passwords that would give them access to power facilities? Or was the warning based on information supplied by an informant who had been working with Anonymous? Either way, General Alexander’s claims were frightening and bold, as well as vague. An attack on the power grid systems would cause havoc and potentially even threaten lives.</p>
	<p>It is unlikely that we will ever find out whether the NSA assessment was based on credible intelligence or whether it was simply meant to smear and discredit Anonymous. Further news reports quoted activists and security experts and dismissed NSA claims as ‘fear-mongering’. The group, for all its varied tactics, both legal and illegal, has to date never been known to publicly call for such an attack – and there is no evidence to suggest that it would so much as consider it. A tactic like this would be very out of character for the collective, which, though often subversive, generally conforms to ethical norms and defends civil liberties.</p>
	<p>While <a title="Index on Censorship - Posts tagged Anonymous" href="http://www.indexoncensorship.org/tag/anonymous/" target="_blank">Anonymous</a> has never occupied a controversy-free place on the world stage, by February 2012 it began to be portrayed as an open source brand of radical protest politics and not necessarily as hooligans hell-bent on unleashing extremist, chaotic acts like taking down power grids. More significantly, while the name has been used to pull together a range of unrelated causes, from environmental rights to snuffing out paedophilia rings, Anonymous activists are most effective and forceful when fighting censorship.</p>
	<p>With campaigns like<a title="Guardian - Anonymous cyber-attacks cost PayPal £3.5m, court told" href="http://www.guardian.co.uk/technology/2012/nov/22/anonymous-cyber-attacks-paypal-court" target="_blank"> Operation Payback</a>, which targeted corporations like MasterCard when it stopped providing services to WikiLeaks, <a title="Index on Censorship - Tunisia: The Middle East’s first cyberwar" href="http://www.indexoncensorship.org/2011/01/tunisia-sidi-bouzid-protest/" target="_blank">OpTunisia</a>, which responded to Tunisian government tactics against protesters and journalists, and <a title="Web Pro News - Anonymous Launches #OpJapan Against Law That Would Imprison People Over Watching YouTube" href="http://www.webpronews.com/anonymous-launches-opjapan-against-law-that-would-imprison-people-over-watching-youtube-2012-06" target="_blank">OpJapan</a> and OpMegaupload, launched in response to proposed copyright legislation, it is when Anonymous activists defend the internet’s core freedoms and expose the shadowy workings of state and corporate surveillance that it has the most impact. The NSA news story about the exigent <a title="Public Radio International - National Security Agency calls hacktivist group 'Anonymous' a threat to national security" href="http://www.pri.org/stories/politics-society/government/nsa-declares-anonymous-a-threat-to-national-security-8559.html" target="_blank">threat</a> from Anonymous failed to gain traction in the public consciousness. Perhaps it would have if it had come earlier, for instance between May and July 2011, at the height of attacks led by Lulzsec.</p>
	<p><div id="attachment_42581" class="wp-caption alignleft" style="width: 334px"><img class=" wp-image-42581  " title="Anonymous launched Operation Megaupload" src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/megaupload-sezed-shutdown.gif" alt="" width="324" height="236" /><p class="wp-caption-text">Anonymous launched Operation Megaupload</p></div></p>
	<p>In contrast to most Anonymous actions, <a title="BBC - Lulzsec hacker pleads guilty over Sony attack" href="http://www.bbc.co.uk/news/technology-19949624" target="_blank">Lulzsec</a>, a break-away hacker group, acted whimsically, its hacks not always tethered to a political issue. Lulzsec sometimes hacked to make a political statement and, in other instances, for lulz, internet slang for laughs. During this period, media attention, which was colossal, was most heavily focused on Anonymous as hackers rather than as a general protest group. Activities under the Anonymous banner, such as those of Lulzsec, show that even though Anonymous has gained a measure of respect because it champions free speech and privacy causes, it is also notorious for its irreverent and controversial approach to dissent.</p>
	<p>To be sure, most of its activities are legal, but a small subset of tactics – such as DDoS attacks and hacking – are illegal, a criminal offence under all circumstances. These tactics also score the most headlines. Some, like ‘doxing’ (the leaking of personal, sensitive information, such as social security numbers and home addresses), reside in a legal grey zone because mined information is found on publicly accessible websites. During the course of a single operation different participants might deploy all three modes – legal, illegal and legally grey tactics.</p>
	<p>Take Operation Bart, in August 2011. Anonymous focused on getting the word out when San Francisco Bay Area Rapid Transit (BART) officials disabled mobile phone reception on station platforms to thwart planned anti-police brutality protests. Soon after, Anonymous helped organise street demonstrations. But a couple of individuals also hacked into BART’s computers and released customer data in order to garner media attention – at least that’s how one participant explained the incident to Amy Goodman on television and radio programme Democracy Now. Someone also found a racy, semi-nude photo of BART’s official spokesperson Linton Johnson on his personal website, which was then republished on the ‘bartlulz’ website with considerable fanfare, along with the brazen rationalisation: ‘if you are going to be a dick to the public, then I’m sure you don’t mind showing your dick to the public.’</p>
