Awards 2010

[vc_row full_width=”stretch_row_content_no_spaces” full_height=”yes” css_animation=”fadeIn” css=”.vc_custom_1556717524900{background-image: url(https://www.indexoncensorship.org/wp-content/uploads/2010/03/awards-2010-1460×490.jpg?id=81563) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_custom_heading text=”FREEDOM OF EXPRESSION AWARDS 2010″ use_theme_fonts=”yes”][vc_column_text]Index on Censorship’s Freedom of Expression Awards exist to celebrate individuals or groups who have had a significant impact fighting censorship anywhere in the world.

  • Awards were offered in five categories: Campaigning, Journalism, Publishing, Music and New Media
  • There was a Special Commendation for journalist Heather Brooke
  • Winners were honoured at a gala celebration in London at the Royal Institute of British Architects

[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_single_image image=”81571″ img_size=”full”][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][staff name=”Twitter” title=”New Media Award” profile_image=”81581″]Twitter is a free social networking and micro-blogging service that enables users to send and read messages with a 140-character limit. Twitter was thrust to the fore of international politics during the contested 2009 Iranian elections. During the huge protests that followed, the site played a pivotal role in mobilising protesters and facilitated a direct line of communication between demonstrators, news outlets and engaged people around the world. Maintaining its service in the face of a totalitarian regime, Twitter demonstrated how social networking can have a direct impact on the world stage. It was also used as a powerful tool in protecting free expression in the UK when solicitors Carter-Ruck, acting on behalf of Trafigura, the multinational oil company, tried to prevent the press from publishing details of a parliamentary question about a report into the alleged dumping of toxic waste in the Ivory Coast. Within hours, “#trafigura” and “#carterruck” were the site’s most popular topics.[/staff][/vc_column][vc_column width=”1/3″][staff name=”Rashid Hajili” title=”Bindmans Law and Campaigning Award” profile_image=”81577″]Rashid Hajili is the chair of the Media Rights Institute in Azerbaijan, which monitors free expression and works for the protection of journalists and bloggers. In a country with an ever worsening record on press freedom, Hajili is one of a small group of individuals who defends the rights of journalists and advocates for greater access to information. He has defended a number of prominent journalists, including imprisoned editor Eynulla Fatullayev. A leading voice in the campaign for media law reform in the country, Hajili is a prolific writer and tireless campaigner who has drafted legislation on protection of sources and broadcasting freedom. In December 2009, he worked with the organisation Article 19 on a case in the European Court of Human Rights to decriminalise defamation. “A country where freedom of speech is suppressed cannot have a positive image in the international community,” says Hajili. “Lack of tolerance to criticism means that democratic principles and values do not function in this country.”[/staff][/vc_column][vc_column width=”1/3″][staff name=”Radio La Voz” title=”Guardian Journalism Award” profile_image=”9072″]Operating in Bagua Grande in the Utcubamba Region of Peru, Radio La Voz was founded in 2007 by respected broadcast journalist Carlos Flores Borja and his sons. The station’s aim is to broadcast cultural programmes and information about environmental protection and human rights, fight political corruption and support local communities. Radio La Voz lost its licence in 2009 after the government accused the  station of “supporting violence against security forces” when deadly clashes shook the area. Thirty-four people were killed as Amazonian communities protested about the opening up of huge tracts of land to foreign investment. To date no government representative has offered any evidence to support the veracity of its allegation against the radio station. Flores Borja says that La Voz was only doing its duty as an independent media source. He claims “the government took advantage of the moment to silence a voice critical of its policies”. On 16 February 2010, the case against Radio La Voz was dropped.[/staff][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][staff name=”Andalus Press” title=”Sage International Publishing Award” profile_image=”81574″]Founded in 2000, Andalus is a unique Israeli publishing house dedicated to the translation of Arabic literature and prose into Hebrew. The name reflects nostalgia for the period in Andalusia between the 8th and 15th centuries when Jewish and Arab cultures co-existed. Publisher and founder Yael Lerer hopes to reverse the decline of Hebrew-speaking Israelis reading Arab literature and promote a greater understanding of the region’s Arabic cultural heritage in Israeli society. Andalus publishes literature from Lebanon, Syria, Sudan and Algeria – countries it is nearly impossible for ordinary Israelis to visit – as well as Palestinian writers and poets. Andalus’s translations have appeared in Israeli schools and universities and have also encouraged other publishing houses to re-examine Arabic literature and scholarship.[/staff][/vc_column][vc_column width=”1/3″][staff name=”Mahsa Vahdat and Ferhat Tunç” title=”The Freemuse Award for Music” profile_image=”106574″]Iran has a vibrant underground music scene that explodes tired clichés about Iranian society, and Mahsa Vahdat is a fabulous example of this sub-culture. Vahdat resists the pressures placed on female musicians by conservative sectors of Iranian society. In 2009, she recorded an album with American Mighty Sam McClain called Scent of Reunion – Love songs across civilizations. She was also featured in the powerful film about underground music in Tehran called No One Knows About The Persian Cats. She has shown courage and bold resistance in continuing to follow her artistic ambitions despite obstacles.

