SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024.
Digital Repression and Techno-
Authoritarianism
Digital Repression/Techno-Authoritarianism
What does it mean to you?
• Censorship
• Disinformation / Propaganda
• Surveillance / Privacy
• Cyberattacks / Cybersecurity — state-sponsored
• Cyber Sovereignty
• Internet Shutdown / Fragmentation
• Trend:
• From defensive to o
ff
ensive
• From local to beyond borders
China’s Great Firewall (GFW)
Digital Repression 1.0
• “Keeping things out,” at
fi
rst
• Technology and laws, but also infrastructural and operational: Total control
• State-controlled telecom sector: from gateways to providers
• Massive human resources for real-time monitoring
• Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world
• More proactive surveillance and disinformation
• The future is AI?
• No longer de
fi
ned by boundaries of borders — GFW going global
But the GFW is not for everyone
Calling for GFW 2.0
• Example of Cambodia’s National Internet Gateway (work in progress since 2021)
• Telecom infrastructure control and huge cost to surveil
• Dependency on foreign/global platforms and telcos (except for China)
• The evolution of digital repression is still based on the four pillars of the GFW:
• Technology — The Digital Silk Road
• Law — more speci
fi
c and targeted local laws with global reach
• Infrastructure, and operation — exert control via legal enforcement
Digital Authoritarian Legal Developments
Some examples
• India
• IT Rules amendments 2021 — removal of misinformation, control over platforms
• Digital Personal Data Protection 2023 — to block services on vague grounds
• Telecom Act 2023 - interception of communications for national security
• Singapore
• Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment
against “fake news”
• Foreign Interference Countermeasures Act (FICA) 2023 — Heavy
fi
nes and jail terms against those deemed to be
“preparing or planning” to publish “forbidden” information online without declaring foreign involvement;
unprecedented powers of government scrutiny and restrictions on the
fi
nancial a
ff
airs of targeted individuals and
entities.
• The common characteristics: Broad and vague.
Example for even just a civil case
• //The sweeping order comes as a result of legal
action by a group purporting to represent Appin’s
digital training centers — who say their students’
reputations are damaged by Reuters’ allegedly
false reporting. Last month, Additional District
Judge Rakesh Kumar Singh ruled that the story
should be suppressed pending trial.//
• Other media (Wired, Lawfare, Brookings Institute
etc.) removed references or excerpts: //Several of
the U.S. platforms who later removed content
became aware of the disputed allegations not
because they were following Indian legal news, but
after hearing from Khare’s American
fi
rm, Clare
Locke.//
• “Everyone except” The Citizen Lab “complied”
• Beyond laws, think about the power of a
“cooperative” foreign judiciary
The power of a court
Democracies make bad laws too
Global assault on privacy by encryption is led by Western democracies
• UK’s Online Safety Bill has passed in 2023
• Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023)
• US laws in Congress:
• EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish
a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes
• STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su
ff
ering from Abuse and
Mistreatment Act of 2023)
• KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet.
• Autocrats can justify themselves: “Democracies (you guys) do it too.”
• Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on
encryption
What’s next? Transnational Digital Repression
Trend 1: In
fl
uencing global technology standards
• China’s e
ff
ort to sponsor and in
fl
uence global technology standard setting bodies:
ITU, IEEE, IETF, etc.
• Attempts to migrate standard-setting and Internet operational powers from multi-
stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such
as ITU and its subgroups, under the UN
• E
ff
orts are often led via proxies such as Huawei and academic research institutions
• Attempts to set up its own axis of nations and corporations such as the World
Internet Congress to support its vision for more government control for better
“security, safety and harmony” of the future Internet, in the name of national and
global security, anti-terrorism and combatting cybercrime.
Trend 2: Extraterritoriality
• Manufacturing a new legal basis:
Extending global jurisdiction for data
laws, national security laws, etc.
• You’re not “safe anywhere”: A global
chilling e
ff
ect, at the minimum, and
more, wherever you are.
Transnational Digital Repression
Transnational Digital Repression
Trend 3: Taking over the Rule-based World Order
• Not taking it down, but taking it over!
• Case: UN Cybercrime Convention
• Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right?
• How to de
fi
ne cybercrime? Anything done with a PC or phone, including expressing dissent?
• Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc.
• Power of secret investigation for governments to obtain and share data from global Internet platforms
• How can platforms not comply? The “follow local law” excuse.
• Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting
crimes!
• Western governments are quite muted in the convention discussion (except Canada)
• Largely represented by justice and law enforcement branches, not human rights and diplomatic branches
• Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
The Global Weaponization of Legal and
Technological Means to Limit Online
Freedom and Redefine Truth For
Citizens Anywhere
References
• The Everything, Everywhere Censorship of China (2023)
https://www.freiheit.org/publikation/everything-everywhere-censorship-china
• Internet Impact Brief: Cambodia National Internet Gateway
https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia-
national-internet-gateway/
• How a Judge in India Prevented Americans From Seeing a Blockbuster Report
https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters-
story-00136339
• Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding
Session
https://www.hrw.org/sites/default/
fi
les/media_2024/01/Joint.Advocacy.Statement-
Cybercrime.Convention-Jan.23.2024.pdf
Charles Mok
Global Digital Policy Incubator
Cyber Policy Center
Stanford University
cpmok@stanford.edu

Weitere ähnliche Inhalte

Ähnlich wie Digital Repression and Techno-Authoritarianism

Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
International internet governance
International internet governanceInternational internet governance
International internet governance
Jillian York
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
aghsports
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
Chris Marsden
 