	<p>During the course of an operation, vulnerability and weakness is often identified and exploited. These sorts of actions provoke controversy (even within Anonymous) and also find their way into headlines, boosting the group’s public profile. At times, members of the loose collective are purposely deceitful and propagate false information about their activities. This can be a tactic for self-protection in some cases, and in other cases an antic to coax headlines out of the media, which can be somewhat enamoured with <a title="Index on Censorship - Posts tagged hacking" href="http://www.indexoncensorship.org/tag/hacking/" target="_blank">hacking</a>.</p>
	<p>Antisec, one of the more well-known hacker groups affiliated with Anonymous, might claim an exploit without having actually been involved in the activity. Hackers will often rely on botnets – networks of compromised computers – to momentarily knock a website offline, but won’t advertise this fact in press releases. Between 10 and 11 September 2012, for instance, <a title="Guardian - AntiSec hacking group did not obtain Apple IDs from federal laptop, says FBI" href="http://www.guardian.co.uk/technology/2012/sep/04/fbi-denies-apple-id-hacking" target="_blank">Antisec</a> claimed to have procured 12 million unique device identification numbers from Apple iOS devices by hacking into an FBI agent’s laptop computer. As it turns out, while the identification numbers were verified, the source turned out to be an iPhone and iPad app developer, Blue Toad. Because tactics range from the frivolous to the controversial to the illegal and because it has been known to generate hype around its own activities, it can be easily targeted itself. Obfuscation and deceit contributes to Anonymous’s mystique and its power, but also makes it vulnerable to misinformation campaigns spread by others.</p>
	<p><div id="attachment_42610" class="wp-caption alignright" style="width: 334px"><img class=" wp-image-42610" style="margin-left: 10px; margin-right: 10px;" title="Antisec - One of the more well-known hacker groups affiliated with Anonymous" src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/AntiSec_top.gif" alt="" width="324" height="364" /><p class="wp-caption-text">Antisec &#8211; One of the more well-known hacker groups affiliated with Anonymous</p></div></p>
	<p>The biggest lesson that can be learned from Anonymous is that the internet will judge – often quite swiftly – the actions of individuals, corporations and governments. And by the internet I mean the countless hackers and geeks from São Paulo to Sydney who understand how the web works, a smaller class who know how to subvert routers and protocols, and a larger number who will rally when the internet and values associated with it are in danger.</p>
	<p>This is not to say that every geek and hacker supports Anonymous. In fact, many rather dislike it or its controversial tactics, such as DDoS; some hackers are resolute and unyielding in their view that DDoS is a species of censorship in itself. There are also many different ways to defend the internet, such as writing open source software or joining the <a title="The Pirate Party" href="http://www.pirateparty.org.uk/" target="_blank">Pirate Party</a>. Anonymous is a distinct, emerging part of this diverse and burgeoning political landscape. Its real threat may lie not so much in its ability to organise cyberattacks but in the way it has become a beacon, a unified front against censorship and surveillance.</p>
	<p>It might be best thought of as the irascible and provocative protest wing of the internet’s nascent free speech and <a title="Index on Censorship - Posts tagged privacy" href="http://blog.indexoncensorship.org/tag/privacy/" target="_blank">privacy</a> movement. Though it works to publicise specific issues at the most inconvenient time for the individual, group or company being exposed, it also brings into sharp focus an important trend, dramatising the value of privacy and anonymity in an era where both are rapidly eroding.</p>
	<p>Anonymous, of course, champions anonymity, and this is echoed in both the iconography associated with it and its ethical codes. Seeking individual recognition and especially fame is taboo, for example; you are expected to do work for the team, not for one’s own personal benefit or status. The movement, therefore, provides a rare countermeasure in deeds, words and symbols against a world that encourages people to reveal their lives, where the internet remembers everything about us, where our histories are permanently stored in search indexes and government databases – and at a time when governments’ ability to surveil its citizens has grown exponentially thanks to low-cost, ubiquitous digital technologies and new public-private partnerships.</p>
	<p>&nbsp;</p>
	<p>However explosive Anonymous is today, its continued presence on the world stage is certainly not guaranteed to last. It is plagued by infighting, fragmentation, as well as brand fatigue. Paranoia exploded in spring 2012 after the news broke that Hector Xavier Monsegur, known more commonly by his hacker handle ‘Sabu’, had been exposed as an FBI informant. Most troubling for its long-term survival is government crackdown: since summer 2011, over 100 alleged participants have been arrested around the globe, from Romania, Turkey, Italy, the UK, the US, Chile and Germany. But even if the loose-knit collective fades away, irreverent political protest on the internet is unlikely to end.</p>
