Challenges to Freedom of Expression in the Digital World: Lessons from Wikileaks and the Arab Spring
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
La Quadrature Du Net Campaigning on Telecoms Package Pan-European Activism for Patching a “Pirated” Law
25th Chaos Communication Congress Nothing to hide Berlin, 2008-12-30 La Quadrature du Net Campaigning on Telecoms Package Pan-european activism for patching a \pirated" law by J´er´emieZimmermann <[email protected]> \Whatever you do will be insignificant, but it is very important that you do it." Mohandas Karamchand Gandhi Contents Prelude 3 Who are we ? 4 Who is La Quadrature du Net ...................................4 Why this name?..........................................4 They support La Quadrature du Net ...............................5 Campaign on Telecoms Package6 Squaring the net..........................................6 The debate is open.........................................7 European Parliament rejects graduated response........................8 Will France Introduce the Digital Guillotine in Europe?....................8 Privacy: Film industry pirates European law..........................9 MEPs want to torpedo the Free Internet on July 7th...................... 10 The \Telecoms Package": out of the shadows, into the light.................. 10 Telecoms Package: vote postponed................................ 11 Telecoms Package: the spectre of the graduated response hangs over Europe......... 12 Telecoms Package: protect the free and just society!...................... 12 Telecoms Package: European democracy's victory already threatened............. 13 Letter sent to all MEPs on september 23rd........................... 14 Graduated Response: The Lesson................................. 15 \Graduated response": Will France -
Protecting Net Neutrality in the Telecoms Package
September 24th, 2009 Protecting Net Neutrality In the Telecoms Package Network Neutrality is a constitutional principle of the Internet's architecture. It was conceived as an efficient decentralized network and was designed according to an axiom that technological neutrality is the foundation of freedom in communications infrastructure. Built into the network was also an idea about equality, that society as a whole benefits when we defend against discrimination and unfair advantage. Moreover, Net neutrality stimulates the virtuous circle of a development model based on the growth of a common communication network that enables new uses and tools, as opposed to one relying on investments in filtering and controlling, that would lead to a fragmentation of the Internet. Network Neutrality is the safeguard of civil and human rights, and of fair competition for innovation. It is now that the principle of network neutrality is being challenged in the current version of the Telecom Package that it has become a matter of public policy debate in Europe. The shape of our future networks and the rights and freedoms of citizens on the Internet is what is being voted on in this major reform of the European framework for telecommunications regulation. This memorandum lays out the public interest issues at stake in the Telecoms Package. It explains what Network Neutrality is and why openness is important to telecommunications infrastructure. It outlines the social and economic benefits of a regulatory regime that preserves network neutrality. It identifies the specific language in the key provisions that risk fundamental rights and freedoms. It concludes with a guide to making Network Neutrality a fundamental regulatory principle in the European telecommunications market. -
TAZ, Ontological Anarchy, Poetic Terrorism.Pdf
T. A. Z. The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism By Hakim Bey Autonomedia Anti-copyright, 1985, 1991. May be freely pirated & quoted-- the author & publisher, however, would like to be informed at: Autonomedia P. O. Box 568 Williamsburgh Station Brooklyn, NY 11211-0568 Book design & typesetting: Dave Mandl HTML version: Mike Morrison Printed in the United States of America Part 1 T. A. Z. The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism By Hakim Bey ACKNOWLEDGMENTS CHAOS: THE BROADSHEETS OF ONTOLOGICAL ANARCHISM was first published in 1985 by Grim Reaper Press of Weehawken, New Jersey; a later re-issue was published in Providence, Rhode Island, and this edition was pirated in Boulder, Colorado. Another edition was released by Verlag Golem of Providence in 1990, and pirated in Santa Cruz, California, by We Press. "The Temporary Autonomous Zone" was performed at the Jack Kerouac School of Disembodied Poetics in Boulder, and on WBAI-FM in New York City, in 1990. Thanx to the following publications, current and defunct, in which some of these pieces appeared (no doubt I've lost or forgotten many--sorry!): KAOS (London); Ganymede (London); Pan (Amsterdam); Popular Reality; Exquisite Corpse (also Stiffest of the Corpse, City Lights); Anarchy (Columbia, MO); Factsheet Five; Dharma Combat; OVO; City Lights Review; Rants and Incendiary Tracts (Amok); Apocalypse Culture (Amok); Mondo 2000; The Sporadical; Black Eye; Moorish Science Monitor; FEH!; Fag Rag; The Storm!; Panic (Chicago); Bolo Log (Zurich); Anathema; Seditious Delicious; Minor Problems (London); AQUA; Prakilpana. Also, thanx to the following individuals: Jim Fleming; James Koehnline; Sue Ann Harkey; Sharon Gannon; Dave Mandl; Bob Black; Robert Anton Wilson; William Burroughs; "P.M."; Joel Birroco; Adam Parfrey; Brett Rutherford; Jake Rabinowitz; Allen Ginsberg; Anne Waldman; Frank Torey; Andr Codrescu; Dave Crowbar; Ivan Stang; Nathaniel Tarn; Chris Funkhauser; Steve Englander; Alex Trotter. -
