Contents: The big squeeze

[vc_row][vc_column][vc_custom_heading text=”Contributors include Richard Sambrook, Dominic Grieve, Roger Law, Karim Miské, Mark Frary and Canan Coşkun”][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]

The spring issue of Index on Censorship magazine looks at how pressures on free speech are currently coming from many different angles, not just one. Richard Sambrook, former director of global news at the BBC, shows how journalists are in a bind, caught between what advertisers want and what readers want. Also looking at journalists, Duncan Tucker casts his eye on the grave situation in Mexico, where getting to the truth involves working against the government, violent cartels and even coworkers.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”88802″ img_size=”full”][/vc_column_inner][/vc_row_inner][vc_column_text]

Meanwhile, in the Maldives Zaheena Rasheed shows how a mix of forces conspire against those who want to write anything beyond the usual tourist sale pitch.

But the squeezes on free expression don’t just concern journalists. Annemarie Luck reports from Japan, where penis festivals are popular, but women struggle to discuss their own bodies. Can they find a voice through art and manga? For musician Smockey from Burkina Faso, art should indeed be a way to confront truth and yet that’s not always the case. Expectations run high for him to not be “too political” in his lyrics.

Universities, normally the cradle of free expression, aren’t faring too well either, as two articles show. Jan Fox reports from the USA, where bias response teams are becoming a staple of US collegiate life. In South Africa Fees Must Fall has created a divide between right and left, writes Natasha Joseph, with neither side talking to each other and those in the middle being silenced altogether.

Outside of our special report, Roger Law, creator of the iconic TV satire Spitting Image, talks about the great fun he had with the series back in the day and questions whether the show would be able to air today. Alfonso Lázaro de la Fuente might say no. He was one of the Spanish puppeteers arrested last year for a show that referenced Basque-separatist organisation ETA. In an Index exclusive, he explains what the charges have meant for his personal and professional life.

Want to know how to spot fake news? Then read Reel-time news in which Index’s team of experienced global reporters offer tips on how to spot fake news from a mile/screen away. And don’t miss Martin Rowson‘s fake o’clock news, a hilarious – and sinister – take on what a future of alternative facts would look like.

Index also publish an interview with Turkish journalist Canan Coşkun, whose coworkers are currently in jail, and a pair of writers discuss the situation of free speech in Poland, which is tumbling down global charts following the election of the Law and Justice party. And in the UK, former attorney general Dominic Grieve reveals that MPs are avoiding hard talk in parliament.

Finally, the culture section includes a short story from award-winning French writer Karim Miské and original work from Vyacheslav Huk, a Crimean novelist who is unable to publish work in his mother tongue.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”SPECIAL REPORT: THE BIG SQUEEZE” css=”.vc_custom_1481731933773{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

The Big Squeeze: Freedom of speech under pressure

Fact-filled future? by Rachael Jolley: Journalists need to step up, and produce more detailed news coverage. The public needs it

Between a rock and a hard place, by Duncan Tucker: Mexico’s journalists face threats from cartels, the government and each other

Reality rapped, by Smockey: An award-winning musician from Burkina Faso explains why he won’t water down his lyrics to avoid rocking the boat, despite pressure to do so

Talking a tightrope, by
 Kaya Genç: Despite the crackdown in Turkey, the post-Gezi spirit still survives among the determined

Taking the bait, by Richard Sambrook: The quest for instant gratification online is seriously compromising news reporting 

Dangerous minds, by Natasha Joseph: Rather than creating an alliance, Fees Must Fall is limiting free speech at South Africa’s universities, leaving some early supporters disheartened 

Japan’s Madonna complex, by Annemarie Luck: Japan’s contradictory attitudes include highly sexualised images of women and women not being allowed to talk about sex-related subjects

Squeezed in the closet, by Hannah Leung: Get married and be quiet are the messages China’s LGBT community is given 

Degrees of separation, by Jan Fox: The author investigates units appearing on US campuses suggesting students should report lecturers who they feel are biased

Dying to tell a story, by Sadaf Saaz: The list of what Bangladesh writers cannot talk about is getting longer, but that isn’t stopping some from writing

Trouble in paradise, by Zaheena Rasheed: Behind the image of palm-lined beaches is a side of the Maldives the government doesn’t want you to see

Your cover is shown, by Mark Frary: Tech giants and governments are out to get your data. Soon it might be impossible to remain anonymous 

Stripsearch cartoon, by Martin Rowson: Tune in to the fake o’clock news

Composing battle lines, by Steven Borowiec: Why have South Korean pop stars found themselves caught in crossfire between their country and China?

