A short history ofprohibited packets: Classification, censorship and Internet filtering David Vaile Executive Director Cyberspace Law and Policy Centre.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Network Security Highlights Nick Feamster Georgia Tech.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Regional Policy EUROPEAN COMMISSION 1 EGTC regulation EGTC regulation ESF and EGTC regulations Regulation of the European Parliament and of the Council.
Libraries for Future Generations Martha Anderson Director National Digital Information Infrastructure and Preservation Program The Library of Congress.
Freedom of Speech (Part 3)
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 Slide 1.1 Introduction to e-business and e-commerce.
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Laws, rules and regulations relating to child care exist in Florida to protect children from abuse, neglect, injury, and exploitation.
Don’t be bullied, or be a bully.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Fostering in the Digital Age. Young people and the online world Increasingly young people make very little distinction between their lives online and.
“Piracy” or “the customer is always right”? Talk for LESANZ May 2014 David Vaile Co-convenor Cyberspace Law and Policy Community Faculty of Law, University.
Topic 1: Introduction Law and the legal system ‘The Information Age’ (1.0) Web 2.0, Internet 2.0, Gov 2.0…
David Vaile Cyberspace Law and Policy Centre, UNSW Law Faculty
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
DOT POINT 6 The role of government, the media and communication technologies in promoting or eroding active citizenship ◦ Refer to the handout distributed.
Copyright & PR Presented by John MacPhail Partner.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
An unruly new realm of personal information distribution: Social media and the law - developments David Vaile Executive Director Cyberspace Law and Policy.
Social networking sites (SNS) What are they? allow users to build personal profiles users link their profiles to those of friends many allow the creation.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Raising a 21 st Century Learner; Shining a Light on the Technology Native Presented by Leslie Watnik MA/MST, PD/SDA, Parent.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Google Street view: ‘Public place’ photography in the Internet age David Vaile, Executive Director Cyberspace Law and Policy Centre UNSW Law Faculty
Legal and ethical issues: Malware, ‘Filtering’, Wifi David Vaile Cyberspace Law and Policy Centre
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Mandatory ISP filtering and the rule of law Nicolas Suzor 24 March 2009.
Power and discipline Foucault, M. (1979): “Discipline and Punish”, chap 3, Vintage Books, New York, Hannemyr, G. (2000): “Foucault I kyberrommet”,
Classification and Internet technical filtering David Vaile, Executive Director Cyberspace Law and Policy Centre UNSW Law Faculty March 2009
PROTECT LEGAL AND REGULATORY REVIEW NOVEMBER 2014.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Content Control. Extreme Regimes Myanmay (Burma) - Possession of modem without permission punishable by years gaol Cuba - Internet access only through.
Michael Coonan Content Assessment International Training Program Melbourne, September 2006 Strategies for regulating online content.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
Drowning in Codes of Conduct: An analysis of codes of conduct applying to online activity in Australia Chris Connolly and David Vaile Cyberspace Law and.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Law in the Information Age Topic 1: Introduction Law and the legal system The Information Age.
Chief Chip! Helping our children & young adults to stay safe online.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
New Rules for the Digital Age NSW Ombudsman Symposium 26 May 2009.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Welcome to Parenting in the Digital Age. This presentation will: Help you to get to grips with what your children are doing online Explain the W-W-W-
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Managing the (Traffic) Managers
Freedom Independence Transition
Sharing Images.
Working to Keep our Children Safe in a World Filled with Technology
E-Commerce: Regulatory, Ethical, and Social Environments
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Presentation transcript:

A short history ofprohibited packets: Classification, censorship and Internet filtering David Vaile Executive Director Cyberspace Law and Policy Centre Faculty of Law, University of NSW

Outline Regulation Filtering Lessig and Code Social media regulation Technological changes 1.0, Legal disconnects Common carriers mutate Censorship and filtering The urge to monitor A wicked problem? Impact of Web 2.0 Decentralisation Filter plans v0 v Prohibited v RC V interpol PC Challenges for regulation Where are we left?

Lawrence Lessigs Code Lessig identifies possible sources of regulation ( Code and other laws of cyberspace – 2.0) Law (old filter obligation?) Technology itself a.k.a. 'Code (filtering, DPI, surveillance) Social norms (netiquette, socially enforced good practice?) Business practice (the new filter obligation?)

Background to online media regulation Tech changes Legal changes

Offline world was nice and simple, for regulators Web 1.0: global publication, old media/publish models Web 2.0: social networking, user generated content Convergence of producer and consumer, + distributor Web 3.0?: mass personalisation, semantic web Its not just your friends who know you and what you mean Attack of the killer toddlers – we are so old Hackers retire at 15, kids turning filter tables on parents, slash Facebook does not enforce own rule of at least 13 yrs old Technological changes underlying

Cyberlibertarian fantasies still delude and excite Reality: Jurisdiction out of control, hyper liability (for you) Intensification not escape from jurisdiction (revenge of the States) Or: no care, and no responsibility? (for the cloud) Your data and business go offshore, but not legal protection The rise of the sub-human: minors at the frontier Deficit in consequences cognitive development: paternalism? Under the age of 18 or appears to be under 18 The fall of the common carrier: ISPs change masters? Agents of a foreign power, or a hostile litigant interest? Enforced discipline of their customers, on pain of sharing liability. Legal disconnects

History No legal right to free speech in Aust, cf US Const 1 st Amdt US – CDA, 1996 CoPA 1998 etc. (finally defeated 2010?) Oz censorship Alston and Harradine (v0) Hamilton and porn 2007 changes 2007 policy (v1) – land grab 2009 retreat (v2) sidestep (v3)

