Beyond Silk Road: Potential Risks, Threats, and Promises of Virtual Currencies

Total Page:16

File Type:pdf, Size:1020Kb

Beyond Silk Road: Potential Risks, Threats, and Promises of Virtual Currencies S. Hrg. 113–516 BEYOND SILK ROAD: POTENTIAL RISKS, THREATS, AND PROMISES OF VIRTUAL CURRENCIES HEARING BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION NOVEMBER 18, 2013 Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PRINTING OFFICE 86–636 PDF WASHINGTON : 2014 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS THOMAS R. CARPER, Delaware Chairman CARL LEVIN, Michigan TOM COBURN, Oklahoma MARK L. PRYOR, Arkansas JOHN MCCAIN, Arizona MARY L. LANDRIEU, Louisiana RON JOHNSON, Wisconsin CLAIRE MCCASKILL, Missouri ROB PORTMAN, Ohio JON TESTER, Montana RAND PAUL, Kentucky MARK BEGICH, Alaska MICHAEL B. ENZI, Wyoming TAMMY BALDWIN, Wisconsin KELLY AYOTTE, New Hampshire HEIDI HEITKAMP, North Dakota RICHARD J. KESSLER, Staff Director JOHN P. KILVINGTON, Deputy Staff Director JOHN G. COLLINS, Professional Staff Member MICHELLE C. TAYLOR, Federal Bureau of Investigations Detailee KEITH B. ASHDOWN, Minority Staff Director CHRISTOPHER J. BARKLEY, Minority Deputy Staff Director WILLIAM H.W. MCKENNA, Minority Investigative Counsel LAURA W. KILBRIDE, Chief Clerk LAUREN M. CORCORAN, Hearing Clerk (II) C O N T E N T S Opening statements: Page Senator Carper ................................................................................................. 1 Prepared statements: Senator Carper ................................................................................................. 45 WITNESSES MONDAY, NOVEMBER 18, 2013 Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, U.S. Department of the Treasury ....................................................................... 4 Mythili Raman, Acting Assistant Attorney General, Criminal Division, U.S. Department of Justice ......................................................................................... 7 Edward W. Lowery, III, Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, U.S. Department of Homeland Security .......... 9 Ernie Allen, President and Chief Executive Officer, The International Centre for Missing and Exploited Children .................................................................... 27 Patrick Murck, General Counsel, The Bitcoin Foundation, Inc. .......................... 29 Jeremy Allaire, Chairman and Chief Executive Officer, Circle Internet Finan- cial, Inc. ................................................................................................................. 31 Jerry Brito, Senior Research Fellow, The Mercatus Center, George Mason University ............................................................................................................. 33 ALPHABETICAL LIST OF WITNESSES Allaire, Jeremy: Testimony .......................................................................................................... 31 Prepared statement .......................................................................................... 114 Allen, Ernie: Testimony .......................................................................................................... 27 Prepared statement .......................................................................................... 78 Brito, Jerry: Testimony .......................................................................................................... 33 Prepared statement .......................................................................................... 120 Lowery, Edward W., III: Testimony .......................................................................................................... 9 Prepared statement .......................................................................................... 71 Murck, Patrick: Testimony .......................................................................................................... 29 Prepared statement with attachment ............................................................. 90 Raman, Mythili: Testimony .......................................................................................................... 7 Prepared statement .......................................................................................... 63 Shasky Calvery, Jennifer: Testimony .......................................................................................................... 4 Prepared statement .......................................................................................... 48 APPENDIX Statement submitted for the Record by U.S. Immigration and Customs En- forcement .............................................................................................................. 146 Statement submitted for the Record by Sarah Meiklejohn, Ph.D. Candidate, University of California, San Diego .................................................................... 156 Responses to post-hearing questions for the Record: Ms. Shasky Calvery .......................................................................................... 160 Ms. Raman ........................................................................................................ 165 (III) IV Page Responses to post-hearing questions for the Record—Continued Mr. Lowery ........................................................................................................ 171 Mr. Allen ........................................................................................................... 176 Mr. Murck ......................................................................................................... 