Tuesday, March 12, 2013

Enemies of the Internet

 

Special report on Internet surveillance, focusing on five governments and

five companies that are Enemies of the Internet

Published on Monday 11 March 2013.

Printable version PrintSend this article by mail Send français

http://en.rsf.org/special-report-on-internet-11-03-2013,44197.html

 

 

ENEMIES OF THE INTERNET 2013

 

Today, 12 March, World Day Against Cyber-Censorship, Reporters Without

Borders is releasing a Special report on Internet surveillance, available at

surveillance.rsf.org/en. It looks at the way governments are increasingly

using technology that monitors online activity and intercepts electronic

communication in order to arrest journalists, citizen-journalists and

dissidents. Around 180 netizens worldwide are currently in prison for

providing news and information online.

 

For this year’s “Enemies of the Internet” report, Reporters Without Borders

has identified Five State Enemies of the Internet, five “spy” states that

conduct systematic online surveillance that results in serious human rights

violations. They are Syria, China, Iran, Bahrain and Vietnam. Surveillance

in these countries targets dissidents and has grown in recent months.

Cyber-attacks and intrusions, including the use of malware against

dissidents and their networks, are on the increase.

 

China, whose Electronic Great Wall is probably the world’s most

sophisticated censorship system, has stepped up its war on the use of

anonymization tools and has enlisted private-sector Internet companies to

help monitor Internet users. Iran has taken online surveillance to a new

level by developing its own national Internet, or “Halal Internet.” As

regards Syria, Reporters Without Borders has obtained an unpublished

document – a 1999 invitation by the Syrian Telecommunications Establishment

to bid for a national Internet network in Syria – which shows that its

Internet was designed from the outset to include extensive filtering and

surveillance.

 

Without advanced technology, authoritarian regimes would not be able to spy

on their citizens. Reporters Without Borders has for the first time compiled

a list of five “Corporate Enemies of the Internet,” five private sector

companies that it regards as “digital era mercenaries” because they sell

products that are used by authoritarian governments to commit violations of

human rights and freedom of information. They are Gamma, Trovicor, Hacking

Team, Amesys and Blue Coat.

 

Trovicor’s surveillance and interception products have enabled Bahrain’s

royal family to spy on news providers and arrest them. In Syria, Deep Packet

Inspection products developed by Blue Coat made it possible for the regime

to spy on dissidents and netizens throughout the country, and to arrest and

torture them. Eagle products supplied by Amesys were discovered in the

offices of Muammar Gaddafi’s secret police. Malware designed by Hacking Team

and Gamma has been used by governments to capture the passwords of

journalists and netizens.

 

“Online surveillance is a growing danger for journalists,

citizen-journalists, bloggers and human rights defenders,” Reporters Without

Borders secretary-general Christophe Deloire said. “Regimes seeking to

control news and information increasingly prefer to act discreetly. Rather

than resort to content blocking that generates bad publicity and is early

circumvented, they prefer subtle forms of censorship and surveillance that

their targets are often unaware of.

 

“As surveillance hardware and software provided by companies based in

democratic countries is being used to commit grave human rights violations,

and as the leaders of these countries say they condemn violations of online

freedom of expression, it is time they took firm measures. Above all, they

should impose strict controls on the export of digital arms to countries

that flout fundamental rights.”

 

Negotiations between governments already led in July 1996 to the Wassenaar

Arrangement, which aims to promote “transparency and greater responsibility

in transfers of conventional arms and dual-use goods and technologies, thus

preventing destabilizing accumulations.” Forty countries, including France,

Germany, the United Kingdom and the United States are nowadays party to the

agreement.

 

By demonstrating the importance of online information, the Arab Spring

reinforced authoritarian governments’ understanding of the advantages of

monitoring and controlling Internet data and communication. Democratic

countries also seem increasingly ready to yield to the siren song of the

need for surveillance and cyber-security at any cost. This is evident from

all the potentially repressive laws and bills such as FISAA and CISPA in the

United States, the Communications Data Bill in Britain and the Wetgeving

Bestrijding Cybercrime in the Netherlands.

 

Reporters Without Borders has made a “digital survival kit” available on the

WeFightCensorship.org website in order to help online news providers evade

increasingly active and intrusive surveillance.

 

==========================================

(F)AIR USE NOTICE: All original content and/or articles and graphics in this

message are copyrighted, unless specifically noted otherwise. All rights to

these copyrighted items are reserved. Articles and graphics have been placed

within for educational and discussion purposes only, in compliance with

"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.

The principle of "Fair Use" was established as law by Section 107 of The

Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain

permission or pay royalties for the use of previously copyrighted materials

if the purposes of display include "criticism, comment, news reporting,

teaching, scholarship, and research." Section 107 establishes four criteria

for determining whether the use of a work in any particular case qualifies

as a "fair use". A work used does not necessarily have to satisfy all four

criteria to qualify as an instance of "fair use". Rather, "fair use" is

determined by the overall extent to which the cited work does or does not

substantially satisfy the criteria in their totality. If you wish to use

copyrighted material for purposes of your own that go beyond 'fair use,' you

must obtain permission from the copyright owner. For more information go to:

http://www.law.cornell.edu/uscode/17/107.shtml

 

THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS

PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 

 

 

 

 

 

No comments:

Post a Comment