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”IN FOCUS” css=”.vc_custom_1481731813613{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

We have no time for fear, by Canan Coşkun: A Turkish journalist on the perils of reporting in her country when fellow reporters are imprisoned 

Reel-time news, by Natasha Joseph, Kaya Genç, Jemimah Steinfeld, Duncan Tucker, Abraham T Zere, Raymond Joseph: As “fake news” dominates headlines, Index’s global team of experienced journalists offers tips on how to spot falsehoods before you click and share

Singing from the same hymn sheet, by Suhrith Parthasarathy: Rising Indian nationalism is creating a repressive state where non-conformity is deemed unpatriotic  

Poland: Special Focus, by Wojciech Przybylski, Marcin Król: Poland has gone from free speech hero to villain almost overnight. Two writers discuss the shift and why history is being rewritten 

Shooting from the hip, by Irene Caselli: A new mayor in a Mexican border city believes he will make it less dangerous for journalists  

Silence in the house, by Dominic Grieve: The former UK attorney general says MPs are shying away from tough topics in parliament

Puppet masters, by Roger Law: The creator of iconic TV satire Spitting Image on whether we still have our sense of humour

Drawing the line, by John Power: Australia is debating free speech, one cartoon at a time. Cartoonist Bill Leak interviewed just before he died

Puppet state, by Alfonso Lázaro de la Fuente: A Spanish puppeteer, arrested after terrorism charges related to a show, discusses the impact on his life

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”CULTURE” css=”.vc_custom_1481731777861{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Novel take on terror, by
 Karim Miské: The award-winning crime writer on why fiction and reality overlap. Plus his short story featuring a future where tech rules supreme. Interview by Sally Gimson

The war of the words, by Amira Hanafi: Translated extracts from an American-Egyptian writer’s project to capture the shifting linguistic landscape in Egypt since 2011. Interview by Sally Gimson

Crimean closedown, by Vyacheslav Huk: The Crimean novelist on being unable to publish in his mother tongue and a story of the narrator’s memories. Introduced and translated by Steve Komarnyckyj

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”COLUMNS” css=”.vc_custom_1481732124093{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Index around the world, by
 Kieran Etoria-King: What to look out for at Index’s Freedom of Expression Awards 2017, alongside news of other projects that Index has been working on in the last few months 

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”END NOTE” css=”.vc_custom_1481880278935{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Getting print out, by Jemimah Steinfeld: Self-publishing may be a new solution to censorship in China and other countries 

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”SUBSCRIBE” css=”.vc_custom_1481736449684{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]Index on Censorship magazine was started in 1972 and remains the only global magazine dedicated to free expression. Past contributors include Samuel Beckett, Gabriel García Marquéz, Nadine Gordimer, Arthur Miller, Salman Rushdie, Margaret Atwood, and many more.[/vc_column_text][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”76572″ img_size=”full”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]In print or online. Order a print edition here or take out a digital subscription via Exact Editions.

Copies are also available at the BFI, the Serpentine Gallery, MagCulture, (London), News from Nowhere (Liverpool), Home (Manchester), Calton Books (Glasgow) and on Amazon. Each magazine sale helps Index on Censorship continue its fight for free expression worldwide.

SUBSCRIBE NOW[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

How to stay anonymous online

[vc_row][vc_column][vc_column_text]

CREDIT: ra2studio / Shutterstock

CREDIT: ra2studio / Shutterstock

Securing your connection

Activists in countries where the web is heavily censored and internet traffic is closely monitored know that using a virtual private network or VPN is essential for remaining invisible.

A VPN is like a pair of curtains on a house: people know you are in but cannot see what you are doing. This is achieved by creating an encrypted tunnel via a private host, often in another country, through which your internet data flows. This means that anyone monitoring web traffic to find out persons of interest is unable to do so. However, the very fact that you are using a VPN may raise eyebrows.

An increasing number of VPNs promise truly anonymous access and do not log any of your activity, such as ExpressVPN and Anonymizer. However, access to some VPN providers is blocked in some countries and their accessibility is always changeable.

Know your onions

One of the internet’s strengths is also one of its weaknesses, at least as far as privacy is concerned. Traffic passes over the internet in data packets, each of which may take a different route between sender and recipient, hopping between computer nodes along the way. This makes the network resilient to physical attack – since there is no fixed connection between the endpoints – but also helps to identify the sender. Packets contain information on both the sender’s and recipient’s IP address so if you need anonymity, this is a fatal flaw.

“Onion” routing offers more privacy. In this, data packets are wrapped in layers of encryption, similar to the layers of an onion. At each node, a layer of encryption is removed, revealing where the packet is to go next, the benefit being that the node only knows the address details of the preceding and succeeding nodes and not the entire chain.