For almost three decades Turkish musician Ferhat Tunç has insisted on exercising his right to perform his music, ignoring several court cases and other threats against him in recent years. He has continued to sing in the minority language Zaza (Dimli) and in Kurmanci (Kurdish), as well as in Turkish. He has firmly refused to succumb to any form of intimidation, without expressing any hatred against its perpetrators. Through his brave stand against censorship, Ferhat has actively propagated the strengthening of human rights and democracy in Turkey.[/staff][/vc_column][vc_column width=”1/3″][staff name=”Heather Brooke” title=”Special Commendation” profile_image=”81575″]Without journalist Heather Brooke’s tireless campaign to uncover details of MPs’ expenses, we might never  have discovered the details of MPs’ duck houses, moats and trouser presses. Her dogged five-year freedom of information battle was later made into a film by BBC4. In 2008, Brooke won a High Court case against the House of Commons authorities, which forced them to release full details of MPs’ second home allowances. The court said: “We have no doubt that the public interest is at stake. We are not here dealing with idle gossip, or public curiosity about what in truth are trivialities. The expenditure of  public money through the payment of MPs’ salaries and allowances is a matter of direct and reasonable interest to taxpayers.” Brooke is the author of The Silent State and Your Right to Know, a citizens’ guide to using the Freedom of Information Act. She is a consultant and presenter on Channel 4 Dispatches documentaries and an honorary professor at City University’s Department of Journalism.[/staff][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”JUDGING” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes”][vc_column_text]

Criteria – Anyone involved in tackling free expression threats – either through journalism, campaigning, the arts or using digital techniques – is eligible for nomination. Any individual, group or NGO can nominate or self-nominate. There is no cost to apply.

Judges look for courage, creativity and resilience. We shortlist on the basis of those who are deemed to be making the greatest impact in tackling censorship in their chosen area, with a particular focus on topics that are little covered or tackled by others. Nominees must have had a recognisable impact in the past 12 months.

Where a judge comes from a nominee’s country, or where there is any other potential conflict of interest, the judge will abstain from voting in that category.

Panel – Each year Index recruits an independent panel of judges – leading world voices with diverse expertise across campaigning, journalism, the arts and human rights.

The judges for 2010 were:

[/vc_column_text][vc_row_inner][vc_column_inner width=”1/3″][staff name=”Shaheed Fatima” title=”Barrister” profile_image=”81569″]Shaheed Fatima is a barrister whose work encompasses a wide range of human rights work, advising and acting for governments, NGOs and individuals on constitutional and human rights issues. Fatima won the Liberty/Justice Human Rights Lawyer of the Year Award in 2007 and has been ranked in both Chambers & Partners 2010 and Legal 500 2009. She has appeared in many cases, including recently at the European Court of Human Rights in a key case regarding the applicability of Articles 2 and 3 of the European Convention on Human Rights to killings by British soldiers in post-war Iraq.[/staff][/vc_column_inner][vc_column_inner width=”1/3″][staff name=”Emily Bell” title=”Director of Digital Content, Guardian News and Media” profile_image=”81567″]Emily Bell has worked for the Observer and the Guardian for the past 18 years, setting up mediaguardian.co.uk in 2000 and becoming editor-in-chief of Guardian Unlimited in 2001. In September 2006, Bell was promoted to the new position of director of digital content for Guardian News and Media. Guardian.co.uk, the Guardian and Observer’s network of websites, has won many awards, including the prestigious Webby for Best Newspaper on the web in 2005, 2006, 2007 and 2009. Bell writes a regular column for Media Guardian on media policy issues.[/staff][/vc_column_inner][vc_column_inner width=”1/3″][staff name=”Lemn Sissay” title=”Poet” profile_image=”81568″]Lemn Sissay is artist-in-residence at Southbank Centre and is an Artsadmin artist. Sissay is the author of five poetry collections and a number of stage plays. The Independent on Sunday described his poetry as “the songs of the street, declamatory, imaginative, hard-hitting”. Sissay is a patron of The Letterbox Club, an initiative to get books to children in social services care. He writes and presents radio documentaries and is a regular contributor to Radio 4’s Saturday Live. His short film What If was  recently exhibited at the Royal Academy as part of its GSK Contemporary season.[/staff][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/3″][staff name=”Caroline Michel” title=”Chief Executive, PFD” profile_image=”81566″]Caroline Michel is Chief Executive of PFD, according to the Guardian “the most talked-about” literary agency. She joined PFD in 2007 – having previously worked at the rival William Morris Agency – with the aim of transforming PFD into a multi-faceted, talent-seeking agency spanning multimedia, books and television. In total, Michel has over 25 years’ experience in publishing, having run the Vintage imprint at Random House and Harper Press at HarperCollins. She is also a governor of the British Film Institute and a board member of English PEN.[/staff][/vc_column_inner][vc_column_inner width=”1/3″][staff name=”Lindsey Hilsum” title=”Journalist, Channel 4 News” profile_image=”80223″]Lindsey Hilsum is international editor for Channel 4 News. She won the 2005 Royal Television Society (RTS) Journalist of the Year award for her reporting from Fallujah and Beslan. In 2003 she won the RTS Specialist Journalist of the Year award for her reports from the Palestinian refugee camp Jenin. During the 2003 Iraq war, she spent 10 weeks in Baghdad, and was in Belgrade during the NATO Kosovo campaign. She has spent extended periods in Zimbabwe and the Middle East, and headed C4N’s Beijing bureau from 2006 to 2008, covering the Tibetan uprising, the Sichuan earthquake and the Olympics.[/staff][/vc_column_inner][vc_column_inner width=”1/3″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=”2010 GALA” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes”][vc_media_grid element_width=”3″ grid_id=”vc_gid:1556717940555-e12333e1-b318-1″ include=”81628,81627,81626,81625,81624,81623,81622,81621,81620,81619,81618,81617,81616,81615,81614,81613,81612,81611,81610,81609,81608,81607,81606,81605,81604,81603,81602,81601,81600,81599,81598,81597,81596,81595,81594,81593,81592,81591,81590,81589,81588,81587,81586,81585,81584,81577,81576,81575,81574,81571″][/vc_column][/vc_row]

Cyber Wars

Citizens, states and corporations are battling for online space. What happened to the dream of global communication? Ron Deibert and Rafal Rohozinski report

At the end of 2009, a social movement mobilised once again around an Iranian political crisis – from the streets of Iran’s cities spreading through networks of support to Europe, North America and beyond. In Toronto, where the Citizen Lab internet research and development centre is located, a dynamic group of Iranian students banded together with activists across the world, raising awareness and building support. Together they have formed an identity unique to the 21st century: a cyber enabled, planetary resistance community.

The role of technology in events such as these is often overstated and the Iranian case is no exception. The battle is about much more than the most recent social networking tool, no matter what label is assigned to this latest revolution. But it should not be underestimated either. Cyberspace is the domain through which the battle of ideas takes place today, and it is a heavily contested domain.

It is widely known that demonstrations can achieve broader support and publicity through the use of the internet and by the creative exploitation of mobile technologies such as SMS and video capture. But the Iranian authorities are taking active counter-measures aimed at controlling the spaces online for resistance and dissent. These measures include the wellknown technique of filtering access to websites at key internet chokepoints. But there are also more offensive operations that are subtle, flexible and insidious. These include tampering with internet connections, mobile and other telecommunications services; monitoring social networking sites to identify key organisers, who are then subjected to threats and intimidation; pressurising services in Iran to remove ‘offensive’ posts or blogs; and arresting prominent writers and dissidents.

As two of the principal investigators of the OpenNet Initiative, a project whose aim is to monitor internet filtering and surveillance worldwide, these actions are increasingly familiar to us. What is happening now in Iran offers a clear example of ‘next generation’ controls that are being exercised in cyberspace as the domain becomes more heavily contested and seen as a critical vector of the exercise of power. Whereas in the past, freedom of expression activists and others concerned about human rights had to worry mostly about how to bypass internet filters, they now have to worry about a much broader suite of restraints, risks and liabilities. Rather than first generation controls, as exemplified by China’s great firewall, in which filtering technologies are employed in a constant manner at key internet chokepoints, we are seeing instead the emergence of methods designed to go beyond denial to shape and contain the space for expression online. Since these controls tend to operate in the shadows, they are more difficult to monitor and thus present a challenge to rights organisations and monitoring groups like the OpenNet Initiative (ONI). They will require a new approach to research and advocacy in order to prevent the further encroachment of human rights online.

