SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Censorship, Surveillance and
Cyberthreats in Hong Kong
Charles Mok


Global Digital Policy Incubator, Stanford University


April 12, 2022
From freedom to censorship
• Before NSL (2020)


• No official or legal mechanism to censor


• No external firewall or filtering mechanism


• Regional telecom hub for underseas cables and datacenters


• Government attempts to introduce censorship


• 2012: Consultation of Control of Obscene and Indecent Articles
Ordinance


• Proposal for mandatory “operator-level content filtering” withdrawn
after public opposition


• 2016: Copyright Ordinance Amendments


• Criminalization of online derivative works of copyrighted materials


• Withdrawn by government in legislature after filibuster in legislature
Can China’s Great Firewall extend to Hong Kong?
• China


• State-owned telecom controls external gateways from 3 coastal cities
with backbone of at least 7 other inland cities (2014)


• China failed to live up to its commitment when joining WTO (2001) for
“ICT and telecom market opening to foreign producers”


• Numerous laws and operational infrastructure to conduct censorship


• Hong Kong’s telecom regime was completely liberalized since 2003


• Buy back incumbent’s external exclusivity license in 1998


• Telecom Ordinance: No limit on number of licenses and foreign
ownership


• No law or censorship infrastructure, until the NSL


• Vibrant civil society, until the NSL
How to shut down the Internet in Hong Kong?
• Emergency Regulations Ordinance (Cap. 241)


• (1) On any occasion which the Chief Executive in Council may consider to be an
occasion of emergency or public danger he may make any regulations whatsoever
which he may consider desirable in the public interest.


• (2) Without prejudice to the generality of the provisions of subsection (1), such
regulations may provide for


(a)censorship, and the control and suppression of publications, writings, maps,
plans, photographs, communications and means of communication;


• The ERO was used many times in the last three yers to bypass the legislature


• Telecommunications Ordinance (Cap. 106) Section 13


• 13. Possession of telecommunications stations taken by government in emergencies


• (1) Where, in the opinion of the Governor, an emergency has arisen in which it is
expedient for the public service that the Government should have control over
telecommunications stations, the Governor, by warrant under his hand, may direct
or cause such telecommunications stations as are specified in the warrant to be
taken possession of and to be used for the service of the Government…
The decline of trust of Internet freedom
• FireChat during


Hong Kong’s


Umbrella


Movement (2014)


and Taiwan’s


Sunflower


Movement (2014)
2019 Anti-extradition bill protests
• Widespread use of Telegram groups


• Apple App Store removal of apps
2019 Anti-extradition bill protests
• Doxxing, from both sides, but law


enforcement on one side only
High Court injunction to censor Internet content (2019.10.31)
• The Police and the Secretary for Justice applied for and was granted a High
Court injunction


• Prohibiting anyone from communicating through “any Internet-based
platform” any materials that “promotes, encourages or incites the use or
threat of violence, intended or likely to cause” bodily injury or property
damage


• Broad and vague scope caused chilling effect on freedom of expression


• Bypass any legislation


• Local civil society applied for discharge or restriction on the injunction


• High Court ruled to continue the injunction with minor amendments to
emphasize the wilfulness of the act


• Injunction was extended and never rescinded


• This can be considered to be the first arbitrary legal weapon against free speech
in Hong Kong
National Security Law (2020)
• Mainland law imposed on Hong Kong — not based on Common Law —
targeting against “secession, subversion, terrorism and collusion with
foreign forces”


• Implementation Rules for Article 43 of the Law of the People's Republic of
China on Safeguarding National Security in the Hong Kong SAR:


• A “designated police officer” can order to take down messages or
contention any electronic platform that was deemed “likely to constitute
an offense endangering national security”


• Failure to comply means the service provider may face seizure of their
electronic devices, plus fines and prison terms up to 6 months


• Chief Executive may authorize the police to intercept communications and
conduct surveillance to “prevent and detect offences endangering
national security”


• The universal reach of the law’s extraterritorial power
After NSL
• Self censorship


• Removing social media posts or entire profiles


• Closing of many online press outlets


• Media closing


• Apple Daily, StandNews, and many others


• Blocking of websites hosted overseas


• HKChronicles (doxxing of police officers and pro-Beijing figures)


• Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*,
Recruitment Centre of National Armed Force


• 2021 Hong Kong Charter


• June 4th Incident Online Museum


• Hong Kong Watch (UK human rights group)


• Some were later reported to be accessible again (*)


• Real name system for prepaid SIM cards (from March 1 2022)
What’s Next?
• Observations


• Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality


• How easy it is to go from free to censorship


• Role of global platforms


• Large commercial presence of Facebook, Google, AWS, Microsoft, etc.