Using onion routing is not as complicated as it may sound. In the mid-1990s, US naval researchers created a browser called TOR, short for The Onion Routing project, based on the concept and offered it to anyone under a free licence.

Accessing the dark web with the Tor browser is a powerful method of hiding identity but is not foolproof. There are a number of documented techniques for exploiting weaknesses and some people believe that some security agencies use these to monitor traffic.

Put the trackers off your scent

Every time you visit a popular website, traces of your activity are carefully collected and sifted, often by snippets of code that come from other parts of the web. A browser add-on called Ghostery (ghostery.com) can show you just how prevalent this is. Firing up Ghostery on a recent visit to The Los Angeles Times website turned up 102 snippets of code designed to track web activity, ranging from well-known names such as Facebook and Google but also lesser known names such as Audience Science and Criteo.

While some of this tracking has legitimate uses, such as to personalise what you see on a site or to tailor the ads that appear, some trackers, particularly in countries where there are lax or no rules about such things, are working hard to identify you.

The problem is that trackers can work out who you are by jigsaw identification. Imagine you have visited a few places on the web, including reading an online article in a banned publication and then flicking through a controversial discussion forum. A third-party tracker used for serving ads can now learn about this behaviour. If you then subsequently log into another site, such as a social network, that includes your identity, this information can suddenly be linked together. Open-source browser extensions such as Disconnect (disconnect.me) offer a way to disable such trackers.

Use the secure web

A growing number of popular websites force visitors to connect to them securely. You can tell which ones because their addresses begin with https rather than http. Using https means that the website you are visiting will be authenticated and that your communications with the site are encrypted, stopping so-called man-in-the-middle attacks – where a malicious person sits between two people who believe they are communicating directly with each other and alters what is being communicated. Google, as well as using https for both Gmail and search, is also encouraging other websites to adopt it by boosting such sites up the search rankings.

Rather than remembering to check you are using https all the time, some people employ a browser extension created by the Electronic Frontier Foundation and the Tor Project called HTTPS Everywhere  to do it for them. It is available for Chrome, Firefox and Opera and forces browsers to user https versions of sites where available.

Hide your fingerprints

Traditional identification methods on the web rely on things like IP addresses and cookies, but some organisations employ far more sophisticated techniques, such as browser fingerprinting. When you visit a site, the browser may share information on your default language and any add-ons and fonts you have installed. This may sound innocuous, but this combination of settings may be unique to you and, while not letting others know who you are, can be used to associate your web history with your browser’s fingerprint. You can see how poorly you are protected by visiting panopticlick.eff.org.

One way to try to avoid this is to use a commonly used browser set-up, such as Chrome running on Windows 10 and only common add-ins activated and the default range of fonts. Turning off Javascript can also help but also makes many sites unusable. You can also install the EFF’s Privacy Badger browser add-on to thwart invisible trackers.

Mark Frary is a journalist and co-author of You Call This The Future?: The Greatest Inventions Sci-Fi Imagined and Science Promised (Chicago Review Press, 2008)

This article is  from the Autumn issue of Index on Censorship Magazine. You can order your copy here, or take out a digital subscription via Exact Editions. Copies are also available at the BFI, the Serpentine Gallery, MagCulture, (London), News from Nowhere (Liverpool), Home (Manchester), Calton Books (Glasgow) and on Amazon. Each magazine sale helps Index on Censorship continue its fight for free expression worldwide.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”From the Archives”][vc_row_inner][vc_column_inner width=”1/3″][vc_single_image image=”90642″ img_size=”213×289″ alignment=”center” onclick=”custom_link” link=”http://journals.sagepub.com/doi/pdf/10.1080/03064220008536724″][vc_custom_heading text=”Anonymous now” font_container=”tag:p|font_size:24|text_align:left” link=”url:http%3A%2F%2Fjournals.sagepub.com%2Fdoi%2Fpdf%2F10.1080%2F03064220008536724|||”][vc_column_text]

May 2000

Surfing through cyberspace leaves a trail of clues to your identity. Online privacy can be had but it doesn’t come easy, reports Yaman Akdeniz.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_single_image image=”89179″ img_size=”213×289″ alignment=”center” onclick=”custom_link” link=”http://journals.sagepub.com/doi/pdf/10.1080/03064220701738651″][vc_custom_heading text=”Evasion tactics” font_container=”tag:p|font_size:24|text_align:left” link=”url:http%3A%2F%2Fjournals.sagepub.com%2Fdoi%2Fpdf%2F10.1080%2F03064220701738651|||”][vc_column_text]