“Guía Metodológica De Uso Seguro De Internet Para Personas Y Empresas Utilizando La Red Tor”
PONTIFICIA UNIVERSIDAD CATÓLICA DEL ECUADOR FACULTAD DE INGENIERÍA ESCUELA DE SISTEMAS DISERTACIÓN DE GRADO PREVIA A LA OBTENCIÓN DEL TÍTULO DE INGENIERO EN SISTEMAS Y COMPUTACIÓN “GUÍA METODOLÓGICA DE USO SEGURO DE INTERNET PARA PERSONAS Y EMPRESAS UTILIZANDO LA RED TOR” NOMBRES: Javier Andrés Vicente Alarcón Verónica Cristina Guillén Guillén DIRECTOR: Msc. Luis Alberto Pazmiño Proaño QUITO, 2015 “GUÍA METODOLÓGICA DE USO SEGURO DE INTERNET PARA PERSONAS Y EMPRESAS UTILIZANDO LA RED TOR” TABLA DE CONTENIDO RESUMEN .......................................................................................................................... 3 INTRODUCCIÓN ................................................................................................................ 6 0. ANTECEDENTES ......................................................................................................... 8 0.1. Internet .............................................................................................................. 8 0.1.1. Definición .................................................................................................... 8 0.1.2. Historia........................................................................................................ 9 0.1.3. Evolución .................................................................................................. 12 0.2. Ciberataque ...................................................................................................... 13 0.2.1. Definición ................................................................................................. -
Privacy International, Human and Digital Rights Organizations, and International Legal Scholars As Amici Curiae in Support of Respondent
No. 17-2 IN THE Supreme Court of the United States IN THE MdATTER OF A WARRANT TO SEARCH A CERTAIN EMAIL ACCOUNT CONTROLLED AND MAINTAINED BY MICROSOFT CORPORATION UNITED STATES OF AMERICA, Petitioner, —v.— MICROSOFT CORPORATION, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT BRIEF OF PRIVACY INTERNATIONAL, HUMAN AND DIGITAL RIGHTS ORGANIZATIONS, AND INTERNATIONAL LEGAL SCHOLARS AS AMICI CURIAE IN SUPPORT OF RESPONDENT LAUREN GALLO WHITE BRIAN M. WILLEN RYAN T. O’HOLLAREN Counsel of Record WILSON, SONSINI, GOODRICH BASTIAAN G. SUURMOND & ROSATI, P.C. WILSON, SONSINI, GOODRICH One Market Plaza Spear Tower, & ROSATI, P.C. Suite 3300 1301 Avenue of the Americas, San Francisco, California 94105 40th Floor (415) 947-2000 New York, New York 10019 [email protected] (212) 999-5800 [email protected] [email protected] [email protected] Attorneys for Amici Curiae (Counsel continued on inside cover) CAROLINE WILSON PALOW SCARLET KIM PRIVACY INTERNATIONAL 62 Britton Street London, EC1M 5UY United Kingdom [email protected] [email protected] i QUESTION PRESENTED Whether construing the Stored Communications Act (“SCA”) to authorize the seizure of data stored outside the United States would conflict with foreign data-protection laws, including those of Ireland and the European Union, and whether these conflicts should be avoided by applying established canons of construction, including presumptions against extra- territoriality and in favor of international comity, which direct U.S. courts to construe statutes as applying only domestically and consistently with foreign laws, absent clear Congressional intent. ii TABLE OF CONTENTS PAGE QUESTION PRESENTED .......................... -
Digital Security for Activists