• The government has so far stopped short of openly imposing orders on them to censor


• Very limited underseas cable investment or capacity expansion


• PLCN submarine network etc. redirected to terminate at Taiwan


• Likely a gradual decline of its role as regional telecom and datacenter hub


• Misinformation law


• Imitating Singapore’s POFMA or India’s ITA?


• Make it easier for government to remove any undesirable speech, without invoking NSL


• More pressure on global platforms


• Article 23 local national security law legislation


• Relating to “treason, secession, sedition, subversion against the Central People's Government, or
theft of state secrets” and overseas political ties


• GFW 2.0 — A soft and dynamic firewall?


• More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
Charles Mok


Visiting Scholar


Global Digital Policy Incubator
@charlesmok


cpmok@stanford.edu

Weitere ähnliche Inhalte

Was ist angesagt?

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in PolandJaromir Novak
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsBest Best and Krieger LLP
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Mariya Badeva-Bright
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedMeyers Nave
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretappingAngela Strudwick
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingBest Best and Krieger LLP
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singaporeBenjamin Ang
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsBest Best and Krieger LLP
 

Was ist angesagt? (20)

NGA legislation in Poland
 NGA legislation in Poland NGA legislation in Poland
NGA legislation in Poland
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
 
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently ChangedNewsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
Newsom Issues Three COVID-19 Brown Act Orders: Here’s What He Urgently Changed
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Broadcast Bill
Broadcast BillBroadcast Bill
Broadcast Bill
 
FCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless SitingFCC Proposes New Rules On Local Wireless Siting
FCC Proposes New Rules On Local Wireless Siting
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
History of the regulatory office
History of the regulatory officeHistory of the regulatory office
History of the regulatory office
 
Tatoa FCC Threats and Opportunities
Tatoa FCC Threats and OpportunitiesTatoa FCC Threats and Opportunities
Tatoa FCC Threats and Opportunities
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
 
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local InterestsCellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
Cellphone Tower Regulation: Maximizing Revenue While Protecting Local Interests
 

Ähnlich wie Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should CareBest Best and Krieger LLP
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Arm Igf
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) finalDon Holloway
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdownOtieno Antony
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net NeutralityRochelle Schear
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile lawJacqueline Fick
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetCybera Inc.
 

Ähnlich wie Censorship, Surveillance and Cyber Threats in Hong Kong.pdf (20)

Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
IP Transition and Net Neutrality: Why Local Governments Should Care
IP Transition and Net Neutrality:Why Local Governments Should CareIP Transition and Net Neutrality:Why Local Governments Should Care
IP Transition and Net Neutrality: Why Local Governments Should Care
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 
the Brazilian Broadband Policy
the Brazilian Broadband Policythe Brazilian Broadband Policy
the Brazilian Broadband Policy
 

Mehr von Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 

Mehr von Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Kürzlich hochgeladen

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Censorship, Surveillance and Cyber Threats in Hong Kong.pdf

