SlideShare une entreprise Scribd logo
1  sur  19
The State Department and Net Freedom:
      All Talk and Little Action …?


A year of great challenges & opportunities




            Heritage Foundation
              Washington, DC
             January 19, 2011
Net Freedom @ Freedom House

– Freedom on the Net (FOTN)
   • 2009 (15), 2011 (37)

– Technology Support
   • Support, Training, Monitoring, Research

– Advocacy / Policy
   • Internet Governance (IGF)
       • Freedom of Expression

       • Engaging NGO Networks

– Strategic Partnerships
What is Net Freedom?

• What techniques are used to
  control and censor online content?

• What are the main threats to
  internet and digital media freedom?

• What are the positive trends and
  uses of these technologies?
HOW DO WE MEASURE NET FREEDOM


• Obstacles to Access


• Limits on Content


• Violations of User Rights
WHAT WE FOUND:
GROWING CIVIC ACTIVISM
Bloggers and other internet
users are using digital media
in creative ways to mobilize:

• Facebook activists in
  Colombia, Iran, Egypt,
  Tunisia

• Use of Twitter for political
  change in Moldova & Tunisia

• Text messages report
  election violence in Kenya

• “Sneakernets” in Cuba
TUNISIA – JASMINE REVOLUTION
LEGAL REPERCUSSIONS AND VIOLENCE
• Legal repercussions:
   – Use of general media legislation
     against online activities as well
     as development of internet-
     specific legislation

• Extra-legal harassment and
  violence:
   – Detentions, intimidation, torture
   – Technical violence: Hacking,
     DDoS attacks, Cyber espionage

• Surveillance and infringements on
  privacy in a wide range of
  environments
RESTRICTING ACCESS
• Seven of the 15 countries studied had blocked
  „Web 2.0‟ applications such as:

   – Facebook

   – YouTube

   – Twitter



• Iran restricts broadband and Mobile SMS

• “Just in Time” blocking (elections, key events)

• Flag for removal: Social Media
CENSORSHIP
• Some censorship in
  every country studied,
  though not always
  political/social content.


• Wide range of techniques for removing content:
   – Technical filtering
   – Manual removal because of government directives, judicial
     orders, intimidation

• China‟s apparatus is the most sophisticated, multi-layered, and
  includes censored SMS.

• Significant lack of transparency in censorship procedures,
  including in some democracies.
GOING THE DISTANCE FOR ACCESS
Would you travel over 600 miles just to check your email?




Residents in the Xinjiang province of China faced crippling
restrictions of email, SMS, and the Internet after the
government clamped down on civil unrest in the area.

Business owners and residents of Xinjiang were forced to
travel 24 hours by car and hundreds of miles by train and
airplane to reach the nearest internet café.
Censorship : New Threats
• Just in Time Blocking

  – Key website and/or services blocked ahead of significant
    events (protest, election, strike)
     •   Communications infrastructure turned off (Iran)
     •   Servers seized
     •   Targeted Censorship: Block key sites at critical time.
     •   Distributed Denial of Service (DDoS) attack
     •   Flag for removal:
          –   Use “abuse reporting” mechanisms to suspend accounts
Censorship : Just in time blocking
Technology Support
• Training
  – Surveillance (Mobile, Internet, etc..)
     • Threats & Vulnerabilities are complex

     • Need to explain in common, simple to understand language



  – Information Security:
     • Secure communications, Circumvention tools

     • Human Factors:

         – Don‟t underestimate what damage one person can do
Discussion (I)

• Understanding the vulnerabilities

  – Need to explain vulnerabilities, threats and solutions in
    simple to use language

     • High Risk Environments / Pervasive Surveillance



  – Sending messages via insecure networks

    • Internet
    • Mobile Networks (location tracking, remote access of phone, etc..)
Discussion (II)
 – Privacy should be maximized
   •   Don‟t leak key information (credentials: username & passwords)

   •   HTTPS Everywhere
        –   Importance of Persistent HTTPS & minimizing history/logs

   •   Web 2.0 (Facebook, Twitter)

        –   Privacy / Account Security settings
        –   Two-Factor Authentication



 – Secure Email

   •   Which webmail service is most/least secure

   •   Gmail (Review of Settings - Best Practices)

   •   Hushmail

   •   Vaultletsoft (Install / Account creation / Features / Best Practices)
Discussion (III)

 – Chat
   •   Skype: Vulnerabilities (What happens if it is blocked or compromised?)
   •   Alternatives : Open Standards Based (Jabber, Guardian Project)

 – Website Hosting

   •   Not just about servers : Domain name registration, bandwidth, etc
   •   Hosting : Pick a jurisdiction that provides protection (US, Amazon EC2..)

 – Anti-censorship / Anonymity

   •   Global Internet Freedom Consortium (GIFT) suite of tools
   •   Psiphon (Proxy), Hotspot Shield (VPN), TOR (Anonymity)
Freedom House is an independent watchdog organization that supports the
expansion of freedom around the world. Freedom House supports democratic
change, monitors freedom, and advocates for democracy and human rights.



                        For more information contact:
           Robert Guerra
           Freedom House

           Email: guerra@freedomhouse.org
           Web: freedomhouse.org
           Twitter: netfreedom

           Support the right of every individual to be free.