Training the Motivated: Digital Security for Activists Glencora Borradaile Kelsy Kretschmer Abstract School of Electrical Engineering School of Public Policy The state of global surveillance and the political and Computer Science Sociology Program environment has many activists caring more about their Oregon State University Oregon State University online security culture. We report on the initiation of a Corvallis, OR 97331, USA Corvallis, OR 97331, USA Digital Security for Activists program and a pilot study of an [email protected] [email protected] introductory seminar. Pre- and post-surveys of the seminar will form an initial assessment of what kind of intervention might increase the security practices of activists and to inform the design of program offerings. We report on the pre-surveys from three offerings of the seminar. Introduction In collaboration with the Civil Liberties Defense Center (CLDC), the first author had been offering informal digital security trainings for activists and their lawyers. After the fall elections in the U.S., requests for these trainings increased dramatically and shortly thereafter we launched a Digital Security for Activists (DSA) program. The DSA program’s intent is to align with the CLDC mission (“to defend and uphold civil liberties through education, outreach, litigation, legal support, and assistance”) and enable citizen activists to assert their constitutional rights while organizing online. Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Poster In order to provide trainings that are useful and effective, we presented at the 13th Symposium on Usable Privacy and Security (SOUPS 2017). -
Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted. -
The World Tomorrow, Episode 8 Cyberpunks #1
Air date 5 Jun 2012 Episode 8 – Cyberpunks #1 Jacob Applebaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship. Jacob believes that everybody has the right to read, without restriction, and the right to speak freely, with no exception. In 2010, when Julian Assange couldn’t deliver a talk in New York, Jacob gave the talk instead. Since then, he has been harrassed by the U.S. government: interrogated at airports, subjected to invasive pat-downs while being threatened with prison rape by law enforcement officials, had his equipment confiscated and his online services subject to secret subpoena. Jacob is uncowed by these measures, and remains an outspoken advocate of freedom of expression, and a vocal supporter of WikiLeaks. Andy Mueller-Maguhn is a long time member of the Chaos Computer Club in Germany, and a former spokesman. He is a specialist on surveillance, working in a journalistic capacity on the surveillance industry with his project wiki, buggedplanet.info. Andy works in cryptographic communications, and runs a company called Cryptophone, which markets secure voice communication devices to commercial clients. From worldtomorrow.wikileaks.org/episode-8.html 1 30 October 2013 Jeremie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms. Jeremie works to build tools for the public to use to take part in public debate and to try to change things. -
De Filippi & Tréguer
May 2014 Expanding the Internet Commons : The Subversive Potential of Wireless Community Networks by Primavera De Filippi1 and Félix Tréguer2 “Freedom is fostered when the means of communication are dispersed, decentralized, and easily available, as are printing presses and microcomputers. Central control is more likely when the means of communication are concentrated, monopolized, and scarce, as are great networks,” wrote professor Ithiel de Sola Pool (1984), an American political scientist and legal analyst of communications technologies. Beyond highlighting historical and technical trends in technology, Sola Pool also understood that there was nothing deterministic about how technologies evolve. While control over printing presses and microcomputers can, as it turns out, be highly centralized, the deployment and management of telecommunication networks can, eventually, undergo a process of decentralization. The outcome ultimately depends on political, technical, economic, institutional and legal arrangements shaping both the development of communications tools and their use. Often, when it comes to politics – and Internet policy is obviously no exception – the antagonism between freedom and control essentially comes down to the trade-off between centralization or decentralization. In the past year, the ongoing controversy regarding the massive surveillance undertaken by the US National Security Agency (NSA) and its allied organizations has encouraged a growing number of technology activists to deploy decentralized and free software3 alternatives to the centralized online services known to collaborate with the NSA. This trend can be likened to what happened repeatedly in the history of the Internet. The rise of the personal computer and the widespread adoption of the Internet network came out of a need to democratize computing technologies by taking them out of the hands of technocracy – decentralizing both the use of computers and the control of communication technologies. -
Download Joint Letter from Civil Society