November 2007

Nart Villeneuve provides an overview of how journalists and bloggers around the world are protecting themselves from censorship.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_single_image image=”89164″ img_size=”213×289″ alignment=”center” onclick=”custom_link” link=”http://journals.sagepub.com/doi/pdf/10.1177/0306422010363345″][vc_custom_heading text=”Tools of the trade” font_container=”tag:p|font_size:24|text_align:left” link=”url:http%3A%2F%2Fjournals.sagepub.com%2Fdoi%2Fpdf%2F10.1177%2F0306422010363345|||”][vc_column_text]

March 2010

As filtering becomes increasingly commonplace, Roger Dingledine reviews the options for beating online censorship.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_separator][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_custom_heading text=”The unnamed” font_container=”tag:p|font_size:24|text_align:left” link=”url:%20https%3A%2F%2Fwww.indexoncensorship.org%2F2017%2F09%2Ffree-to-air%2F|||”][vc_column_text]The autumn 2016 Index on Censorship magazine explores topics on anonymity through a range of in-depth features, interviews and illustrations from around the world.

With: Valerie Plame Wilson, Ananya Azad, Hilary Mantel[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”80570″ img_size=”medium” alignment=”center” onclick=”custom_link” link=”https://www.indexoncensorship.org/2016/11/the-unnamed/”][/vc_column][vc_column width=”1/3″][vc_custom_heading text=”Subscribe” font_container=”tag:p|font_size:24|text_align:left” link=”url:https%3A%2F%2Fwww.indexoncensorship.org%2Fsubscribe%2F|||”][vc_column_text]In print, online. In your mailbox, on your iPad.

Subscription options from £18 or just £1.49 in the App Store for a digital issue.

Every subscriber helps support Index on Censorship’s projects around the world.

SUBSCRIBE NOW[/vc_column_text][/vc_column][/vc_row]

Contents: The unnamed

[vc_row][vc_column][vc_custom_heading text=”Does anonymity need to be defended? Contributors include Hilary Mantel, Can Dündar, Valerie Plame Wilson, Julian Baggini, Alejandro Jodorowsky and Maria Stepanova “][vc_row_inner][vc_column_inner width=”1/2”][vc_column_text]

The latest issue of Index on Censorship explores anonymity through a range of in-depth features, interviews and illustrations from around the world. The special report looks at the pros and cons of masking identities from the perspective of a variety of players, from online trolls to intelligence agencies, whistleblowers, activists, artists, journalists, bloggers and fixers.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”78078″ img_size=”full”][/vc_column_inner][/vc_row_inner][vc_column_text]

Former CIA agent Valerie Plame Wilson writes on the damage done when her cover was blown, journalist John Lloyd looks at how terrorist attacks have affected surveillance needs worldwide, Bangladeshi blogger Ananya Azad explains why he was forced into exile after violent attacks on secular writers, philosopher Julian Baggini looks at the power of literary aliases through the ages, Edward Lucas shares The Economist’s perspective on keeping its writers unnamed, John Crace imagines a meeting at Trolls Anonymous, and Caroline Lees looks at how local journalists, or fixers, can be endangered, or even killed, when they are revealed to be working with foreign news companies. There are are also features on how Turkish artists moonlight under pseudonyms to stay safe, how Chinese artists are being forced to exhibit their works in secret, and an interview with Los Angeles street artist Skid Robot.

Outside of the themed report, this issue also has a thoughtful essay by novelist Hilary Mantel, called Blot, Erase, Delete, about the importance of committing to your words, whether you’re a student, an author, or a politician campaigner in the Brexit referendum. Andrey Arkhangelsky looks back at the last 10 years of Russian journalism, in the decade after the murder of investigative reporter Anna Politkovskaya. Uzbek writer Hamid Ismailov looks at how metaphor has taken over post-Soviet literature and prevented it tackling reality head-on. Plus there is poetry from Chilean-French director Alejandro Jodorowsky and Russian writer Maria Stepanova, plus new fiction from Turkey and Egypt, via Kaya Genç and Basma Abdel Aziz.

There is art work from Molly Crabapple, Martin Rowson, Ben Jennings, Rebel Pepper, Eva Bee, Brian John Spencer and Sam Darlow.

You can order your copy here, or take out a digital subscription via Exact Editions. Copies are also available at the BFI, the Serpentine Gallery, MagCulture, (London), News from Nowhere (Liverpool), Home (Manchester), Calton Books (Glasgow) and on Amazon. Each magazine sale helps Index on Censorship continue its fight for free expression worldwide.

