- Global Voices Advocacy - http://advocacy.globalvoicesonline.org -

Netizen Report: Human Rights Edition

Written by Netizen Report Team On 8 February 2013 @ 4:09 am | No Comments

In Feature, Netizen Report, News

Image by Flickr user Sean MacEntee - CC BY-SA 2.0 [1]

Image by Flickr user Sean MacEntee (CC BY-SA 2.0)

Most of this report was researched, written, and edited by Corey H. Abramson, [2] Weiping Li [3], Renata Avila [4], Hisham Almiraat [5]  [6]and Sarah Myers [7].

On February 1, a coalition of human rights groups jointly filed formal complaints [8] with the Organization for Economic Cooperation and Development (OECD) [9]against European-based surveillance technology companies Gamma Group and Trovicor GmbH for their potential involvement in human rights violations in Bahrain.

Various reports highlighting the Bahraini government’s use of both Gamma and Trovicor products against pro-democracy activists have surfaced in recent years [10]. Citing the joint complaint, UK-based privacy rights NGO Privacy International explains [11] that the pair “breached no fewer than 11 of the OECD Guidelines for Multinational Enterprises [12],” which address business practices that may affect human rights. While the OECD Guidelines are not enforceable by law, the intergovernmental institution can choose to speak publicly about the complaint, a move that could serve as a strong sanction for the companies’ actions.

Mass pro-reform demonstrations have been ongoing in Bahrain since February 2012 and have been met with an excessive use of force by government authorities, according to Amnesty International’s 2012 report on Bahrain. [13] At least 47 people have been killed as part of the crackdown, and thousands have been arrested in connection with the protests.

Privacy
International Privacy Day was celebrated around the world on January 28 with campaigns calling for greater attention to individuals’ privacy rights. Global Voices Advocacy published a round-up [14]of some of the successes in anti-surveillance campaigns over the past year.

US Federal Trade Commission (FTC) issued a staff report [15] recommending practices for companies in the mobile telecommunications industry to protect consumers’ privacy. These included a provision that would require companies to notify users if privacy-invasive measures such as geotracking were to be used by apps they had installed on their phones. They also proposed offering smartphone users the option of activating Do Not Track, [16]a tool that allows users to opt out of tracking by websites they do not visit.

A flaw [17]was found in the social networking service Path [18], which tags geolocation data found in photos to users’ posts on social networking platforms. According to Ars Technica [17], “Path's iOS app was found copying geographic locations embedded in photos and pasting them into user posts—even when location services have been disabled.” Path, which was recently fined [19] US $800,000 by the FTC for violating consumer privacy, has promised to fix the problem.

Censorship
In Russia's Kostroma region, government officials have plans to begin filtering online content [20] in the name of protecting children. Similar to the Internet blacklist [21] launched in November, this program will implement a subscription service for parents and children that will provide technical filtering of content deemed inappropriate for children.

Thuggery
After surviving an assassination attempt by the Taliban, 15-year-old Pakistani blogger and activist Malala Yousafza [22]i spoke out for the first time in a video statement [23]. She promised to continue fighting for girls’ and children’s rights to education and called for public support and action on the issue.

Vietnamese blogger Le Anh Hung [24]was detained by security officials in a mental health institution for writing posts critical of the government. Vietnamese officials claim the detention is at the request of the blogger’s mother, yet Hung’s mother denies this claim and says that she and others are not allowed to visit Hung.

National Policy
On January 22, Iraq’s Parliament voted to revoke [25] a proposed Cyber Crime Law, which was criticized [26] for its vague definition of crimes such as “[espousing online] ideas which are disruptive to public order” and harsh punishments. The Electronic Frontier Foundation [27] published an overview of the law's provisions and its potential impact for Internet users after the draft law was released last spring.

Cybersecurity
Several major media outlets in the United States including the New York Times [28], the Wall Street Journal [29], and the Washington Post [30] revealed that their computer systems have been attacked by hackers suspected to be from China. According to reports, the hackers broke into the newspapers’ internal networks, spying on reporters’ email communications as well as files. Global Voices’ Oiwan Lam points out [31] that cybersecurity has long been a major concern for Hong Kong and China-based independent reporters whose email accounts and SMS messaging services are frequently hacked.

Meanwhile, Twitter also experienced a cyber attack [32] in which approximately 250,000 users were affected. Twitter believed the hack was done by “sophisticated attackers” and was not an isolated incident.