	<p>Since 2008, when individuals started to organise diverse collective actions under the banner of Anonymous, a living model was created, demonstrating to the world what a radical politics of dissent on the internet looks like. Even if Anonymous was to vanish, its history, exploits and propaganda material are here to stay; there will likely be others — in different forms and with distinct twists — who will take its place.</p>
	<p>What is a little less clear is what will eventually become of <a title="Index on Censorship - Posts tagged internet freedom" href="http://www.indexoncensorship.org/tag/internet-freedom/page/2/" target="_blank">freedom of expression online</a>, given the increasing capabilities for surveillance, censorship and control all over the world. Is Anonymous merely the party at the funeral of online freedom? Or does it represent the irreverent clowns, rabble rousers, and tricksters who are keeping the reaper at bay and enabling others, from protesters on the street to elected representatives in parliament, to join the raucous political carnival and challenge threats to personal privacy and freedom?</p>
	<p><em>Gabriella Coleman is Wolfe Chair in Scientific and Technological Literacy at the Department of Art History and Communication Studies at McGill University. She tweets from @BiellaColeman</em></p>
	<h5><a href="http://indexoncensorship.org/Magazine/digital-frontiers/"><img class="alignright  wp-image-42390" title="Front cover of Digital Frontiers" src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/Front-cover-of-Digital-Frontiers-198x300.jpg" alt="" width="102" height="155" /></a>This article appears in <a title="Digital Frontiers" href="http://indexoncensorship.org/Magazine/digital-frontiers/" target="_blank"><em>Digital Frontiers.</em><em> Click here for subscription options and more</em></a></h5>
<p>The post <a href="http://www.indexoncensorship.org/2012/12/beacons-freedom-hacking-anonymous/">Beacons of freedom: The changing face of Anonymous</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/12/beacons-freedom-hacking-anonymous/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>Internet revolution in crisis</title>
		<link>http://www.indexoncensorship.org/2012/12/internet-global-itu-wcit/</link>
		<comments>http://www.indexoncensorship.org/2012/12/internet-global-itu-wcit/#comments</comments>
		<pubDate>Mon, 03 Dec 2012 22:27:28 +0000</pubDate>
		<dc:creator>Milton Mueller</dc:creator>
				<category><![CDATA[From the magazine]]></category>
		<category><![CDATA[News and Analysis]]></category>
		<category><![CDATA[International Telecommunication Union]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[Milton Mueller]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[World Conference on International Telecommunications]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=42757</guid>
		<description><![CDATA[<p><strong>WCIT 12</strong>:  Milton Mueller asks if governments are turning their backs on the global internet? A push to change the business model that delivers online content could stifle innovation and make the net an instrument of sovereignty, stuck behind national walled gardens</p><p>The post <a href="http://www.indexoncensorship.org/2012/12/internet-global-itu-wcit/">Internet revolution in crisis</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p><strong><em>WCIT 12:  Milton Mueller asks <strong><em>if governments are turning their backs on the global internet? A push to change the business model that delivers online content could stifle innovation and make the net an instrument of sovereignty,  stuck behind national walled gardens</em></strong></em></strong></p>
	<p>At the end of the 20th century, an incredible revolution took place. Barriers to the free flow of information were knocked down and a powerful cycle of technological innovation was set in motion, transforming the economy, first in the United States and then around the world.</p>
	<p>No, I am not  talking about the internet.</p>
	<p>I am referring to the liberalisation of the telecommunications industry, which led to a huge economic revolution in the 1980s and 1990s. It started with a big bang: the breakup of the AT&amp;T monopoly. As early as the mid- 1960s, policy-makers knew they didn’t want the emerging information services industry to be dominated and stifled by an enormous monopoly. The US Federal Communications Commission created a regulatory distinction between ‘basic’ and ‘enhanced’ services, ‘enhanced’ being defined as any transmission that included ‘information processing’. Information services would be unregulated and the market left wide open. This process began in the US and was followed by the largest economies in Europe and Asia. Technical standards escaped from the control of national governments and a huge number of new competitors entered the market. With global free trade agreements in place for IT equipment and telecommunication services, in 1995 and 1997 respectively, economic liberalisation of the industry was complete.</p>
	<p>Deregulation had profound consequences. The same infrastructure was used for both the transmission of information services (such as early emails, and data-sharing) and telephone calls, but businesses delivering information services were exempt from the entry restrictions and gatekeeping regulations levied on telephone companies. In the late 1980s, the US pried open space for what was then a largely experimental market, pushing for trade rules to internationalise these reforms. In that pre-internet period, countries such as Japan, the UK and Hong Kong saw no harm in opening up what was a tiny market. Little did those early negotiators know that they were clearing a path for the spread of the internet. Considered an ‘information service’ because it was essentially software run by computers, the internet spread over global telecommunications networks like wildfire. After 20 years, it would swallow up the massive telephone market and transform newspapers, television, radio, publishing and practically every other mode of communication.</p>