Index on Censorship magazine was started in 1972 and remains the only global magazine dedicated to free expression. Past contributors include Samuel Beckett, Gabriel García Marquéz, Nadine Gordimer, Arthur Miller, Salman Rushdie, Margaret Atwood, and many more.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”SPECIAL REPORT: THE UNNAMED” css=”.vc_custom_1483445324823{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Does anonymity need to be defended?

Anonymity: worth defending, by Rachael Jolley: False names can be used by the unscrupulous but the right to anonymity needs to be defended

Under the wires, by Caroline Lees : A look at local “fixers”, who help foreign correspondents on the ground, can face death threats and accusations of being spies after working for international media

Art attack, by Jemimah Steinfeld: Ai Weiwei and other artists have increased the popularity of Chinese art, but censorship has followed

Naming names, by Suhrith Parthasarathy: India has promised to crack down on online trolls, but the right to anonymity is also threatened

Secrets and spies, by Valerie Plame Wilson: The former CIA officer on why intelligence agents need to operate undercover, and on the damage done when her cover was blown in a Bush administration scandal

Undercover artist, by Jan Fox: Los Angeles street artist Skid Robot explains why his down-and-out murals never carry his real name

A meeting at Trolls Anonymous, by John Crace: A humorous sketch imagining what would happen if vicious online commentators met face to face

Whose name is on the frame? By Kaya Genç: Why artists in Turkey have adopted alter egos to hide their more political and provocative works

Spooks and sceptics, by John Lloyd: After a series of worldwide terrorist attacks, the public must decide what surveillance it is willing to accept

Privacy and encryption, by Bethany Horne: An interview with human rights researcher Jennifer Schulte on how she protects herself in the field

“I have a name”, by Ananya Azad: A Bangladeshi blogger speaks out on why he made his identity known and how this put his life in danger

The smear factor, by Rupert Myers: The power of anonymous allegations to affect democracy, justice and the political system

Stripsearch cartoon, by Martin Rowson: When a whistleblower gets caught …

Signing off, by Julian Baggini: From Kierkegaard to JK Rowling, a look at the history of literary pen names and their impact

The Snowden effect, by Charlie Smith: Three years after Edward Snowden’s mass-surveillance leaks, does the public care how they are watched?

Leave no trace, by Mark Frary: Five ways to increase your privacy when browsing online

Goodbye to the byline, by Edward Lucas: A senior editor at The Economist explains why the publication does not name its writers in print

What’s your emergency? By Jason DaPonte: How online threats can lead to armed police at your door

Yakety yak (don’t hate back), by Sean Vannata: How a social network promising anonymity for users backtracked after being banned on US campuses

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”IN FOCUS” css=”.vc_custom_1481731813613{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Blot, erase, delete, by Hilary Mantel: How the author found her voice and why all writers should resist the urge to change their past words

Murder in Moscow: Anna’s legacy, by Andrey Arkhangelsky: Ten years after investigative reporter Anna Politkovskaya was killed, where is Russian journalism today?

Writing in riddles, by Hamid Ismailov: Too much metaphor has restricted post-Soviet literature

Owners of our own words, by Irene Caselli: Aftermath of a brutal attack on an Argentinian newspaper

Sackings, South Africa and silence, by Natasha Joseph: What is the future for public broadcasting in southern Africa after the sackings of SABC reporters?

“Journalists must not feel alone”, by Can Dündar: An exiled Turkish editor on the need to collaborate internationally so investigations can cross borders

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”CULTURE” css=”.vc_custom_1481731777861{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Bottled-up messages, by Basma Abdel Aziz: A short story from Egypt about a woman feeling trapped. Interview with the author by Charlotte Bailey

Muscovite memories, by Maria Stepanova: A poem inspired by the last decade in Putin’s Russia

Silence is not golden, by Alejandro Jodorowsky: An exclusive translation of the Chilean-French film director’s poem What One Must Not Silence

Write man for the job, by Kaya Genç: A new short story about a failed writer who gets a job policing the words of dissidents in Turkey

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”COLUMNS” css=”.vc_custom_1481732124093{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

Global view, by Jodie Ginsberg: Europe’s right-to-be-forgotten law pushed to new extremes after a Belgian court rules that individuals can force newspapers to edit archive articles

Index around the world, by
 Josie Timms: Rounding up Index’s recent work, from a hip-hop conference to the latest from Mapping Media Freedom

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”END NOTE” css=”.vc_custom_1481880278935{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-top: 15px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]

What ever happened to Luther Blissett? By Vicky Baker: How Italian activists took the name of an unsuspecting English footballer, and still use it today

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”SUBSCRIBE” css=”.vc_custom_1481736449684{margin-right: 0px !important;margin-left: 0px !important;border-bottom-width: 1px !important;padding-bottom: 15px !important;border-bottom-color: #455560 !important;border-bottom-style: solid !important;}”][vc_column_text]Index on Censorship magazine was started in 1972 and remains the only global magazine dedicated to free expression. Past contributors include Samuel Beckett, Gabriel García Marquéz, Nadine Gordimer, Arthur Miller, Salman Rushdie, Margaret Atwood, and many more.[/vc_column_text][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”76572″ img_size=”full”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]In print or online. Order a print edition here or take out a digital subscription via Exact Editions.