The scope of the content domain Quantity Google: 1 trillion items, 10-60bn change/month? Transience Fast flux injectors, normal live turnover Protocols Very large number, roll your own Content types Convergence: consumers become producers

Why online content control might be a wicked problem Scope is unmanageable? Classification model unviable? Urge to Filter - terminology Design philosphy of the net – under attack? Moral panic – The Panic Button as solution? Real targets are parents? Wishful thinking? Supposed beneficiaries also main perpetrators? Tempting topic for policy-based evidence? Constant evolution of technology and practices

1,000 items in 1,000,000,000,000, no checking 10 billion change per month Appalling spin and shifting goals for the magic box Appeasing the swinging fundamentalists? Real child protectors: What risks? Does filtering work? Parents want to be rescued: Panic Button is for them Cargo cult mentality, denial, and hope of a saviour Does not address real problems: resilience, detection of criminals, communication with techno kids Sexting, slash fiction and innocents on the loose Censorship & ISP level Internet filtering

Surely it is censorship? Offline model: centralised distribution, choke points Web 1.0: more distributors, easier importation Web 2.0: everyone is a creator, (re)-publisher, exporter Web 3.0: the cloud knows what you like, and makes it? Encryption and roll-your-own protocols already in use The long cyber-war: endless arms race between the straiteners and those seeking to avoid the blocks? When is publication not publication? Chinese solution: you never know: the Panopticon: (no-one home, but you self censor) The struggle for censors to keep up

And then there was 2.0 Social networking, user generated content, degenerate narcissism Blurs boundary: Publishing cf. Personal Communications From centralised one-to-many topology to distributed network Everyone is both consumer and producer (prosumer) Everyone is a permanent global publisher Every device is an endless movie source: deluge of data No editorial brain involved (both users and ISPs)? No selection? ISP replaces Publisher as censor point – very significant? iiNet

Ye Olde Worlde (–2006) Publisher Block here? ReaderViewerListenerProducer Importer Block here?

New fangled (SNS/UGC) Producer Publisher Reader ISPs: the new block point

Filter v0: voluntary PC-based filters Promoted by Senator Harradine, Telstra sale deal price of vote Conveniently ignored by many, but came back to haunt Set the principle, without proper scrutiny: you can censor the net PC–based operation an issue for setup and avoidance NetAlert scheme Howard government – small regulation model? Voluntary Replaced by Labors 2007 election campaign, junked.

v1 Mandatory ISP blacklist – Prohibited Prohibited or potentially prohibited content (CB or ACMA) Classification Scheme: See the Tables in the National Code RC (what is RC? CP, terror, crime, gross,...) X18+ R18+ Some MA15+ (OK on TV, as AV15+ - non-neutral models) Only on complaint, then ACMA blacklist Entirely within fed govt – avoids state based partners What would have been blocked? Mosquito net?

Australian cf. international content Key difficulties for censorship, the reason for filter? Extraterritoriality, jurisdiction limits (out of country) Inside: Notices (Take down content, Link deletion, stream cessation) for items hosted in Australia Directed not at author or owner but ICH, intermediary No motive to resist? Or seek actual classification Not obligation to get content classified (cf Film, Game, Pub) Prohibited (CB) or Potentially prohibited (ACMA deem) Refused Classification, X18+: all (See refs)refs R18+: if no age verification service MA15+: no AVS, for profit, not text or image Offshore: ACMA secret blacklist based on complaint too

v2 Mandatory ISP blacklist – RC Illegal or RC (CB or ACMA) Classification Scheme: See the Tables in the National Code RC (what is RC? CP, terror, crime, gross,...) Only on complaint, then ACMA blacklist Entirely within fed govt – avoids state based partners mid 2009 – quiet and unannounced abandonment of v1

v3 Voluntary ISP blacklist - ?? International child porn list (2 members Interpol) No Classification Scheme No RC Not clear how a page gets on list Entirely outside fed govt – but enforced by persuasion? Not require legislation (doomed) No oversight? Voluntary: Telstra, Optus, most customers

Challenges for regulation Impossible to treat online content same as offline mass media Human classification: orders too expensive Machine classification: intrinsically ineffective Transparency and accountability v. secrecy Complaints/reporting as a visible response... Then what? No ambition to classify all – but what to say to parents? Real regulation v rheotorical regulation? (Chatham House breach)

[Other issues] Classification is not censorship Tide of classification/censorship, in and out (Irene Graham) Discourses of disconnection: Disjuncted debates free speech über alles v. think of the little children Non-censoring classification? Filter Side effects: security? HTTPS, issues about viability Other uses: content, Brilliant Digital, Speck/Burmeister Recent: APF to intervene in iiNet case

Where does this leave us? Minister still wants to deliver on promise What stopped v1 and v2? Is v3 better or worse? Will it make any difference? The politics of gesture Wide scope of RC Legitimate concerns of eg parents? (3 options, seminar 1)seminar 1 Will we ever have a proper discussion of needs of young pp?

Questions? David Vaile Cyberspace Law and Policy Centre Faculty of Law, University of NSW

[References] CLPC research project references list, current to early research project McLelland, M 2010, Australias proposed internet filtering system: its implications for animation, comics and gaming (acg) and slash fan communities, Media International Australia, vol. 134, pp Long URL Lumby, C, Green, L & Hartley, J 2010, Untangling the Net: The Scope of Content Caught By Mandatory Internet Filtering, Submission to the Federal Government of Australia. (Please Read the Executive Summary and pages 1-14.) Vaile, D, and Watt, R 2009, 'Inspecting the despicable, assessing the unacceptable: Prohibited packets and the Great Firewall of Canberra', Telecommunications Journal of Australia, vol. 59 no. 2, p , Via Monash ePress on Sirius or