	<h5>The economic roots of internet freedom</h5>
	<p>Much of the freedom and openness we associate with the internet is not a product of its technology. Many respected scholars have promoted the notion that there is something about the internet’s ‘architecture’ or ‘design’ that magically makes information free. True, the internet’s design made it cheaper and easier to interconnect thousands of different networks and devices. But its technical potential could never have been realised without an open, liberal industry. Without the deregulation of information services, without the market economy in telecommunications, without diversity and competition among providers and free trade agreements that enable content and investment from anywhere in the world, there would be no internet freedom. Internet technology – TCP/IP protocols – can be installed in computers in North Korea, but it won’t make communications in that country free. If a repressive government owns and operates the telecommunications infrastructure, blocks trade in computer and telecom equipment, does not allow a free market for access, devices or services to develop, censors or jails dissident publishers and forces new online businesses to obtain permission to trade online, it’s easy to contain and control the internet.</p>
	<h5>A counter-revolution in the making?</h5>
	<p>The internet now dominates our communications environment. But older communication laws, regulations and policies have begun to haunt it. There is a tendency to try to make the internet like the old media, so that governments and interest groups can recreate the kinds of controls they once had. In particular, there are widespread attempts to reassert nation-state authority. In December 2012, the World Conference on International Telecommunications (WCIT) will take place in Dubai. The UN meeting will revise the International Telecommunication Union’s International Telecommunication Regulations (ITRs), a binding treaty intended to ‘facilitat[e] global interconnection and interoperability of telecommunications facilities’. The ITRs were established in 1988 – years before the internet had become a mainstream medium and just as telecommunications liberalisation was in full swing.</p>
	<p>The world has changed dramatically in the 25 years since the current ITRs were drafted. Since 1988, the internet’s technical standards community has used open working groups to develop or revise hundreds of new standards and make them available online for free. The ITU’s telecommunication standards development activities, in contrast, have shrunk and its revenue model, based on high membership fees granting exclusive access to official standards documents, has become unpopular. New private sector institutions, such as the Internet Corporation for Assigned Names and Numbers (ICANN) and regional internet registries, allow open public participation and set policy for infrastructure. In the ITU, in contrast, decisions are based on a one-country, one-vote calculus and ordinary internet users, digital rights advocates and civil society are not well represented. The</p>
	<p>Dubai conference represents a crossroads for the future of telecommunications: the ITU must update its treaty to take account of the internet or risk slipping into historical irrelevance. It’s as if the internet is now being visited by the ghosts of telecommunications past.</p>
	<p>Some alarmists have claimed that proposed revisions to the treaty threaten internet freedom, presenting it as a ‘takeover’ plot by authoritarian governments in the ITU, a premeditated attempt to subjugate the internet to states once and for all. Although these fears have gained an enormous amount of publicity, they are largely unfounded. Aside from polarising the dialogue, they tend to divert attention from the real issues.</p>
	<p>The ITU is in no position to assert control over the internet’s domain name or addressing systems or its open standard-setting processes. The ITRs cannot really impose global content regulation. The ITU has no enforcement or policing capabilities; it relies entirely on member states to apply and enforce its rules. No democratic governments will agree to impose Chinese-style censorship on their local internet users simply because of an ITU regulation or guideline. Besides, as the case of China makes clear, national governments already  have the authority to censor and regulate internet users if they want to.</p>
	<p>The potential dangers emerging from WCIT negotiations are more subtle. Decisions taken during the conference could undermine the economic liberalism of the communications sector. One of the most progressive and important parts of the 1988 regulations was Article 9, a short annex entitled ‘Special Arrangements’. It allowed companies to privately negotiate how ‘special telecommunication networks, systems, and services’ operate. Most agreements concerning internet connections are made possible under this provision. Revised regulations could pull web interconnections into a more burdensome regulatory regime. Some governments and telecom companies (many of which are still monopolies and/or state-owned) want to turn national telecom operators into gatekeepers of internet services, applications and content, which could lead to fragmentation of the internet. Some telephone companies are trying to apply old charging models to internet traffic, as if requesting a web page or video was like making an international telephone call. This could make the internet more expensive for users or stifle business models based on different charging models. It could open the door to charging schemes designed to subsidise national operators at the expense of service providers that rely on the telecommunications infrastructure but do not own it, such as YouTube or Skype.</p>