Copies are also available at the BFI, the Serpentine Gallery, MagCulture, (London), News from Nowhere (Liverpool), Home (Manchester), Calton Books (Glasgow) and on Amazon. Each magazine sale helps Index on Censorship continue its fight for free expression worldwide.

SUBSCRIBE NOW[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_basic_grid post_type=”post” max_items=”4″ element_width=”6″ grid_id=”vc_gid:1483444808560-b79f752f-ec25-7″ taxonomies=”8927″ exclude=”80882″][/vc_column][/vc_row]

Future imperfect: Jason DaPonte

Summer 2014 cover

This article is part of the summer 2014 issue of the global quarterly Index on Censorship magazine. Click here to subscribe to the magazine.

In conjunction with the Cambridge Festival of Ideas 2015, we will be publishing a series of articles that complement many of the upcoming debates and discussions. We are offering these articles from Index on Censorship magazine for free (normally they are held within our paid-for archive) as part of our partnership with the festival. Below is an article by Jason DaPonte, on privacy on the internet taken from the summer 2014 issue. It’s a great starting point for those who plan to attend the Privacy in the digital age session at the festival this year.

Index on Censorship is a global quarterly magazine with reporters and contributing editors around the world. Founded in 1972, it promotes and defends the right to freedom of expression. 

“Government may portray itself as the protector of privacy, but it’s the worst enemy of privacy and that’s borne out by the NSA revelations,” web and privacy guru Jeff Jarvis tells Index.

Jarvis, author of Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live argues that this complacency is dangerous and that a debate on “publicness” is needed. Jarvis defines privacy “as an ethic of knowing someone else’s information (and whether sharing it further could harm someone)” and publicness as “an ethic of sharing your own information (and whether doing so could help someone)”.

In his book Public Parts and on his blog, he advocates publicness as an idea, claiming it has a number of personal and societal benefits including improving relationships and collaboration, and building trust.

He says in the United States the government can’t open post without a court order, but a different principle has been applied to electronic communications. “If it’s good enough for the mail, then why isn’t it good enough for email?”

While Jarvis is calling for public discussion on the topic, he’s also concerned about the “techno panic” the issue has sparked. “The internet gives us the power to speak, find and act as a [single] public and I don’t want to see that power lost in this discussion. I don’t want to see us lose a generous society based on sharing. The revolutionaries [in recent global conflicts] have been able to find each other and act, and that’s the power of tech. I hate to see how deeply we pull into our shells,” he says.


Free thinking: Reading list for the Cambridge Festival of Ideas 2015

Free Thinking! A unique partnership in 2015, Cambridge Festival of Ideas are working with Index on Censorship to offer in-depth articles and follow-up pieces from leading artists, writers and activists on all of our headline events.

Drawing out the dark side: Martin Rowson

Thoughts policed: Max Wind-Cowie

Deliberately lewd: Erica Jong

My book and the school library: Norma Klein

Future imperfect: Jason DaPonte

The politics of terror: Conor Gearty

Moving towards inequality: Jemimah Steinfeld and Hannah Leung

Escape from Eritrea: Ismail Einashe

Defending the right to be offended: Samira Ahmed

How technology is helping African journalists investigate: Raymond Joseph

24 Oct: Can writers and artists ever be terrorists?

25 Oct: Question Everything – Cambridge Festival of Ideas

Full Free Thinking! reading list


Current issue: Spies, secrets and lies

In the latest issue of Index on Censorship magazine Spies, secrets and lies: How yesterday’s and today’s censors compare, we look at nations around the world, from South Korea to Argentina, and discuss if the worst excesses of censorship have passed or whether new techniques and technology make it even more difficult for the public to attain information. Subscribe to the magazine.


The Pew Research Centre predicts that by 2025, the “internet will become like electricity – less visible, yet more deeply embedded in people’s lives for good and ill.” Devices such as Google Glass (which overlays information from the web on to the real world via a pair of lenses in front of your eyes) and internet-connected body monitoring systems like, Nike+ and Fitbit, are all examples of how we are starting to become surrounded by a new generation of constantly connected objects. Using an activity monitor like Nike+ means you are transmitting your location and the path of a jog from your shoes to the web (via a smartphone). While this may not seem like particularly private data, a sliding scale emerges for some when these devices start transmitting biometric data, or using facial recognition to match data with people you meet in the street.

