Feeds

Human rights and wrongs online

'Censorship' or 'protecting citizens'?

5 things you didn’t know about cloud backup

The Western approach to Internet censorship

Let's face it, every country wants to restrict in some way what people see, do, and discuss - both online and offline. They all want to, in what they deem to be "appropriate" circumstances, intercept communications, listen in on conversations, and keep their citizens from using technologies to do "bad" things.

For example, the US State Department report on France incongruously and paradoxically notes that, "[t]here were no government restrictions on the internet" and then that, "a Paris court ordered French internet service providers to block the website of the revisionist Holocaust denying organisation, the Association of Former Connoisseurs of War and Holocaust Stories, to French users" but did not note the fact that the government also attempted to restrict access to Yahoo! sites that sell Nazi memorabilia in violation of French law.

Other "Western" countries have either passed, or threatened to pass legislation to restrict access to or use of the internet. Thus, the Australian Broadcasting Services Amendment (Online Services) Act 1999, requires Austrialian ISPs to delete Australian hosted content from their server (web, Usenet, FTP, etc) that is deemed "objectionable" or "unsuitable for minors" on receipt of a take-down notice from the Australian Broadcasting Authority. In January and February 2002, civil authorities in the District of Düsseldorf (Bezirksregierung Düsseldorf) ordered 76 privately owned and school-based internet providers in of North Rhine-Westphalia to block access to two websites that contain Nazi propaganda, hate speech, and racist tracts.

The United States has many laws which restrict what people can see, do, read and discuss online. For example, the Child Online Protection Act law for which the government subpoenaed Google, criminally punished the commercial distribution of inappropriate materials online, and was a successor statute to the Communications Decency Act which did the same thing in a more restrictive manner.

The Commonwealth of Pennsylvania (PDF) passed a law mandating that all such websites be blocked, and gave every district attorney in the State the power to order such blocking. A host of other US laws can be used to restrict or punish access to or distribution of web content, including anti-spam laws, anti-fraud laws, securities regulations, defamation laws, copyright and trademark laws, espionage and national security laws. These laws are used to both protect citizens from the content, prohibit the use of the technology to further other "bad" or unlawful actions, ensure good "moral" order and well being, as well as to protect the government itself from speech that might be considered inciteful (or insightful) or unlawful. It is altogether fitting and proper that we, like every other sovereign, should be able to do this.

Congressional response

U.S. Congressman Chris Cox introduced legislation called the Global Internet Freedom Act. The bill contains some revolutionary concepts which the US seeks to invoke on the rest of the world, but which have never actually been employed here in the United States. For example, the bill states flat out that, "all peoples have the right to communicate freely with others, and to have unrestricted access to news and information, including on the internet." By "communicate freely" I assume Congressman Cox means without consequence or fear of incarceration. But there has never been such a right here, nor such a right to unrestricted access to information. In the US, we have no right to access to obscenity or child pornography, although this material may be legal in other countries, and vast amounts of it are available online. Try downloading it here (even if you are a citizen of a country where it is legal, and are downloading it from a foreign server) and you could wind up in jail for 20 years. You can't use the internet to foment a revolution, to conspire to commit a crime, to advocate the overthrow of the United States government by force or violence, to access information that the government has classified (or reclassified) as protected for national security or foreign relations purposes. We pass laws like the DMCA to give companies the ability to legally restrict access to video, music, or other copyrighted works, even when the copyright law itself permits such access and use, and then we throw people in jail for making fair uses of these works. Thus, we have never as a society advocated that all persons have the right to unrestricted access to all news and information, nor that they have a right to communicate freely.

The Cox legislation is aimed at defeating "internet jamming" by "repressive foreign governments." While the bill defines "internet jamming" as "jamming, censoring, blocking, monitoring, or restricting internet access and content by using technologies such as firewalls, filters, and 'black boxes'," it interestingly makes no effort to define what constitutes a repressive foreign government, and makes no effort to restrict blocking monitoring or restricting internet access and content by domestic governments. Indeed, most "internet jamming" is a positive and good thing. As a government we pass laws and help both develop and encourage technologies to restrict spam, block or attempt to block access to phishing sites, and sites that distribute spyware and viruses. Preventing "bad" content - or as the Cox legislation defines it, "jamming," is a legitimate role of government. Let's get off our high-horse and say what we really mean.

Good censorship vs. bad censorship

At its most basic level, everybody agrees that some content should either be censored, or if not censored, at least should be actionable. While you have no right to falsely shout fire in a crowded theater, blocking computer viruses is generally a good thing, whether done by the government or by the private sector. What we are really debating is the extension of US or Western values about what is appropriate or inappropriate to the rest of the world, and condemning the extension of foreign values to the West.

Although there are differences between censorship used to protect citizens and that used to protect governments (of course, so that they can do what is best for their citizens), in the final analysis, the distinction between the censorship of internet content in the United States, Germany and France and the censorship in China, Quatar and North Korea is that we do it for good reasons, and of course they do it for bad reasons.

We do it to keep smut from kids, encourage the commercial development and exploitation of intellectual property, protect our nation from insurrection and revolt, and to promote our values - good values. The funny thing about this argument (despite the fact that it is impossible to delineate) is that it is probably right. Repression of human rights is like obscenity. We cant always define it, but as a general rule we know it when we see it. So don't blame the technique (internet filtering and monitoring) when used for bad purposes. Routers don't kill people. People with routers do.

This article originally appeared in SecurityFocus.

Copyright © 2006, SecurityFocus

Mark D Rasch, JD, is a former head of the Justice Department's computer crime unit, and now serves as senior vice president and chief security counsel at Solutionary Inc.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.