	<p>A more progressive approach would emphasise the gains of liberalisation. Countries should be encouraged to permit multiple, competing service providers and allow them to freely negotiate traffic exchange and content distribution deals. New regulations should affirm the basic principles underlying the World Trade Organisation’s free trade agreements and eliminate all forms of protectionism and national filtering of legitimate information services.</p>
	<h5>Cyberspace and national security</h5>
	<p>The Dubai conference will also consider proposals to include cybersecurity in the ITRs. Of course, security problems online are real and do need to be addressed. But it’s questionable whether effective solutions can be included in the new regulations and whether the ITU is the best authority to come up with them.</p>
	<p>At best, proposals to address security concerns are unfocused and a bit naïve. Member states are asked to ‘stop spam’, ‘protect data and network integrity’, ‘ensure internet security and stability’ or ‘supervise enterprises operating in their territory’. These proposals reveal the basic disconnect between the security problems of the internet and the ITRs. Cybercrime, spam, and cybersecurity issues involve not just network operations and standards but a complex interaction of hardware standards, software engineering, content and human behaviour. Cybersecurity also relates, of course, to the military, so problems relating to it go far beyond the ITU’s remit and capabilities. Attempts to regulate cybersecurity would vastly expand the scope of the ITU and erase the boundary between information services and telecommunications – with very little likelihood of being effective.</p>
	<p>At worst, proposals to deal with cybersecurity reveal nostalgia for the nationally-controlled telecommunications of the pre-internet era. Some proposals would try to prevent international communications that ‘interfere in [states’] internal affairs’ or that undermine ‘sovereignty, national security or territorial integrity’. These proposals have little support, and even if passed could not really shield states from ‘subversive content’ as long as the current liberal information services regime holds in most of the world. But underlying these proposals is an apparent belief that the borderless information flow of the internet is inconsistent with traditional approaches to national sovereignty and security. Even in the US, where the WCIT delegation defends the internet model, the increasingly popular notions of ‘critical infrastructure protection’ and the pursuit of superior cyber warfare capabilities threaten to militarise the internet and push communications back into national walled gardens.</p>
	<p>The internet flourished precisely because it was allowed to develop outside a state-dominated political environment where information and communications were seen as instruments of sovereignty, surveillance and power. The new communications and information sector was an instrument of global commerce, free trade, innovation and open culture. Internet freedom advocates must understand and support the economic institutions that made the internet revolution possible. The most important negotiations at WCIT will not be about censoring content or taking over domain registration. They will be about whether the telecommunications revolution will be allowed to continue, or whether it will be pushed in the opposite direction.</p>
	<p>©Milton Mueller</p>
	<p><em>Milton Mueller is professor at Syracuse University School of Information Studies and the author of <a title="Amazon: Networks and States" href="http://www.amazon.com/Networks-States-Governance-Information-Revolution/dp/0262014599" target="_blank">Networks and States</a>: The Global Politics of Internet Governance (MIT Press) revolution in crisis</em></p>
	<h5>What can you do?</h5>
	<p><strong>Index and many other civil society organisations that fight for free speech and internet freedom oppose moves to give the <a href="http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/" rel="bookmark">ITU authority over the internet</a>. Join more than 33,000 other citizens from 166 nations and <strong><a title="Protect Global Internet Freedom" href="/http://www.protectinternetfreedom.net/" target="_blank">sign here</a> to </strong>ask your nation&#8217;s leaders to <a title="Protect Global Internet Freedom" href="/http://www.protectinternetfreedom.net/" target="_blank">protect global internet freedom</a></strong></p>
	<p style="text-align: center;"><a href="http://www.protectinternetfreedom.net"><img class=" wp-image-42853 aligncenter" title="ProtectInternetFreedom" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/ProtectInternetFreedom.gif" alt="" width="600" height="159" /></a></p>
	<p><strong>If you are an academic or work for a civil society organisation &#8212; join us by <a href="https://www.cdt.org/letter/sign-letter-opposing-itu-authority-over-internet  " target="_blank">signing on here</a> and send the letter to government officials who are participating in the ITU process</strong></p>
	<p>&nbsp;
</p>
<p>The post <a href="http://www.indexoncensorship.org/2012/12/internet-global-itu-wcit/">Internet revolution in crisis</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/12/internet-global-itu-wcit/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>The obscure threat to the internet you need to know about</title>
		<link>http://www.indexoncensorship.org/2012/12/the-itrs-threaten-multi-stakeholder-internet-governance/</link>
		<comments>http://www.indexoncensorship.org/2012/12/the-itrs-threaten-multi-stakeholder-internet-governance/#comments</comments>