Burma 2007. Russia-Georgia 2008. China-Tibet 2008. Iran 2009. Xinjiang 2009. These recent events, although dissimilar in many ways, share several common threads. The struggles on the ground were accompanied and very much influenced by a related struggle in cyberspace, between activists on the one hand and entrenched authorities on the other. Not that long ago it would have been safe to assume the entrenched authorities were at a disadvantage, too inept to withstand digitally-enabled social movements. Today, that is no longer a safe assumption. The centre of gravity of techniques aimed at managing cyberspace has shifted from heavy-handed and often crudely implemented filtering to more sophisticated multi-pronged methods that seek to normalise control and the exercise of power in cyberspace. There are numerous examples of these next generation controls from widely different regional contexts, suggesting the emergence of a very troubling global norm. Countering all of them will require a new comprehensive approach.

Legal measures

One of the fastest growing and effective next generation controls concerns the broad use of slander, libel and other laws to restrict permissible communications and to create a climate of fear, intimidation and ultimately self-censorship. In part, this reflects a natural maturation process as authorities seek to reign in cyberspace and bring it under regulatory oversight. But more nefariously, it also reflects a tactic of strangulation, whereby threats of legal action can do more to prevent strategically threatening information from seeing the light of day than do more passive controls implemented in a defensive manner. Although new laws are being drafted to deal with cyberspace security and regulation, sometimes old, obscure, or rarely enforced regulations are pointed to ex post facto to justify acts of internet censorship.

Ironically, we experienced this very type of control ourselves while at the Internet Governance Forum (IGF) meeting last November in Sharm El Sheikh, Egypt, when UN officials asked us to remove a banner for the ONI’s new book on the topic of next generation controls, Access Controlled. While the UN officials told us in person that the banner had to be removed because of references to China, they later justified the act publicly in reference to regulations prohibiting advertisements and banners in the halls of the IGF – regulations that seemed to many observers to be very unevenly enforced throughout the event. Although examples of similar measures can be seen in almost all countries of the world, the most compelling cases are found in the countries of the former Soviet Union. In Kazakhstan, for example, opposition websites or websites carrying material critical of the government are regularly deregistered from the national domain using a variety of vague laws and regulations as justification. In years to come, we expect to see more use of legal levers such as these as a means to smother freedom of expression.

Informal requests

While legal measures create the regulatory context for denial, informal requests and other pressures made by authorities to private companies can be employed for more immediate ends. Most often these informal requests come in the form of pressure on internet service providers and online service providers to ‘take down’ or remove offensive posts or information that threatens ‘national security’ or ‘cultural sensitivities’. Google’s recent decision to reconsider its service offerings in China reflects, in part, that company’s frustration with having to deal with such informal take-down requests from Chinese authorities on a regular basis. Such informal requests can go further, putting pressure on the companies that run the infrastructure to render services inoperative in order to prevent their exploitation by opposition groups or activists.

In Iran, for example, the internet and other telecommunications services have slowed down during public demonstrations and in some instances have been entirely inaccessible for long periods of time or in certain regions. While there is no official acknowledgement, it is noteworthy that the Iranian Revolutionary Guard owns the main ISP in Iran – the Telecommunication Company of Iran (TCI). Some reports indicate that officials from the Revolutionary Guard have pressured TCI to tamper with internet connections during the recent crises. In countries where the lines between public and private authorities are often blurred, and/or organised crime and authority mingle in the dark underworlds, such informal requests and pressures can be particularly effective, opaque and nearly impossible to bring to public account.

Outsourcing and downloading

It is important to emphasise that cyberspace is owned and operated primarily by private companies. The decisions taken by those companies on content controls can be as important as those taken by governments. Often, private companies are compelled in some manner to do the job of censorship and surveillance in order to operate in a particular jurisdiction, as evidenced most prominently by the collusion of western search engines, such as Google (up until January 2010), Microsoft and Yahoo, in China’s internet censorship practices. In its most extreme forms, the outsourcing of these controls can take the form of illegal acts or acts that are contrary to publicly stated operating procedures and privacy protections. This was dramatically illustrated in the case of Tom-Skype, in which the Chinese partner of Skype put in place a covert surveillance system to track and monitor pro-democracy activists who were using the chat function as a form of outreach. The system was only discovered because of faulty security on the servers operated by Tom Online.