  • 1. Censorship, Surveillance and Cyberthreats in Hong Kong Charles Mok Global Digital Policy Incubator, Stanford University April 12, 2022
  • 2. From freedom to censorship • Before NSL (2020) • No official or legal mechanism to censor • No external firewall or filtering mechanism • Regional telecom hub for underseas cables and datacenters • Government attempts to introduce censorship • 2012: Consultation of Control of Obscene and Indecent Articles Ordinance • Proposal for mandatory “operator-level content filtering” withdrawn after public opposition • 2016: Copyright Ordinance Amendments • Criminalization of online derivative works of copyrighted materials • Withdrawn by government in legislature after filibuster in legislature
  • 3. Can China’s Great Firewall extend to Hong Kong? • China • State-owned telecom controls external gateways from 3 coastal cities with backbone of at least 7 other inland cities (2014) • China failed to live up to its commitment when joining WTO (2001) for “ICT and telecom market opening to foreign producers” • Numerous laws and operational infrastructure to conduct censorship • Hong Kong’s telecom regime was completely liberalized since 2003 • Buy back incumbent’s external exclusivity license in 1998 • Telecom Ordinance: No limit on number of licenses and foreign ownership • No law or censorship infrastructure, until the NSL • Vibrant civil society, until the NSL
  • 4. How to shut down the Internet in Hong Kong? • Emergency Regulations Ordinance (Cap. 241) • (1) On any occasion which the Chief Executive in Council may consider to be an occasion of emergency or public danger he may make any regulations whatsoever which he may consider desirable in the public interest. • (2) Without prejudice to the generality of the provisions of subsection (1), such regulations may provide for 
 (a)censorship, and the control and suppression of publications, writings, maps, plans, photographs, communications and means of communication; • The ERO was used many times in the last three yers to bypass the legislature • Telecommunications Ordinance (Cap. 106) Section 13 • 13. Possession of telecommunications stations taken by government in emergencies • (1) Where, in the opinion of the Governor, an emergency has arisen in which it is expedient for the public service that the Government should have control over telecommunications stations, the Governor, by warrant under his hand, may direct or cause such telecommunications stations as are specified in the warrant to be taken possession of and to be used for the service of the Government…
  • 5. The decline of trust of Internet freedom • FireChat during 
 Hong Kong’s 
 Umbrella 
 Movement (2014) 
 and Taiwan’s 
 Sunflower 
 Movement (2014)
  • 6. 2019 Anti-extradition bill protests • Widespread use of Telegram groups • Apple App Store removal of apps
  • 7. 2019 Anti-extradition bill protests • Doxxing, from both sides, but law 
 enforcement on one side only
  • 8. High Court injunction to censor Internet content (2019.10.31) • The Police and the Secretary for Justice applied for and was granted a High Court injunction • Prohibiting anyone from communicating through “any Internet-based platform” any materials that “promotes, encourages or incites the use or threat of violence, intended or likely to cause” bodily injury or property damage • Broad and vague scope caused chilling effect on freedom of expression • Bypass any legislation • Local civil society applied for discharge or restriction on the injunction • High Court ruled to continue the injunction with minor amendments to emphasize the wilfulness of the act • Injunction was extended and never rescinded • This can be considered to be the first arbitrary legal weapon against free speech in Hong Kong
  • 9. National Security Law (2020) • Mainland law imposed on Hong Kong — not based on Common Law — targeting against “secession, subversion, terrorism and collusion with foreign forces” • Implementation Rules for Article 43 of the Law of the People's Republic of China on Safeguarding National Security in the Hong Kong SAR: • A “designated police officer” can order to take down messages or contention any electronic platform that was deemed “likely to constitute an offense endangering national security” • Failure to comply means the service provider may face seizure of their electronic devices, plus fines and prison terms up to 6 months • Chief Executive may authorize the police to intercept communications and conduct surveillance to “prevent and detect offences endangering national security” • The universal reach of the law’s extraterritorial power
  • 10. After NSL • Self censorship • Removing social media posts or entire profiles • Closing of many online press outlets • Media closing • Apple Daily, StandNews, and many others • Blocking of websites hosted overseas • HKChronicles (doxxing of police officers and pro-Beijing figures) • Taiwan’s Transitional Justice Commission*, Presbyterian Church*, DPP*, Recruitment Centre of National Armed Force • 2021 Hong Kong Charter • June 4th Incident Online Museum • Hong Kong Watch (UK human rights group) • Some were later reported to be accessible again (*) • Real name system for prepaid SIM cards (from March 1 2022)
  • 11. What’s Next? • Observations • Contrasts with Taiwan, one of the freest in Asia: Hong Kong’s “One Country One System” reality • How easy it is to go from free to censorship • Role of global platforms • Large commercial presence of Facebook, Google, AWS, Microsoft, etc. • The government has so far stopped short of openly imposing orders on them to censor • Very limited underseas cable investment or capacity expansion • PLCN submarine network etc. redirected to terminate at Taiwan • Likely a gradual decline of its role as regional telecom and datacenter hub • Misinformation law • Imitating Singapore’s POFMA or India’s ITA? • Make it easier for government to remove any undesirable speech, without invoking NSL • More pressure on global platforms • Article 23 local national security law legislation • Relating to “treason, secession, sedition, subversion against the Central People's Government, or theft of state secrets” and overseas political ties • GFW 2.0 — A soft and dynamic firewall? • More censorship, surveillance and self-censorship; less bandwidth growth, investment and freedom
  • 12. Charles Mok Visiting Scholar Global Digital Policy Incubator @charlesmok cpmok@stanford.edu