184 Mr. Allaire ......................................................................................................... 191 Mr. Brito ............................................................................................................ 195 BEYOND SILK ROAD: POTENTIAL RISKS, THREATS, AND PROMISES OF VIRTUAL CURRENCIES MONDAY, NOVEMBER 18, 2013 COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS, Washington, DC. The Committee met, pursuant to notice, at 3:02 p.m., in room SD–342, Dirksen Senate Office Building, Hon. Thomas R. Carper, Chairman of the Committee, presiding. Present: Senator Carper. OPENING STATEMENT OF CHAIRMAN CARPER Chairman CARPER. Well, good afternoon, everyone. Thank you for joining us. We especially want to thank our witnesses, panel num- ber one and, somewhere out in the audience, panel number two. Mr. Lowery just lost his name plate there. Somebody just go around and pick it up please and put it where it belongs. That way we will know who you are. Senator Bill Roth, whom I succeeded here in the U.S. Senate, used to say, many years ago—his advice was, ‘‘Wear a big button when you are campaigning so that you will remember your name and so will other people.’’ So we want to make sure people remem- ber your name. Over the past several months, this Committee has engaged in an investigation into the potential implications of virtual currencies. During the course of this inquiry, we have examined the issues and potential risks and threats that virtual currencies pose, as well as some of the potential promises that some believe they can bring. In addition, we have explored with several departments and agencies throughout our Federal Government how they are ap- proaching virtual currencies as an emerging technology. This has included looking at how they are coordinating together to develop a ‘‘whole of government’’ approach that is consistent and informed. Virtual currencies, perhaps most notably Bitcoin, have captured the imagination of some, struck fear among others, and confused the heck out of the rest of us, including me. Indeed, based on con- versations that my staff and I have had with dozens—maybe more—of individuals both inside and outside of government, it is clear that the knowledge and expectation gaps are wide. Funda- mental questions remain about what a virtual currency actually is, how it should be treated, and what the future holds. (1) 2 Virtual currency can best be described as digital cash. It is gen- erated by computers, lives on the Internet, and can be used to pur- chase real and digital goods across the world. Some proponents believe that digital currencies can prove valu- able to those in developing countries without access to stable finan- cial systems. Others believe it could prove to be a next generation payment system for retailers both online and in the real world. At the same time, however, virtual currencies can be an effective tool for those looking to launder money, for those looking to traffic illegal drugs, for those looking to exploit children around the world, and the list goes on. While virtual currencies have seen increased attention from reg- ulators, law enforcement, investors, and entrepreneurs in recent months, there are still many unanswered questions and unresolved issues. This is not the first time that advances in technology have posed challenging questions, challenging issues for policymakers and for society as a whole. As we know, technology is dynamic and changes quickly. Concepts like e-mail and even the Internet itself were once alien and difficult to understand and navigate. Now, most of us can read and respond to e-mail on a device
Recommended publications
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Cybercrime: Internet Driven Illicit Activities and Behavior
    Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Dark and Deep Webs-Liberty Or Abuse
    International Journal of Cyber Warfare and Terrorism Volume 9 • Issue 2 • April-June 2019 Dark and Deep Webs-Liberty or Abuse Lev Topor, Bar Ilan University, Ramat Gan, Israel https://orcid.org/0000-0002-1836-5150 ABSTRACT While the Dark Web is the safest internet platform, it is also the most dangerous platform at the same time. While users can stay secure and almost totally anonymously, they can also be exploited by other users, hackers, cyber-criminals, and even foreign governments. The purpose of this article is to explore and discuss the tremendous benefits of anonymous networks while comparing them to the hazards and risks that are also found on those platforms. In order to open this dark portal and contribute to the discussion of cyber and politics, a comparative analysis of the dark and deep web to the commonly familiar surface web (World Wide Web) is made, aiming to find and describe both the advantages and disadvantages of the platforms. KeyWoRD Cyber, DarkNet, Information, New Politics, Web, World Wide Web INTRoDUCTIoN In June 2018, the United States Department of Justice uncovered its nationwide undercover operation in which it targeted dark web vendors. This operation resulted in 35 arrests and seizure of weapons, drugs, illegal erotica material and much more. In total, the U.S. Department of Justice seized more than 23.6$ Million.1 In that same year, as in past years, the largest dark web platform, TOR (The Onion Router),2 was sponsored almost exclusively by the U.S. government and other Western allies.3 Thus, an important and even philosophical question is derived from this situation- Who is responsible for the illegal goods and cyber-crimes? Was it the criminal[s] that committed them or was it the facilitator and developer, the U.S.