As apps and actions like this become more mainstream, understanding how privacy can be maintained in this environment requires us to remember that the internet is decentralised; it is not like a corporate IT network where one department (or person) can switch the entire thing off through a topdown control system.

The internet is a series of interconnected networks, constantly exchanging and copying data between servers on the network and then on to the next. While data may take usual paths, if one path becomes unavailable or fails, the IP (Internet Protocol) system re-routes the data. This de-centralisation is key to the success and ubiquity of the internet – any device can get on to the network and communicate with any other, as long as it follows very basic communication rules.

This means there is no central command on the internet; there is no Big Brother unless we create one. This de-centralisation may also be the key to protecting privacy as the network becomes further enmeshed in our everyday lives. The other key is common sense. When asked what typical users should do to protect themselves on the internet, Jarvis had this advice: “Don’t be an idiot, and don’t forget that the internet is a lousy place to keep secrets. Always remember that what you put online could get passed around.”

As the internet has come under increasing control by corporations, certain services, particularly on the web, have started to store, and therefore control, huge amounts of data about us. Google, Facebook, Amazon and others are the most obvious because of the sheer volume of data they track about their millions of users, but nearly every commercial website tracks some sort of behavioural data about its users. We’ve allowed corporations to gather this data either because we don’t know it’s happening (as is often the case with cookies that track and save information about our browsing behaviour) or in exchange for better services – free email accounts (Gmail), personalised recommendations (Amazon) or the ability to connect with friends (Facebook).

“A transaction of mutual value isn’t surveillance,” Jarvis argues, referencing Google’s Priority Inbox (which analyses your emails to determine which are “important” based on who you email and the relevance of the subject) as an example. He expands on this explaining that as we look at what is legal in this space we need to be careful to distinguish between how data is gathered and how it is used. “We have to be very, very careful about restricting the gathering of knowledge, careful of regulating what you’re allowed to know. I don’t want to be in a regime where we regulate knowledge.”

Sinister or not, the internet giants and those that aspire to similar commercial success find themselves under continued and increasing pressure from shareholders, marketers and clients to deliver more and more data about you, their customers. This is the big data that is currently being hailed as something of a Holy Grail of business intelligence. Whether we think of it as surveillance or not, we know – at least on some level – that these services have a lot of our information at their disposal (eg the contents of all of our emails, Facebook posts, etc) and we have opted in by accepting terms of service when we sign up to use the service.

“The NSA’s greatest win would be to convince people that privacy doesn’t exist,” says Danny O’Brien, international director of the US-based digital rights campaigners Electronic Frontier Foundation. “Privacy nihilism is the state of believing that: ‘If I’m doing nothing wrong, I have nothing to hide, so it doesn’t matter who’s watching me’.”

This has had an unintended effect of creating what O’Brien describes as “unintentional honeypots” of data that tempt those who want to snoop, be it malicious hackers, other corporations or states. In the past, corporations protected this data from hackers who might try to get credit card numbers (or similar) to carry out theft. However, these “honeypot” operators have realised that while they were always subject to the laws and courts of various countries, they are now also protecting their data from state security agencies. This largely came to light following the alleged hacking of Google’s Gmail by China. Edward Snowden’s revelations about the United States’ NSA and the UK’s GCHQ further proved the extent to which states were carrying out not just targeted snooping, but also mass surveillance on their own and foreign citizens.

To address this issue, many of the corporations have turned on data encryption; technology that protects the data as it is in transit across the nodes (or “hops”) across the internet so that it can only be read by the intended recipient (you can tell if this is on when you see the address bar in your internet browser say “https” instead of “http”). While this costs them more, it also costs security agencies more money and time to try to get past it. So by having it in place, the corporations are creating a form of “passive activism”.

Jarvis thinks this is one of the tools for protecting users’ privacy, and says the task of integrating encryption effectively largely lies with the corporations that are gathering and storing personal information.

“Google thought that once they got [users’ data] into their world it was safe. That’s why the NSA revelations are shocking. It’s getting better now that companies are encrypting as they go,” he said. “It’s become the job of the corporations to protect their customers.”

Encryption can’t solve every problem though. Codes are made to be cracked and encrypted content is only one level of data that governments and others can snoop on.

O’Brien says the way to address this is through tools and systems that take advantage of the decentralised nature of the internet, so we remain in control of our data and don’t rely on third party to store or transfer it for us. The volunteer open-source community has started to create these tools.