Presumably, many other such collusive acts of censorship and surveillance exist that are undiscovered. For governments in both the developed and developing worlds, offloading such controls to private companies allows them to place their controls on the ‘frontlines’ of the networks and draw in the actors who manage the key access points and hosting platforms. If trends continue, we can expect more censorship and surveillance responsibilities to be exercised by private companies, carrier hotels, ‘cloud computing’ (internet-based) networks, internet exchanges and telecommunications companies. Such a shift in the locus of controls raises serious issues of public accountability and transparency for citizens of all countries. It is in this context that Google’s dramatic announcement to end censorship of its Chinese search engine should be considered a watershed moment. Whether other companies follow Google’s lead, and how China, other countries, and the international community as a whole react, are key open questions that could help determine the shape of public accountability of private actors in this domain.

Just-in-time blocking

Disabling or attacking critical information assets at key moments in time (for example during elections or public demonstrations) may be the most effective tool in terms of shaping outcomes in cyberspace. Today, computer network attacks, including the use of distributed denial of service attacks, can be easily marshalled and targeted against key sources of information, especially in the developing world where networks and infrastructure tend to be fragile and prone to disruption. The tools used to mount such attacks – called botnets – are now thriving like parasites in peer-to-peer architectures along the invisible underbelly of insecure servers, PCs, and social networking platforms. Botnets can be activated by anyone willing to pay a fee against any target of opportunity.

There are cruder methods of effecting just-in-time blocking as well, like shutting off power to the buildings where servers are located or tampering with domain name registration so that information is not routed properly to its destination. Such just-in-time blocking has been empirically documented by the ONI in Kyrgyzstan, Belarus and Tajikistan and reported in numerous other countries as well.

The attraction of just-in-time blocking is that information is only disabled at key intervals while kept accessible at other times, thus avoiding charges of internet censorship and allowing for plausible denials of censorship by the perpetrators. In regions where internet connectivity can be spotty, just-intime blocking is easily reasoned away as just another technical glitch with the internet. When such attacks are contracted out to criminal organisations, determining attribution of those responsible is nearly impossible.

Computer network attacks

Just-in-time blocking can take the form of computer network attacks. But the latter can also be employed as a component of military action, low intensity conflict, or attacks on critical infrastructures – in other words, for strategic reasons separate from censorship. For years, such attacks have been speculated upon and it was thought that interdependence among states served as a strong deterrent on their execution. In recent years, however, there have been several high-profile incidences of computer network attacks, including those on Estonia in 2007 and during the Russia-Georgia war of 2008. In each of these cases, the circumstances surrounding the attacks were murky (see ‘Patriotic hacking’ below), but the outcomes were not. In Estonia, key critical information resources, such as 911 systems and hospital networks, were debilitated, as were Georgia’s official channels of government communication.

What is most ominous about computer network attacks is that many governments are now openly considering their use as part of standard military doctrine. President Obama’s cyber security review, completed in May 2009, may have unwittingly set off a security dilemma spiral in this respect with its official acknowledgment that the United States has such capabilities at its disposal – a decision that may come back to haunt the information dependent country when other actors follow suit.

Patriotic hacking

One of the characteristics of cyberspace is that individuals can engage in creative acts that have system-wide effects. This is no less true in cases of individuals taking action against those they consider threats to their own state’s national interests. Citizens may bristle at outside interference in their country’s internal affairs and can take offence at criticism directed at their own governments, however illegitimate they may appear to outsiders. Some with the technical skills take it upon themselves to attack adversarial sources of information, often leaving provocative messages and warnings in their wake. Such actions make it difficult to determine attribution behind the attacks – is it the government or the citizens acting alone? Or is it perhaps some combination of the two? Muddying the waters further, some government security services informally encourage or tacitly approve of the actions of patriotic groups.

In China, for example, the Wu Mao Dang, or 50-cent party (so named for the amount of money its members are ostensibly paid for each post made), patrol chatrooms and forums and post information favourable to the regime, while chastising its critics. In Russia, it is widely believed that security services regularly coax hacker groups to fight for the motherland in cyberspace and may ‘seed’ instructions for hacking attacks on prominent nationalist websites and forums. A shadowy group known as the Iranian Cyber Army took over Twitter and some key opposition websites towards the end of2009, defacing the home pages with their own messages. Although no formal connection has been established to the Iranian authorities, the groups responsible for the attacks posted pro-regime messages on the hacked websites and services.