    [Show full text]
  • Repaving the Ancient Silk Routes
    PwC Growth Markets Centre – Realising opportunities along the Belt and Road June 2017 Repaving the ancient Silk Routes In this report 1 Foreword 2 Chapter 1: Belt and Road – A global game changer 8 Chapter 2: China’s goals for the Belt and Road 14 Chapter 3: Key sectors and economic corridors 28 Chapter 4: Opportunities for foreign companies 34 Chapter 5: Unique Belt and Road considerations 44 Chapter 6: Strategies to evaluate and select projects 56 Chapter 7: Positioning for success 66 Chapter 8: Leveraging international platforms 72 Conclusion Foreword Belt and Road – a unique trans-national opportunity Not your typical infrastructure projects Few people could have envisaged what the Belt and Road However, despite the vast range and number of B&R (B&R) entailed when President Xi of China first announced opportunities, many of these are developed in complex the concept back in 2013. However, four years later, the B&R conditions, not least because they are located in growth initiative has amassed a huge amount of economic markets where institutional voids can prove to be hard to momentum.The B&R initiative refers to the Silk Road navigate. Inconsistencies in regulatory regimes and Economic Belt and the 21st Century Maritime Silk Road underdeveloped credit markets, together with weak existing initiatives. The network connects Asia, Europe and Africa, infrastructure and a maturing talent market all combine to and passes through more than 65 countries and regions with add further complexity for companies trying to deliver and a population of about 4.4 billion and a third of the global manage these projects.
    [Show full text]
  • Anonymity Through the Silk Road
    Anonymity Through The Silk Road In the pursuit of gaining anonymity online, there is a continuous ebb and flow that involves one party attempting to gain permanent and lasting anonymity while a second party attempts to compromise that anonymity. In this paper, I will be using The Silk Road as a means to explore this notion and as a real life example of this constant back and forth of maintaining anonymity. 1. Abstract The Silk Road is an online marketplace that allows users to anonymously buy and sell just about any good, whether it be legal or illegal. Because the goal of The Silk Road is to maintain the anonymity of users, the Tor browser is what users use to connect to the website and Bitcoins are used for transactions. Both Tor and Bitcoin, while solid ways to remain anonymous, do have some flaws and vulnerabilities that can potentially remove the necessary anonymity that a user requires in order to safely use the site. 2. Silk Road Overview 2.1 What is the Silk Road? The Silk Road is an anonymous online marketplace that was created in order to allow for the online sales of all items, legal and illegal. The entire concept is fascinating because it allows for people from around the entire world to both buy and sell any and all goods to each other without ever having their identity compromised and without having to worry about any buying or selling restrictions that may be in effect due to geographical location (country, state, province, etc.). There are many factors required for anonymity on The Silk Road that must be maintained in order for anonymity to be fully encompassing and complete.
    [Show full text]
  • 'Surfing the Silk Road': a Study of Users' Experiences
    International Journal of Drug Policy 24 (2013) 524–529 Contents lists available at ScienceDirect International Journal of Drug Policy journa l homepage: www.elsevier.com/locate/drugpo Research paper ‘Surfing the Silk Road’: A study of users’ experiences a,∗ b,1 Marie Claire Van Hout , Tim Bingham a School of Health Sciences, Waterford Institute of Technology, Waterford, Ireland b Irish Needle Exchange Forum, Ireland a r a t i c l e i n f o b s t r a c t Article history: Introduction: The online drug marketplace called ‘Silk Road’ has operated anonymously on the ‘Deep Web’ Received 12 April 2013 since 2011. It is accessible through computer encrypting software (Tor) and is supported by online trans- Received in revised form 24 July 2013 actions using peer to peer anonymous and untraceable crypto-currency (Bit Coins). The study aimed to Accepted 30 August 2013 describe user motives and realities of accessing, navigating and purchasing on the ‘Silk Road’ marketplace. Methods: Systematic online observations, monitoring of discussion threads on the site during four months Keywords: of fieldwork and analysis of anonymous online interviews (n = 20) with a convenience sample of adult Silk Road ‘Silk Road’ users was conducted. Internet Results: The majority of participants were male, in professional employment or in tertiary education. Drug Displacement patterns trajectories ranged from 18 months to 25 years, with favourite drugs including MDMA, 2C-B, mephedrone, Closed drug markets nitrous oxide, ketamine, cannabis and cocaine. Few reported prior experience of online drug sourcing. Reasons for utilizing ‘Silk Road’ included curiosity, concerns for street drug quality and personal safety, variety of products, anonymous transactioning, and ease of product delivery.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Computer Science 161 Fall 2020 Weaver Misc Topics 2
    Computer Science 161 Fall 2020 Weaver Misc Topics 2 1 Pre Lecture Facepalm... From just a year ago! Computer Science 161 Fall 2020 Weaver Welcome to Hell Week.... Computer Science 161 Fall 2020 Weaver • Mental pressure of "Curl up in a ball with a rifle" vs "Pretend everything is normal" continues... • Highly likely Biden will be the winner: But we won't know for sure for another few days at least.... • Really a massive screwup: We should just have preliminary results announced on Friday at once for all states • Today is More Off Topic Stuff: • Nukes • Tor Hidden Services • Sidechannels 3 And Checking In With Everyone Again... How Are You on the Fauci Scale? Computer Science 161 Fall 2020 Weaver 4 The Interesting Problem: Limiting Use Computer Science 161 Fall 2020 Weaver • Who might use a nuke without authorization? • Our "allies" where we station our nukes • Original motivation: Nukes stored in Turkey and Greece • Someone who can capture a nuke • This is what sold the military on the need for the problem: We had nukes in Germany which would be overrun in case of a war with the USSR • Our own military • General Jack D Ripper scenario • The mandated solution: • Permissive Access Link (PAL) 5 Nuke Safety Features Computer Science 161 Fall 2020 Weaver • One-point safety – no nuclear yield from detonation of one explosive charge. • Strong link/weak link – • strong link provides electrical isolation; • weak link fails early under stress (heat, etc.) • Environmental sensors – detect flight trajectory. • Unique signal generator – digital signal used for coupling between stages. • Insulation of the detonators from electrical energy.