		<pubDate>Sun, 02 Dec 2012 19:27:05 +0000</pubDate>
		<dc:creator>Dominique Lazanski</dc:creator>
				<category><![CDATA[digital]]></category>
		<category><![CDATA[Headline Featured]]></category>
		<category><![CDATA[News and Analysis]]></category>
		<category><![CDATA[Azerbaijan]]></category>
		<category><![CDATA[Dominique Lazanski]]></category>
		<category><![CDATA[International Telecommunications Union]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[Internet Governance Forum]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[World Conference on Information Technology]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=42475</guid>
		<description><![CDATA[<p>As an arcane UN body seeks new relevance and campaigns to take over internet governance, <strong>Dominique Lazanski</strong> outlines the risks it poses to <strong>net freedom and free speech</strong></p><p>The post <a href="http://www.indexoncensorship.org/2012/12/the-itrs-threaten-multi-stakeholder-internet-governance/">The obscure threat to the internet you need to know about</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p><strong><img class="alignright" title="Protect Global Internet Freedom" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcRTKhaMA1NOX4evfRTDDiMe2IH72SGkpOQzTn-Nzam6K-Vjmkylug" alt="" width="133" height="89" />As an arcane UN body seeks new relevance and campaigns to take over internet governance, Dominique Lazanski &#8212; a member of the UK WCIT-12 delegation &#8212; outlines the risks it poses to net freedom and free speech</strong></p>
	<p><span id="more-42475"></span></p>
	<p>At the beginning of November I traveled to Baku, Azerbaijan, to attend the <a title="Index on Censorship - Index tells policy makers to keep the internet free" href="http://www.indexoncensorship.org/2012/11/internet-governance-forum/" target="_blank">Internet Governance Forum</a>. As the imported London taxi cabs zipped along the streets, my old school friend who now lives in Baku explained to me that in preparation for the <a title="Index on Censorship - Azerbaijan after Eurovision" href="http://www.indexoncensorship.org/2012/07/azerbaijan-eurovision-crackdown/" target="_blank">Eurovision</a> Song Contest earlier this year, the government built new facades on the ageing, Soviet buildings in order to revitalise the fronts of the buildings that face the street. This temporary veneer, placed on top of a series of ever crumbling structures and not designed to last, reminded me of the what the International Telecommunications Union (ITU) is hoping to achieve in the World Conference on Information Technology (WCIT): make itself relevant, if only for a short while.</p>
	<p>WCIT begins tomorrow (December 3) and lasts for two weeks. This is where the much-discussed International Telecommunications Regulations (ITRs) treaty will be renegotiated and discussed for the first time since 1988. The ITU was founded in the 1860s as a single place in which telephone and telegraph standardisation could take place across multiple countries and territories with differing standards and payment systems. The ITRs as a treaty was one way in which this could be achieved through the ITU process, and the 1988 ITRs focused on telephone exchanging and payments.</p>
	<p><div id="attachment_42489" class="wp-caption aligncenter" style="width: 550px"><img class=" wp-image-42489" style="margin-left: 10px; margin-right: 10px;" title="The WCIT will take place in Dubai from 3 - 14 December" src="http://www.indexoncensorship.org/wp-content/uploads/2012/11/dubai.gif" alt="Demotix - David Mbiyu" width="540" height="396" /><p class="wp-caption-text">WCIT will take place in Dubai from 3 &#8211; 14 December</p></div></p>
	<p>Back in 1988 the internet was barely a twinkle in the eyes of those who participated in the last WCIT. The rapid growth of what we know today as the internet has<strong> </strong>hit the revenue of traditional telecommunications. We all know the story: the decentralised, pervasive information and communication network has grown rapidly providing <a title="Index on Censorship - Internet freedom? Not in Azerbaijan" href="http://www.indexoncensorship.org/2012/11/azerbaijan-internet-freedom/" target="_blank">freedom</a> of speech, opportunities and prosperity to all, including those in developing countries and the aged population in Europe. The benefits of the internet seem obvious to us, but at the WCIT those benefits and how they were achieved will be questioned.</p>
	<p>The current internet governance model is one in which all can participate. It is a multi stakeholder. The <a title="Index on Censorship - Letter from Baku" href="http://www.indexoncensorship.org/2012/11/letter-baku-azerbaijan/" target="_blank">Internet Governance Forum</a> that I just attended, along with members of Index on Censorship and other civil society groups, is the main, annual opportunity in which anyone who wants to attend – indeed any stakeholder – can participate. It is free of charge and invites all levels of experience and expression. Regional events throughout the year offer similar opportunities including those hosted by the Internet Society and the OECD.</p>
	<p>This model is currently under threat at the WCIT. The ITRs were never meant to have anything to do with the internet, but governments who attempt to control their own people, often unsuccessfully, through limited access to websites and other online services, are proposing to place tighter restrictions on the internet itself in the name of spam and cyber security through the treaty. The multi stakeholder model is not only under threat from them, but is also under threat from other proposals closer to home, like the &#8220;sender pay&#8221; model that European Telecommunications Network Operators (ETNO) has put forth which will require a payment from the originator of the web content. The list of other proposals that would fundamentally change the way the internet works goes on, but in all of these proposals, governments would be in control of i<a title="Index on Censorship - From Baku: Voices for internet freedom" href="http://blog.indexoncensorship.org/2012/11/08/voices-for-internet-freedom/" target="_blank">nternet governance</a> and it would no longer be a multi stakeholder model.</p>