Contenu connexe

Tendances

Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
Intro to information security
Intro to information securityIntro to information security
Intro to information securityViraj Ekanayake
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Eric Vanderburg
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicityNatalie Yap
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in CyberspaceMindaugas Kiskis
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 

Tendances (19)

Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Privacy
PrivacyPrivacy
Privacy
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 

Similaire à State Department and Net Freedom: All Talk and Little Action

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.pptBalwinderKaur626266
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPNIC
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 

Similaire à State Department and Net Freedom: All Talk and Little Action (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media Security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 

Dernier

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

State Department and Net Freedom: All Talk and Little Action

  • 1. The State Department and Net Freedom: All Talk and Little Action …? A year of great challenges & opportunities Heritage Foundation Washington, DC January 19, 2011
  • 2. Net Freedom @ Freedom House – Freedom on the Net (FOTN) • 2009 (15), 2011 (37) – Technology Support • Support, Training, Monitoring, Research – Advocacy / Policy • Internet Governance (IGF) • Freedom of Expression • Engaging NGO Networks – Strategic Partnerships
  • 3. What is Net Freedom? • What techniques are used to control and censor online content? • What are the main threats to internet and digital media freedom? • What are the positive trends and uses of these technologies?
  • 4. HOW DO WE MEASURE NET FREEDOM • Obstacles to Access • Limits on Content • Violations of User Rights
  • 5.
  • 7. GROWING CIVIC ACTIVISM Bloggers and other internet users are using digital media in creative ways to mobilize: • Facebook activists in Colombia, Iran, Egypt, Tunisia • Use of Twitter for political change in Moldova & Tunisia • Text messages report election violence in Kenya • “Sneakernets” in Cuba
  • 8. TUNISIA – JASMINE REVOLUTION
  • 9. LEGAL REPERCUSSIONS AND VIOLENCE • Legal repercussions: – Use of general media legislation against online activities as well as development of internet- specific legislation • Extra-legal harassment and violence: – Detentions, intimidation, torture – Technical violence: Hacking, DDoS attacks, Cyber espionage • Surveillance and infringements on privacy in a wide range of environments
  • 10. RESTRICTING ACCESS • Seven of the 15 countries studied had blocked „Web 2.0‟ applications such as: – Facebook – YouTube – Twitter • Iran restricts broadband and Mobile SMS • “Just in Time” blocking (elections, key events) • Flag for removal: Social Media
  • 11. CENSORSHIP • Some censorship in every country studied, though not always political/social content. • Wide range of techniques for removing content: – Technical filtering – Manual removal because of government directives, judicial orders, intimidation • China‟s apparatus is the most sophisticated, multi-layered, and includes censored SMS. • Significant lack of transparency in censorship procedures, including in some democracies.
  • 12. GOING THE DISTANCE FOR ACCESS Would you travel over 600 miles just to check your email? Residents in the Xinjiang province of China faced crippling restrictions of email, SMS, and the Internet after the government clamped down on civil unrest in the area. Business owners and residents of Xinjiang were forced to travel 24 hours by car and hundreds of miles by train and airplane to reach the nearest internet café.
  • 13. Censorship : New Threats • Just in Time Blocking – Key website and/or services blocked ahead of significant events (protest, election, strike) • Communications infrastructure turned off (Iran) • Servers seized • Targeted Censorship: Block key sites at critical time. • Distributed Denial of Service (DDoS) attack • Flag for removal: – Use “abuse reporting” mechanisms to suspend accounts
  • 14. Censorship : Just in time blocking
  • 15. Technology Support • Training – Surveillance (Mobile, Internet, etc..) • Threats & Vulnerabilities are complex • Need to explain in common, simple to understand language – Information Security: • Secure communications, Circumvention tools • Human Factors: – Don‟t underestimate what damage one person can do
  • 16. Discussion (I) • Understanding the vulnerabilities – Need to explain vulnerabilities, threats and solutions in simple to use language • High Risk Environments / Pervasive Surveillance – Sending messages via insecure networks • Internet • Mobile Networks (location tracking, remote access of phone, etc..)
  • 17. Discussion (II) – Privacy should be maximized • Don‟t leak key information (credentials: username & passwords) • HTTPS Everywhere – Importance of Persistent HTTPS & minimizing history/logs • Web 2.0 (Facebook, Twitter) – Privacy / Account Security settings – Two-Factor Authentication – Secure Email • Which webmail service is most/least secure • Gmail (Review of Settings - Best Practices) • Hushmail • Vaultletsoft (Install / Account creation / Features / Best Practices)
  • 18. Discussion (III) – Chat • Skype: Vulnerabilities (What happens if it is blocked or compromised?) • Alternatives : Open Standards Based (Jabber, Guardian Project) – Website Hosting • Not just about servers : Domain name registration, bandwidth, etc • Hosting : Pick a jurisdiction that provides protection (US, Amazon EC2..) – Anti-censorship / Anonymity • Global Internet Freedom Consortium (GIFT) suite of tools • Psiphon (Proxy), Hotspot Shield (VPN), TOR (Anonymity)
  • 19. Freedom House is an independent watchdog organization that supports the expansion of freedom around the world. Freedom House supports democratic change, monitors freedom, and advocates for democracy and human rights. For more information contact: Robert Guerra Freedom House Email: guerra@freedomhouse.org Web: freedomhouse.org Twitter: netfreedom Support the right of every individual to be free.