The New York Times [33] reported that authorities in the US conducted a “secret legal review” of federal policy on the use of cyberweapons. Likely prompted by months of attacks [34] on websites of US-based financial institutions, the review concluded [35] that the President can command a pre-emptive strike if there is credible evidence of a “major digital attack” on the horizon. The rules governing this new executive power are classified.

Russia plans to fortify [36]its cybersecurity practices by establishing a system to “detect, prevent, and respond to computer attacks.” The Kremlin issued a decree describing the new system [37], explaining that it will not only serve state agencies but also private websites, on the premise that all websites hosted in Russia are tied to the base network of the Russian Federation. The new policy will mark a shift in responsibility for cybersecurity from the Ministry of the Interior to the Federal Security Service (FSB), the country's primary agency for counter-intelligence and counter-terrorism.

Netizen Activism

After incorporating comments and contributions from Internet communities such as Reddit [38], US House Representative Zoe Lofgren announced [39] an updated draft version [40] of the “Aaron’s Law,” a bill to reform the Computer Fraud and Abuse Act (CFAA) which had led to the prosecution of Aaron Swartz, [41] the programmer and open Internet advocate who committed suicide in January of 2013.

Indonesian government websites were hacked [42] after the police arrested 22-year-old Wildan Yani Ashari who allegedly hacked into [43] the Indonesian President’s website in an effort to protest increasing government corruption in the country.

In Uzbekistan, one or multiple hackers broke into [44] the website [45] of the government-run National Television and Radio Broadcaster, replacing the regular content on the agency's homepage with a message that read, “The news you spread are lies!” The hacker(s), who identified themselves under the name Clone Security [46], appear to support [47] Internet openness.

Cool Things
Collaborative website Noisebridge [48] wrote a tongue-in-cheek response [49] to Hollywood film studio DreamWorks, which had requested permission to use the Noisebridge logo in an upcoming movie about Julian Assange. The letter notes that “the only conditions under which Noisebridge would sue [DreamWorks] and their partners to the maximum damages entitled to us by law would be if it turned out that hackers like us were completely hypocritical nihilists out only for our own egotistical ends.”

Wired has posted a real-time visualization of Tweets [50] around the world.

Publications and Studies


Subscribe to the Netizen Report by email [54]

For upcoming events related to the future of citizen rights in the digital age, see the Global Voices Events Calendar [55].


Article printed from Global Voices Advocacy: http://advocacy.globalvoicesonline.org

URL to article: http://advocacy.globalvoicesonline.org/2013/02/08/netizen-report-human-rights-edition/

URLs in this post:

[1] Image: http://www.flickr.com/photos/smemon/5015469859/sizes/n/in/photostream/

[2] Corey H. Abramson,: http://advocacy.globalvoicesonline.org/author/corey_abramson/

[3]  Weiping Li: http://advocacy.globalvoicesonline.org/author/weiping-li/

[4] Renata Avila: http://globalvoicesonline.org/author/renata-avila/

[5] Hisham Almiraat: http://globalvoicesonline.org/author/hisham/

[6]  : http://globalvoicesonline.org/author/rayna-st/

[7] Sarah Myers: http://advocacy.globalvoicesonline.org/author/sarahbmyers/

[8] jointly filed formal complaints: http://www.guardian.co.uk/world/2013/feb/02/uk-firm-spyware-bahrain

[9] Organization for Economic Cooperation and Development (OECD) : http://www.oecd.org/

[10] have surfaced in recent years: http://www.bloomberg.com/news/2013-02-04/rights-groups-file-oecd-complaint-against-surveillance-firms.html

[11] Privacy International explains: https://www.privacyinternational.org/blog/our-oecd-complaint-against-gamma-international-and-trovicor

[12] Guidelines for Multinational Enterprises: http://www.oecd.org/daf/internationalinvestment/guidelinesformultinationalenterprises/

[13] 2012 report on Bahrain.: http://www.amnesty.org/en/region/bahrain/report-2012

[14] round-up : http://advocacy.globalvoicesonline.org/2013/01/31/international-privacy-day-anti-surveillance-success-stories/

[15] staff report: http://www.ftc.gov/opa/2013/02/mobileprivacy.shtm

[16] Do Not Track, : http://donottrack.us/

[17] A flaw : http://arstechnica.com/apple/2013/02/path-promises-fix-for-new-privacy-liberties-taken-by-ios-app/

