SlideShare une entreprise Scribd logo
1  sur  19
The State Department and Net Freedom:
      All Talk and Little Action …?


A year of great challenges & opportunities




            Heritage Foundation
              Washington, DC
             January 19, 2011
Net Freedom @ Freedom House

– Freedom on the Net (FOTN)
   • 2009 (15), 2011 (37)

– Technology Support
   • Support, Training, Monitoring, Research

– Advocacy / Policy
   • Internet Governance (IGF)
       • Freedom of Expression

       • Engaging NGO Networks

– Strategic Partnerships
What is Net Freedom?

• What techniques are used to
  control and censor online content?

• What are the main threats to
  internet and digital media freedom?

• What are the positive trends and
  uses of these technologies?
HOW DO WE MEASURE NET FREEDOM


• Obstacles to Access


• Limits on Content


• Violations of User Rights
WHAT WE FOUND:
GROWING CIVIC ACTIVISM
Bloggers and other internet
users are using digital media
in creative ways to mobilize:

• Facebook activists in
  Colombia, Iran, Egypt,
  Tunisia

• Use of Twitter for political
  change in Moldova & Tunisia

• Text messages report
  election violence in Kenya

• “Sneakernets” in Cuba
TUNISIA – JASMINE REVOLUTION
LEGAL REPERCUSSIONS AND VIOLENCE
• Legal repercussions:
   – Use of general media legislation
     against online activities as well
     as development of internet-
     specific legislation

• Extra-legal harassment and
  violence:
   – Detentions, intimidation, torture
   – Technical violence: Hacking,
     DDoS attacks, Cyber espionage

• Surveillance and infringements on
  privacy in a wide range of
  environments
RESTRICTING ACCESS
• Seven of the 15 countries studied had blocked
  „Web 2.0‟ applications such as:

   – Facebook

   – YouTube

   – Twitter



• Iran restricts broadband and Mobile SMS

• “Just in Time” blocking (elections, key events)

• Flag for removal: Social Media
CENSORSHIP
• Some censorship in
  every country studied,
  though not always
  political/social content.


• Wide range of techniques for removing content:
   – Technical filtering
   – Manual removal because of government directives, judicial
     orders, intimidation

• China‟s apparatus is the most sophisticated, multi-layered, and
  includes censored SMS.

• Significant lack of transparency in censorship procedures,
  including in some democracies.
GOING THE DISTANCE FOR ACCESS
Would you travel over 600 miles just to check your email?




Residents in the Xinjiang province of China faced crippling
restrictions of email, SMS, and the Internet after the
government clamped down on civil unrest in the area.

Business owners and residents of Xinjiang were forced to
travel 24 hours by car and hundreds of miles by train and
airplane to reach the nearest internet café.
Censorship : New Threats
• Just in Time Blocking

  – Key website and/or services blocked ahead of significant
    events (protest, election, strike)
     •   Communications infrastructure turned off (Iran)
     •   Servers seized
     •   Targeted Censorship: Block key sites at critical time.
     •   Distributed Denial of Service (DDoS) attack
     •   Flag for removal:
          –   Use “abuse reporting” mechanisms to suspend accounts
Censorship : Just in time blocking
Technology Support
• Training
  – Surveillance (Mobile, Internet, etc..)
     • Threats & Vulnerabilities are complex

     • Need to explain in common, simple to understand language



  – Information Security:
     • Secure communications, Circumvention tools

     • Human Factors:

         – Don‟t underestimate what damage one person can do
Discussion (I)

• Understanding the vulnerabilities

  – Need to explain vulnerabilities, threats and solutions in
    simple to use language

     • High Risk Environments / Pervasive Surveillance



  – Sending messages via insecure networks

    • Internet
    • Mobile Networks (location tracking, remote access of phone, etc..)
Discussion (II)
 – Privacy should be maximized
   •   Don‟t leak key information (credentials: username & passwords)

   •   HTTPS Everywhere
        –   Importance of Persistent HTTPS & minimizing history/logs

   •   Web 2.0 (Facebook, Twitter)

        –   Privacy / Account Security settings
        –   Two-Factor Authentication



 – Secure Email

   •   Which webmail service is most/least secure

   •   Gmail (Review of Settings - Best Practices)

   •   Hushmail

   •   Vaultletsoft (Install / Account creation / Features / Best Practices)
Discussion (III)

 – Chat
   •   Skype: Vulnerabilities (What happens if it is blocked or compromised?)
   •   Alternatives : Open Standards Based (Jabber, Guardian Project)

 – Website Hosting

   •   Not just about servers : Domain name registration, bandwidth, etc
   •   Hosting : Pick a jurisdiction that provides protection (US, Amazon EC2..)

 – Anti-censorship / Anonymity

   •   Global Internet Freedom Consortium (GIFT) suite of tools
   •   Psiphon (Proxy), Hotspot Shield (VPN), TOR (Anonymity)
Freedom House is an independent watchdog organization that supports the
expansion of freedom around the world. Freedom House supports democratic
change, monitors freedom, and advocates for democracy and human rights.



                        For more information contact:
           Robert Guerra
           Freedom House

           Email: guerra@freedomhouse.org
           Web: freedomhouse.org
           Twitter: netfreedom

           Support the right of every individual to be free.