	<p>The <a title="Center for Democracy and Technology - ITU Resource Center" href="https://www.cdt.org/issue/ITU" target="_blank">Center for Democracy and Technology</a> has done a fantastic job of highlighting these issues and they have tools and a <a title="CDT - Sign-on Letter Opposing ITU Authority Over the Internet  " href="https://www.cdt.org/letter/sign-letter-opposing-itu-authority-over-internet" target="_blank">joint letter</a> to sign up to. Dot next put all of the new proposals <a title="NXT - Why we are making all WCIT documents public" href="http://news.dot-nxt.com/2012/11/23/why-we-are-making-all-wcit-doc" target="_blank">online</a> for the ITRs recently, as did <a title="Wcitleaks - Bringing transparency to the ITU" href="http://wcitleaks.org/" target="_blank">WCIT Leaks</a>. The documents were previously only available to members of the ITU &#8212; and that does not include civil society. At the WCIT conference itself, only government delegations are allowed to attend. Though the UK and US have civil society members on their delegation, most countries will not. How can an international treaty on telecommunications which may now include the internet, not include all stakeholders who, for the last seven years, have been discussing internet governance at the Internet Governance Forum?</p>
	<p>So for the first two weeks in December, we will wait to see what exactly happens at the WCIT and what the new ITRs will look like. Many countries, including the UK, will seek to ensure that the ITRs and the resulting treaty remain as top-level principles, that will not force restrictive conditions that could change the internet. Many will not, however, seek to achieve this same goal. And for most of us who work in civil society groups, we will have no say in the final outcome. At the beginning of 2013 the ITU may have a new veneer called internet governance, but the same old, closed system of governing telecommunications will stand behind it, crumbling slowly despite its best attempts.</p>
	<p><em>Dominique Lazanski is the head of digital policy at the TaxPayers&#8217; Alliance and a member of the UK delegation to WCIT-12.</em></p>
	<h5>What can you do?</h5>
	<p><strong>Index and many other civil society organisations that fight for free speech and internet freedom oppose moves to give the <a href="http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/" rel="bookmark">ITU authority over the internet</a>. Join more than 33,000 other citizens from 166 nations and <strong><a title="Protect Global Internet Freedom" href="/http://www.protectinternetfreedom.net/" target="_blank">sign here</a> to </strong>ask your nation&#8217;s leaders to <a title="Protect Global Internet Freedom" href="/http://www.protectinternetfreedom.net/" target="_blank">protect global internet freedom</a></strong></p>
	<p style="text-align: center;"><a href="http://www.protectinternetfreedom.net"><img class=" wp-image-42853 aligncenter" title="ProtectInternetFreedom" src="http://www.indexoncensorship.org/wp-content/uploads/2012/12/ProtectInternetFreedom.gif" alt="" width="600" height="159" /></a></p>
	<p><strong>If you are an academic or work for a civil society organisation &#8212; join us by <a href="https://www.cdt.org/letter/sign-letter-opposing-itu-authority-over-internet  " target="_blank">signing on here</a> and send the letter to government officials who are participating in the ITU process</strong></p>
	<p>&nbsp;</p>
	<p>==
</p>
<p>The post <a href="http://www.indexoncensorship.org/2012/12/the-itrs-threaten-multi-stakeholder-internet-governance/">The obscure threat to the internet you need to know about</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/12/the-itrs-threaten-multi-stakeholder-internet-governance/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Index opposes ITU authority over the internet</title>
		<link>http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/</link>
		<comments>http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/#comments</comments>
		<pubDate>Mon, 10 Sep 2012 17:15:03 +0000</pubDate>
		<dc:creator>Daisy Williams</dc:creator>
				<category><![CDATA[Campaigns]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[digital freedom]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[Internet Governance]]></category>
		<category><![CDATA[ITU]]></category>
		<category><![CDATA[WCIT]]></category>

		<guid isPermaLink="false">http://www.indexoncensorship.org/?p=39679</guid>
		<description><![CDATA[<p><strong>Index</strong> joins civil society groups in voicing concerns about proposals made by the International Telecommunication Union that would threaten the openness of the internet</p><p>The post <a href="http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/">Index opposes ITU authority over the internet</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></description>
				<content:encoded><![CDATA[	<p><img class="alignright size-full wp-image-33225" title="Index logo x" src="http://www.indexoncensorship.org/wp-content/uploads/2012/02/x.jpg" alt="Index logo x" width="140" height="140" /><strong></strong><strong>Index joins civil society groups in voicing concerns about proposals made by the International Telecommunication Union (ITU) that would threaten the openness of the internet</strong><span id="more-39679"></span></p>