Targeted surveillance/social malware attacks Accessing sensitive information about adversaries is one of the most important levers in shaping outcomes, and so it should come as no surprise that great effort has been placed into targeted espionage. The Tom-Skype example is only one of many such next generation methods now becoming common in the cyber ecosystem. Infiltration of adversarial networks through targeted ‘social malware’ (software designed to infiltrate an unsuspecting user’s computer) and drive-by web exploits (websites infected with viruses that target insecure browsers) is exploding throughout the dark underbelly of the internet. Google’s announcement in January 2010 that it had uncovered such a targeted espionage attack on its infrastructure is among the most prominent examples of this type of infiltration.

The growth in this sector can be attributed, in part, to the unintentional practices of civil society and human rights organisations themselves. As our colleagues Nart Villeneuve and Greg Walton have shown, many civil society organisations lack simple training and resources, leaving them vulnerable to even the most basic of internet attacks. Moreover, because such organisations tend to thrive on awareness raising and advocacy through social networking and email lists, they are often unwittingly compromised as vectors of attacks even by those whose motivations are not political per se. In one particularly egregious example cited by Villeneuve and Walton, the advocacy group Reporters Without Borders unknowingly propagated a link to a malicious website posing as a Facebook petition to release the Tibetan activist Dhondup Wangchen. As with computer network attacks, targeted espionage and social malware attacks are being developed not just by criminal groups and rogue actors, but also at the highest government levels. The US director of national intelligence, Dennis Blair, recently remarked that the United States must be ‘aggressive’ in the cyber domain in terms of ‘both protecting our own secrets and stealing those of others’.

Together, these next generation controls present major challenges for monitoring groups, rights organisations, and all of those who care about the future of openness and human rights online. Our own OpenNet Initiative, for example, developed an elaborate methodology primarily oriented towards technically monitoring ‘first generation’ filtering at key internet chokepoints using network interrogation tools within countries under investigation. While this mission is still essential and important, its methods are ill equipped to identify the range of next generation controls. To remain relevant, the ONI needs to adjust, perhaps even undertake a paradigm shift, and develop new techniques to monitor more offensive means of blocking. Next generation controls require next generation monitoring.

For rights organisations, darker clouds are looming on the horizon. The context around free expression has become much more ominous and militarised than it was in the past as the norms around next generation controls spread and mature. There is an arms race in cyberspace, with state militaries, extremists, non-state actors and other organisations engaged in increasingly aggressive interventions. Meanwhile, the private actors who control the infrastructure of cyberspace are also becoming more important players in determining the scope for free expression online. Together these present major new challenges and an entirely more hostile context that is becoming the norm. Arms control in cyberspace is now an urgent matter. Lastly, citizens around the world need to be made aware of the threats to the openness of cyberspace that this new generation of controls presents. There is a degradation of valuable global communications occurring as ominous as the degradation of the natural environment. For generations, philosophers have long speculated about a global communications platform through which citizens could communicate, share ideas and develop common solutions to problems in an unmediated fashion. Writing in 1937, HG Wells presented the outlines of such a possibility in his essay entitled ‘World Brain’:

The whole human memory can be, and probably in a short time will be, made accessible to every individual … It need not be concentrated in any one single place. It need not be vulnerable as a human head or a human heart is vulnerable. It can be reproduced exactly and fully, in Peru, China, Iceland, Central Africa, or wherever else seems to afford an insurance against danger and interruption. It can have at once the concentration of a craniate animal and the diffused vitality of an amoeba.

No doubt Wells would shudder if he could see now that having come so close to achieving this very possibility, citizens of the world would allow it to implode in a spiral of weaponisation, militarisation and censorship. A planetary social movement is required today that mobilises us all to protect the net as a forum for free expression, access to information and open communication.

This article appears in the current issue of Index on Censorship

Ron Deibert is director of the Citizen Lab at the Munk Centre for International Studies at the University of Toronto. Rafal Rohozinski is the CEO of SecDev.cyber and Psiphon, and a senior research adviser and chair of the advisory council of the Citizen Lab. Deibert and Rohozinski are founders and principal investigators of the OpenNet Initiative and Information Warfare Monitor projects, and are co-editors (along with John Palfrey and Jonathan Zittrain) of Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press)

For more articles like this, subscribe for only £18 a year