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • Digital Silk Road in Central Asia: Present and Future
    Digital Silk Road in Central Asia: Present and Future NARGIS KASSENOVA & BRENDAN DUPREY, EDITORS JUNE 2021 Digital Silk Road in Central Asia: Present and Future Nargis Kassenova & Brendan Duprey, Editors JUNE 2021 Digital Silk Road in Central Asia: Present and Future is a project of the Davis Center for Russian and Eurasian Studies at Harvard University, and the Sustainable Kazakhstan Research Institute, Narxoz University, supported by a grant from Friedrich Ebert Foundation in Kazakhstan. © 2021 Davis Center for Russian and Eurasian Studies Cataloging-in-Publication data ISBN: 978-0-578-93435-8 Please direct inquiries to: Nargis Kassenova Kathryn W. and Shelby Cullom Davis Center for Russian and Eurasian Studies Harvard University 1730 Cambridge Street, Suite S301 Cambridge, MA 02138 Phone: 617.496.5684 Fax: 617.495.8319 [email protected] The full text of this report can be accessed at https://daviscenter.fas.harvard.edu/digital-silk-road. Limited print copies are also available. ii Digital Silk Road in Central Asia: Present and Future Contents iv Acknowledgements v Introduction Nargis Kassenova and Brendan Duprey vii Executive Summary 1 The Puzzle of the Digital Silk Road Elisa Oreglia, Hongyi Ren, and Chia-Chi Liao 9 Sino-Russian Advocacy for “Internet Sovereignty” and State-Led Internet Governance Miranda Lupion 17 Digital Silk Road and Surveillance Technology in Central Asia Cian Stryker 55 The Sino-Russian Digital Cooperation and Its Implications for Central Asia Miranda Lupion 77 Beyond the GovTech: The Pitfalls of Kazakhstan’s Digitalization Agenda Anna Gussarova 85 Turkmenistan’s Digitalization Strategy: Old Practices, New Façade? Rustam Muhamedov 93 The Role of Big Earth Data for the Implementation of the Sustainable Development Goals in Central Asia Brendan Duprey and Akmal Akramkhanov 118 About the Authors Contents iii Acknowledgements We would like to thank the Friedrich Ebert Foundation in Kazakhstan for providing moral and financial support to the project.
    [Show full text]
  • Corynne Mcsherry, Ph.D
    The Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce of the Committee on Energy and Commerce Joint Hearing: “Fostering a Healthier Internet to Protect Consumers” Statement of Corynne McSherry, Ph.D. Legal Director Electronic Frontier Foundation October 16, 2019 As Legal Director for the Electronic Frontier Foundation, I thank Chairman Pallone, Ranking Member Walden and Members of the Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce for the opportunity to share EFF’s views on how to create a healthier Internet and protect all of its users. EFF is a donor-funded nonprofit, with contributions from more than 30,000 dues-paying members from around the world forming the backbone of our financial support. The majority of EFF’s funding comes from ordinary individuals, and over 80% of that funding consists of donations under $10,000. We receive less than six and a half percent of our funding from corporate sponsors.1 For nearly 30 years, EFF has represented the interests of technology users both in court cases and in broader policy debates to help ensure that law and technology support our civil liberties. From that vantage point, we are well aware that online speech is not always pretty—sometimes it’s extremely ugly and causes real-world harm. The effects of this kind of speech are often disproportionately felt by communities for whom the Internet has also provided invaluable tools to organize, educate, and connect. Systemic discrimination does not disappear and can even be amplified online. Given the paucity and inadequacy of tools for users themselves to push back, it’s no surprise that many would look to Internet intermediaries to do more to limit such speech.
    [Show full text]