Joint Letter from Civil Society Organizations to Foreign Ministers of Freedom Online Coalition Member States April 18, 2014 Dear Minister, On April 8, 2014, former US National Security Agency (NSA) contractor Edward Snowden testified before the Parliamentary Assembly of the Council of Europe (PACE) via video- conference that the NSA and the United Kingdom Government Communications Headquarters (GCHQ) have used their surveillance capabilities to spy on the communications of human rights organizations and civil society groups, both domestically and internationally. Snowden did not reveal which groups the NSA or GCHQ have spied upon, but indicated that the types of organizations whose communications had been compromised included major global organizations similar to Amnesty International and Human Rights Watch, and other NGOs. Snowden explicitly told PACE members that the NSA had “specifically targeted the communications of either leaders or staff members in a number of purely civil or human rights organizations … including domestically, within the borders of the United States.” If Snowden’s assertion is accurate, such facts would not only point to fresh dimensions of the overreach of NSA surveillance, but also would constitute an outrageous breach of the US government’s stated commitment to human rights and freedom online. It also raises the very real possibility that these organizations’ communications with confidential sources have been intercepted. Sharing this information with other governments could put victims and human rights defenders the world over in imminent danger. The US frequently criticizes repressive states for unjustified government spying on human rights organizations, media organizations, and civil society because such surveillance has a chilling effect on freedom of expression and association and constitutes a clear form of harassment and intimidation. -
Installare Tor
/ DARK WEB / TECNOLOGIA 11 13 14 12 15 16 INSTALLARE TOR sicurezza riducendo al minimo (specialmente file .doc e .pdf) la navigazione Web è solo uno (client di posta elettronica), la superficie di attacco e quindi mentre si è ancora online. degli strumenti di comunica- ProtonMail (Webmail). Tails, la possibilità che l’indirizzo IP Tor non è una rete ottimizzata zione anonima a sistema operativo reale dell’utente venga smasche- per le prestazioni, quindi l’e- disposizione del Sicurezza: il team open source basato rato, il team di Tor suggerisce sperienza di navigazione può pubblico. Fra i di Tor suggerisce su kernel Linux, è tra l’altro di non usare un client variare anche molto e magari tool progetta- preconfigurato per BitTorrent facendolo passare richiedere la selezione di un ti per sfruttare di non usare un client ridirigere tutto il dalla darknet, non installare o nuovo circuito se un sito (pub- Tor segnalia- BitTorrent facendolo traffico di rete attra- abilitare plug-in esterni sul Tor blico o nascosto che sia) non mo OnionShare passare dalla darknet verso la rete di Tor. Browser, usare sempre la ver- vuole proprio saperne di cari- (condivisione In tutti questi casi sione https di un sito Web lad- carsi. La darknet di Tor suppor- file), Tor Mes- lasciamo all’utente dove disponibile e di non aprire ta tutti i flussi di rete basati su senger, TorChat, Ricochet (mes- il piacere della scoperta e della documenti scaricati tramite Tor protocolli Tcp e socks, quindi saggistica istantanea), Mailpile sperimentazione. PC Professionale / Novembre -
Civil Society Statement to the E-G8 and G8 the Signatories of This
Civil Society Statement to the e-G8 and G8 The signatories of this statement are representatives of civil society from around the world working towards the promotion of Internet freedom, digital rights, and open communication. We understand that the French Presidency of the G8 is holding a G8 internet meeting -- the "e- G8 Forum" -- immediately before the G8 Summit in Deauville, with a view to shaping the agenda of the G8 Summit regarding key global internet policy issues. This meeting is significant in that this is the first year that the internet’s role in society and the economy is explicitly on the G8 agenda. As key world leaders, your policies have a major influence on internet policy globally. Regrettably, certain policies being implemented in the most developed economies are undermining the open and neutral internet -- the very qualities that represent the essence of its democratic and economic potential. We believe that G8 Member States should use the e-G8 meeting as an opportunity to publicly commit to expanding internet access for all, combating digital censorship and surveillance, limiting online intermediary liability, and upholding principles of net neutrality. Internet Access for All We are particularly concerned about the increasing trend of nations cutting off citizens’ access to the Internet and mobile networks in times of crisis, as Egypt, Libya, Iran, China, Nepal, and Burma have all done. In many if not all of these countries, we see how important access to the Internet is as a gateway to a plethora of others civil, political, and fundamental human rights. Many G8 countries are actively pursuing policies that would similarly seek to restrict and control access; these policies legitimize actions of repressive regimes and threaten the core of the internet economy.