Ähnlich wie Digital Repression and Techno-Authoritarianism (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 

Mehr von Charles Mok

Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

Mehr von Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Kürzlich hochgeladen

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Kürzlich hochgeladen (20)

1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Digital Repression and Techno-Authoritarianism

  • 1. Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024. Digital Repression and Techno- Authoritarianism
  • 2. Digital Repression/Techno-Authoritarianism What does it mean to you? • Censorship • Disinformation / Propaganda • Surveillance / Privacy • Cyberattacks / Cybersecurity — state-sponsored • Cyber Sovereignty • Internet Shutdown / Fragmentation • Trend: • From defensive to o ff ensive • From local to beyond borders
  • 3. China’s Great Firewall (GFW) Digital Repression 1.0 • “Keeping things out,” at fi rst • Technology and laws, but also infrastructural and operational: Total control • State-controlled telecom sector: from gateways to providers • Massive human resources for real-time monitoring • Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world • More proactive surveillance and disinformation • The future is AI? • No longer de fi ned by boundaries of borders — GFW going global
  • 4. But the GFW is not for everyone Calling for GFW 2.0 • Example of Cambodia’s National Internet Gateway (work in progress since 2021) • Telecom infrastructure control and huge cost to surveil • Dependency on foreign/global platforms and telcos (except for China) • The evolution of digital repression is still based on the four pillars of the GFW: • Technology — The Digital Silk Road • Law — more speci fi c and targeted local laws with global reach • Infrastructure, and operation — exert control via legal enforcement
  • 5. Digital Authoritarian Legal Developments Some examples • India • IT Rules amendments 2021 — removal of misinformation, control over platforms • Digital Personal Data Protection 2023 — to block services on vague grounds • Telecom Act 2023 - interception of communications for national security • Singapore • Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment against “fake news” • Foreign Interference Countermeasures Act (FICA) 2023 — Heavy fi nes and jail terms against those deemed to be “preparing or planning” to publish “forbidden” information online without declaring foreign involvement; unprecedented powers of government scrutiny and restrictions on the fi nancial a ff airs of targeted individuals and entities. • The common characteristics: Broad and vague.
  • 6. Example for even just a civil case • //The sweeping order comes as a result of legal action by a group purporting to represent Appin’s digital training centers — who say their students’ reputations are damaged by Reuters’ allegedly false reporting. Last month, Additional District Judge Rakesh Kumar Singh ruled that the story should be suppressed pending trial.// • Other media (Wired, Lawfare, Brookings Institute etc.) removed references or excerpts: //Several of the U.S. platforms who later removed content became aware of the disputed allegations not because they were following Indian legal news, but after hearing from Khare’s American fi rm, Clare Locke.// • “Everyone except” The Citizen Lab “complied” • Beyond laws, think about the power of a “cooperative” foreign judiciary The power of a court
  • 7. Democracies make bad laws too Global assault on privacy by encryption is led by Western democracies • UK’s Online Safety Bill has passed in 2023 • Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023) • US laws in Congress: • EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes • STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su ff ering from Abuse and Mistreatment Act of 2023) • KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet. • Autocrats can justify themselves: “Democracies (you guys) do it too.” • Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on encryption
  • 8. What’s next? Transnational Digital Repression Trend 1: In fl uencing global technology standards • China’s e ff ort to sponsor and in fl uence global technology standard setting bodies: ITU, IEEE, IETF, etc. • Attempts to migrate standard-setting and Internet operational powers from multi- stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such as ITU and its subgroups, under the UN • E ff orts are often led via proxies such as Huawei and academic research institutions • Attempts to set up its own axis of nations and corporations such as the World Internet Congress to support its vision for more government control for better “security, safety and harmony” of the future Internet, in the name of national and global security, anti-terrorism and combatting cybercrime.
  • 9. Trend 2: Extraterritoriality • Manufacturing a new legal basis: Extending global jurisdiction for data laws, national security laws, etc. • You’re not “safe anywhere”: A global chilling e ff ect, at the minimum, and more, wherever you are. Transnational Digital Repression
  • 10. Transnational Digital Repression Trend 3: Taking over the Rule-based World Order • Not taking it down, but taking it over! • Case: UN Cybercrime Convention • Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right? • How to de fi ne cybercrime? Anything done with a PC or phone, including expressing dissent? • Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc. • Power of secret investigation for governments to obtain and share data from global Internet platforms • How can platforms not comply? The “follow local law” excuse. • Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting crimes! • Western governments are quite muted in the convention discussion (except Canada) • Largely represented by justice and law enforcement branches, not human rights and diplomatic branches • Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
  • 11. The Global Weaponization of Legal and Technological Means to Limit Online Freedom and Redefine Truth For Citizens Anywhere
  • 12. References • The Everything, Everywhere Censorship of China (2023) https://www.freiheit.org/publikation/everything-everywhere-censorship-china • Internet Impact Brief: Cambodia National Internet Gateway https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia- national-internet-gateway/ • How a Judge in India Prevented Americans From Seeing a Blockbuster Report https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters- story-00136339 • Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding Session https://www.hrw.org/sites/default/ fi les/media_2024/01/Joint.Advocacy.Statement- Cybercrime.Convention-Jan.23.2024.pdf
  • 13. Charles Mok Global Digital Policy Incubator Cyber Policy Center Stanford University cpmok@stanford.edu