Protecting yourself online starts with a common-sense approach. “The internet is a lousy place to keep a secret,” Jarvis says. “Once someone knows your information (online or not), the responsibility of what to do with it lies on them,” says Jarvis. He suggests consumers be more savvy about what they’re signing up to share when they accept terms and conditions, which should be presented in simple language. He also advocates setting privacy on specific messages at the point of sharing (for example, the way you can define exactly who you share with in very specific ways on Google+), rather than blanket terms for privacy.

Understanding how you can protect yourself first requires you to understand what you are trying to protect. There are largely three types of data that can be snooped on: the content of a message or document itself (eg a discussion with a counsellor about specific thoughts of suicide), the metadata about the specific communication (eg simply seeing someone visited a suicide prevention website) and, finally, metadata about the communication itself that has nothing to do with the content (eg the location or device you visited from, what you were looking at before and after, who else you’ve recently contacted).

You can’t simply turn privacy on and off – even Incognito mode on Google’s Chrome browser tells you that you aren’t really fully “private” when you use it. While technologies that use encryption and decentralisation can help protect the first two types of content that can be snooped on (specific content and metadata about the communication), there is little that can be done about the third type of content (the location and behavioural information). This is because networks need to know where you are to connect you with other users and content (even if it’s encrypted). This is particularly true for mobile networks; they simply can’t deliver a call, SMS or email without knowing where your device is.

A number of tools are on the horizon that should help citizens and consumers protect themselves, but many of them don’t feel ready for mainstream use yet and, as Jarvis argues, integrating this technology could be primarily the responsibility of internet corporations.

In protecting yourself, it is important to remember that surveillance existed long before the internet and forms an important part of most nation’s security plans. Governments are, after all, tasked with protecting their citizens and have long carried out spying under certain legal frameworks that protect innocent and average citizens.

O’Brien likens the way electronic surveillance could be controlled to the way we control the military. “We have a military and it fights for us…, which is what surveillance agencies should do. The really important thing we need to do with these organisations is to rein them back so they act like a modern civilised part of our national defence rather than generals gone crazy who could undermine their own society as much as enemies of the state.”

The good news is that the public – and the internet itself – appear to be at a junction. We can choose between a future where we can take advantage of our abilities to self-correct, decentralise power and empower individuals, or one where states and corporations can shackle us with technology. The first option will take hard work; the second would be the result of complacency.

Awareness of how to protect the information put online is important, but in most cases average citizens should not feel that they need to “lock down” with every technical tool available to protect themselves. First and foremost, users that want protection should consider whether the information they’re protecting should be online in the first place and, if they decide to put it online, should ensure they understand how the platform they’re sharing it with protects them.

For those who do want to use technical tools, the EFF recommends using ones that don’t rely on a single commercial third party, favouring those that take advantage of open, de-centralised systems (since the third parties can end up under surveillance themselves). Some of these are listed (see box), most are still in the “created by geeks for use by geeks” status and could be more user-friendly.

Privacy protectors

TOR

This tool uses layers of encryption and routing through a volunteer network to get around censorship and surveillance. Its high status among privacy advocates was enhanced when it was revealed that an NSA presentation had stated that “TOR stinks”. TOR can be difficult to install and there are allegations that simply being a TOR user can arouse government suspicion as it is known to be used by criminals. http://www.torproject.org

OTR

“Off the Record” instant messaging is enabled by this plugin that applies end-to-end encryption to other messaging software. It creates a seamless experience once set up, but requires both users of the conversation to be running the plug-in in order to provide protection. Unfortunately, it doesn’t yet work with the major chat clients, unless they are aggregated into yet another third party piece of software, such as Pidgin or Adium. https://otr.cypherpunks.ca/

Disconnect

This browser plugin tries to put privacy control into your hands by making it clear when internet tracking companies or third parties are trying to watch your behaviour. Its user-friendly inter- face makes it easier to control and understand. Right now, it only works on Chrome and Firefox. http://www.disconnect.me

Silent Circle

This is a solution for encrypting mobile communications – but only works between devices in the “silent circle” – so good for certain types of uses but not yet a mainstream solution, as encryption wouldn’t extend to all calls and messages that users make. Out-of-circle calls are currently only available in North America. https://silentcircle.com

©Jason DaPonte and Index on Censorship

Join us on 25 October at the Cambridge Festival of Ideas 2015 for Question Everything an unconventional, unwieldy and disruptive day of talks, art and ideas featuring a broad range of speakers drawn from popular culture, the arts and academia. Moderated by Index on Censorship CEO Jodie Ginsberg. 

This article is part of the summer 2014 issue of the global quarterly Index on Censorship magazine, with a special report on propaganda and war. Click here to subscribe to the magazine.