	<p>To Member States and Government Delegations of the International Telecommunication Union:</p>
	<p>In the interests of promoting and protecting global Internet openness and the exercise of human rights online, we <a title="CDT - Sign-on Letter Opposing ITU Authority Over the Internet  " href="https://www.cdt.org/letter/sign-letter-opposing-itu-authority-over-internet" target="_blank">write to urge</a> International Telecommunication Union (ITU) member states and their delegates to the World Conference on International Telecommunications (WCIT) to refrain from expanding the scope of the International Telecommunication Regulations (ITRs) treaty to include the Internet.</p>
	<p>At the WCIT, governments will consider proposals that would expand the scope of the ITRs to include the Internet. Such expansion could have a significant negative impact on the Internet’s openness, its positive effects on economic growth, and the human rights of citizens.</p>
	<p>As recently reaffirmed by the UN Human Rights Council, governments have a duty to protect human rights when making <a title="Index on Censorship- Free speech blog: Who controls the internet?" href="http://blog.indexoncensorship.org/2012/08/28/who-controls-the-internet/" target="_blank">policy decisions for the Internet.</a> However, while the ITU has extensive expertise in telecommunications policy and regulation, we do not believe that it is the appropriate forum to develop policies and standards that could affect the exercise of human rights on the Internet.</p>
	<p>Further, the ITU maintains a relatively closed, non-transparent decision-making process in which only governments are allowed full participation. In contrast, the Internet has flourished under an open, decentralized model of governance, where groups representing business, the technical community, and Internet users as well as governments focus on different issues in a variety of forums. In keeping with the World Summit on Information Society commitments, we believe that such open, inclusive processes are necessary to ensure that policies and technical standards for the global Internet preserve the medium’s decentralized and open nature and protect the human rights of its users.</p>
	<p>In recent months, many civil society groups have urged the ITU to reform its process so that it is fully transparent and open to participation by all relevant stakeholders. Advocates have pushed for these changes not only because we believe that transparency and participation are the best approach, even with respect to telephony, but also because we feared that certain countries’ proposals would pose grave threats to human rights on the Internet. Leaked documents detailing proposals for the WCIT have confirmed these fears. Thus, we both continue to call on member states to provide full transparency and open participation to all relevant stakeholders as they prepare for the WCIT, and urge all delegates to reject proposals that would threaten openness and human rights online.</p>
	<p>We call on member states to:</p>
	<ul>
	<li>Hold a transparent, inclusive preparatory process for the WCIT that is open to all relevant stakeholders. We ask that governments:</li>
	<li>Publicly release WCIT proposals and position papers, documents from regional meetings they have participated in, and documents issued by other member states.</li>
	<li>Hold open, public consultations on the WCIT so that delegates may fully consider the interests of citizens as well as those of business and government.</li>
	<li>Inform citizens of the positions member states intend to take at the WCIT on key proposals made by other governments.</li>
	</ul>
	<p>Oppose expansion of the International Telecommunication Regulations to the Internet. We ask that delegates:</p>
	<ul>
	<li>Rigorously examine proposals for their impact on human rights, Internet openness, innovation, and ICT access and development.</li>
	<li>Oppose proposals that would diminish the rights of users or limit Internet openness.</li>
	</ul>
	<p>Sincerely,</p>
	<p>Index on Censorship<br />
Access<br />
Article 19<br />
Association of Digital Culture,Taiwan<br />
Asociación por los Derechos Civiles, Argentina<br />
Association for Progressive Communications<br />
Bytes For All, Pakistan<br />
Cambodian Center for Human Rights, Cambodia<br />
Center for Democracy &amp; Technology, US<br />
Center for Technology and Society &#8211; FGV, Brasil<br />
Committee to Protect Journalists<br />
Consumers International<br />
Derechos Digitales, Chile<br />
Eduardo Bertoni, Centro de Estudios en Libertad<br />
de Expresión y Acceso a la Información (CELE),<br />
Universidad de Palermo, Argentina<br />
European Digital Rights<br />
Friedrich-Ebert-Stiftung, Pakistan<br />
Fundación Karisma, Colombia<br />
Human Rights in China, US<br />
Human Rights Watch<br />
Internet Democracy Project, India<br />
Internet Society &#8211; Bulgaria<br />
Kictanet, Kenya<br />
La Quadrature du Net, France<br />
Nawaat, Tunisia<br />
Open Rights Group, UK<br />
Open Technology Institute, US<br />
Panoptykon, Poland<br />
Public Knowledge, US<br />
Reporters Without Borders<br />
Thai Netizen Network</p>
	<h3>This letter is open for rolling sign-on. To sign, please contact <a href="mailto:signon@cdt.org">signon (at) cdt.org</a></h3>
	<p>&nbsp;
</p>
<p>The post <a href="http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/">Index opposes ITU authority over the internet</a> appeared first on <a href="http://www.indexoncensorship.org">Index on Censorship</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.indexoncensorship.org/2012/09/index-opposes-itu-authority-over-the-internet/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using disk: enhanced

 Served from: www.indexoncensorship.org @ 2013-05-18 05:40:26 by W3 Total Cache --