[18] Path: https://path.com/

[19] fined: http://www.guardian.co.uk/technology/2013/feb/01/path-fined-ftc

[20] filtering online content: http://globalvoicesonline.org/2013/02/03/russian-internet-censorship-imitates-satire/

[21] Internet blacklist: http://globalvoicesonline.org/2012/11/14/lurkmore-or-lurkless-the-russian-internet-blacklist-in-action/

[22] Malala Yousafza: http://en.wikipedia.org/wiki/Malala_Yousafzai

[23] video statement: http://thelede.blogs.nytimes.com/2013/02/04/a-video-statement-from-malala-yousafzai-the-pakistani-girl-shot-by-the-taliban/?smid=tw-share

[24] Le Anh Hung : http://www.rfa.org/english/news/vietnam/blogger-01262013172851.html

[25] revoke: http://www.smex.org/2013/02/cyber-crime-law-in-iraq-revoked/

[26] criticized: https://www.accessnow.org/blog/iraqs-internet-on-the-brink

[27] Electronic Frontier Foundation: https://www.eff.org/deeplinks/2012/03/proposed-laws-lebanon-iraq-threaten-online-speech

[28] the New York Times: http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all

[29] the Wall Street Journal: http://professional.wsj.com/article/SB10001424127887323926104578276202952260718.html?mg=reno64-wsj

[30] the Washington Post: http://www.washingtonpost.com/business/technology/chinese-hackers-suspected-in-attack-on-the-posts-computers/2013/02/01/d5a44fde-6cb1-11e2-bd36-c0fe61a205f6_story.html

[31] points out: http://advocacy.globalvoicesonline.org/2013/02/05/chinese-hackers-track-whistleblowers-by-spying-on-journalists/

[32] cyber attack: http://blog.twitter.com/2013/02/keeping-our-users-secure.html

[33] New York Times: http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html?pagewanted=all&_r=2&

[34] months of attacks: http://www.forbes.com/sites/sap/2013/01/18/cyber-attacks-against-banks-continue-wall-street-we-have-a-problemo-bro/

[35] concluded: http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html?pagewanted=all&_r=1&

[36] fortify : http://netprophet.tol.org/2013/02/04/russia-hopes-to-get-tough-on-cyber-attacks/

[37] decree describing the new system: http://in.reuters.com/article/2013/01/21/russia-cyber-security-putin-idINDEE90K0AZ20130121

[38] Reddit: http://www.reddit.com/

[39] announced: https://www.eff.org/deeplinks/2013/02/aarons-law-2-major-steps-forward-more-work

[40] updated draft version: http://www.reddit.com/r/IAmA/comments/17pisv/im_rep_zoe_lofgren_here_is_a_modified_draft/

[41] Aaron Swartz,: http://en.wikipedia.org/wiki/Aaron_Swartz

[42] hacked: http://www.esecurityplanet.com/hackers/indonesian-government-sites-hacked-following-hackers-arrest.html

[43] hacked into: http://www.theregister.co.uk/2013/01/11/indonesian_presidents_website_hacked/

[44] broke into: http://netprophet.tol.org/2013/02/01/hackers-break-into-official-uzbek-tv-site-to-highlight-media-propaganda/

[45] website: http://advocacy.globalvoicesonline.orgmtrk.uz

[46] Clone Security: https://twitter.com/CloneSecurity

[47] appear to support: http://twitter.com/CloneSecurity/status/278470646210637825

[48] Noisebridge: https://www.noisebridge.net/wiki/Noisebridge

[49] tongue-in-cheek response: https://www.noisebridge.net/wiki/DreamworksReply

[50] real-time visualization of Tweets: http://www.wired.com/design/2013/02/tweetping/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Top+Stories%29

[51] The Telco Hall of Shame: https://www.accessnow.org/policy/the-telco-hall-of-shame

[52] Global Information Society Watch 2012: http://www.giswatch.org/sites/default/files/GISWatch12_web.pdf

[53] Middle East and North Africa CyberWatch – January 2013: https://citizenlab.org/2013/01/middle-east-and-north-africa-cyberwatch-january-2013/

[54] Subscribe to the Netizen Report by email: http://feedburner.google.com/fb/a/mailverify?uri=NetizenReport

[55] Global Voices Events Calendar: https://www.google.com/calendar/embed?src=9o8so5err9tvamd9t0ri9t181o%40group.calendar.google.com&ctz=America/New_York

Copyright © 2009 Global Voices Advocacy. CC-Attribution