Contenu connexe

Tendances

Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
Intro to information security
Intro to information securityIntro to information security
Intro to information securityViraj Ekanayake
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Eric Vanderburg
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicityNatalie Yap
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in CyberspaceMindaugas Kiskis
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 

Tendances (19)

Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Privacy
PrivacyPrivacy
Privacy
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 

Similaire à State Department and Net Freedom: All Talk and Little Action

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.pptBalwinderKaur626266
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPNIC
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 

Similaire à State Department and Net Freedom: All Talk and Little Action (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media Security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 

Dernier

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

State Department and Net Freedom: All Talk and Little Action

  • 1. The State Department and Net Freedom: All Talk and Little Action …? A year of great challenges & opportunities Heritage Foundation Washington, DC January 19, 2011
  • 2. Net Freedom @ Freedom House – Freedom on the Net (FOTN) • 2009 (15), 2011 (37) – Technology Support • Support, Training, Monitoring, Research – Advocacy / Policy • Internet Governance (IGF) • Freedom of Expression • Engaging NGO Networks – Strategic Partnerships
  • 3. What is Net Freedom? • What techniques are used to control and censor online content? • What are the main threats to internet and digital media freedom? • What are the positive trends and uses of these technologies?
  • 4. HOW DO WE MEASURE NET FREEDOM • Obstacles to Access • Limits on Content • Violations of User Rights
  • 5.
  • 7. GROWING CIVIC ACTIVISM Bloggers and other internet users are using digital media in creative ways to mobilize: • Facebook activists in Colombia, Iran, Egypt, Tunisia • Use of Twitter for political change in Moldova & Tunisia • Text messages report election violence in Kenya • “Sneakernets” in Cuba
  • 8. TUNISIA – JASMINE REVOLUTION
  • 9. LEGAL REPERCUSSIONS AND VIOLENCE • Legal repercussions: – Use of general media legislation against online activities as well as development of internet- specific legislation • Extra-legal harassment and violence: – Detentions, intimidation, torture – Technical violence: Hacking, DDoS attacks, Cyber espionage • Surveillance and infringements on privacy in a wide range of environments
  • 10. RESTRICTING ACCESS • Seven of the 15 countries studied had blocked „Web 2.0‟ applications such as: – Facebook – YouTube – Twitter • Iran restricts broadband and Mobile SMS • “Just in Time” blocking (elections, key events) • Flag for removal: Social Media
  • 11. CENSORSHIP • Some censorship in every country studied, though not always political/social content. • Wide range of techniques for removing content: – Technical filtering – Manual removal because of government directives, judicial orders, intimidation • China‟s apparatus is the most sophisticated, multi-layered, and includes censored SMS. • Significant lack of transparency in censorship procedures, including in some democracies.
  • 12. GOING THE DISTANCE FOR ACCESS Would you travel over 600 miles just to check your email? Residents in the Xinjiang province of China faced crippling restrictions of email, SMS, and the Internet after the government clamped down on civil unrest in the area. Business owners and residents of Xinjiang were forced to travel 24 hours by car and hundreds of miles by train and airplane to reach the nearest internet café.
  • 13. Censorship : New Threats • Just in Time Blocking – Key website and/or services blocked ahead of significant events (protest, election, strike) • Communications infrastructure turned off (Iran) • Servers seized • Targeted Censorship: Block key sites at critical time. • Distributed Denial of Service (DDoS) attack • Flag for removal: – Use “abuse reporting” mechanisms to suspend accounts
  • 14. Censorship : Just in time blocking
  • 15. Technology Support • Training – Surveillance (Mobile, Internet, etc..) • Threats & Vulnerabilities are complex • Need to explain in common, simple to understand language – Information Security: • Secure communications, Circumvention tools • Human Factors: – Don‟t underestimate what damage one person can do
  • 16. Discussion (I) • Understanding the vulnerabilities – Need to explain vulnerabilities, threats and solutions in simple to use language • High Risk Environments / Pervasive Surveillance – Sending messages via insecure networks • Internet • Mobile Networks (location tracking, remote access of phone, etc..)
  • 17. Discussion (II) – Privacy should be maximized • Don‟t leak key information (credentials: username & passwords) • HTTPS Everywhere – Importance of Persistent HTTPS & minimizing history/logs • Web 2.0 (Facebook, Twitter) – Privacy / Account Security settings – Two-Factor Authentication – Secure Email • Which webmail service is most/least secure • Gmail (Review of Settings - Best Practices) • Hushmail • Vaultletsoft (Install / Account creation / Features / Best Practices)
  • 18. Discussion (III) – Chat • Skype: Vulnerabilities (What happens if it is blocked or compromised?) • Alternatives : Open Standards Based (Jabber, Guardian Project) – Website Hosting • Not just about servers : Domain name registration, bandwidth, etc • Hosting : Pick a jurisdiction that provides protection (US, Amazon EC2..) – Anti-censorship / Anonymity • Global Internet Freedom Consortium (GIFT) suite of tools • Psiphon (Proxy), Hotspot Shield (VPN), TOR (Anonymity)
  • 19. Freedom House is an independent watchdog organization that supports the expansion of freedom around the world. Freedom House supports democratic change, monitors freedom, and advocates for democracy and human rights. For more information contact: Robert Guerra Freedom House Email: guerra@freedomhouse.org Web: freedomhouse.org Twitter: netfreedom Support the right of every individual to be free.