Index Index – International free speech roundup 15/01/13

The European Court of Human Rights deemed today (15 January) that a woman working for British Airways was unfairly discriminated against for her religion. Nadia Eweida was fired by BA in 2006 for refusing to stop wearing her crucifix visibly. Judges ruled that Eweida’s rights under Article 9 of the European Convention on Human Rights were violated. Three other Christians who had taken their employees to court lost their cases. Shirley Chaplin, whose employer also stopped her wearing crucifix necklaces, Lillian Ladele, disciplined after refusing to conduct same-sex civil partner ceremonies — and Gary McFarlane, a marriage councillor fired for saying he might object to offering sex advice to gay couples.

 Elizabeth Brossa - Creative commons Flickr

Aaron Swartz’s suicide prompted calls for cyber law reform

The suicide of US activist Aaron Swartz on 11 January has prompted calls to reform computer crime laws in America. The 26 year old was awaiting trial, charged with 13 felony counts of wire fraud and hacking two years ago. Swartz had downloaded millions of academic papers from online archive JSTOR and was due to face trial in April, for which he could have been jailed for decades and faced massive fines. Calls for amendments to The Computer Fraud and Abuse Act have been widespread, with critics alleging that certain internet hacking laws are too vague and broad, and impose overly harsh penalties.

On 9 JanuaryIran’s Supreme Court ratified the death penalty of five Ahwazi (Arab-Iranian) human rights defenders. Hadi Rachedi, Hashim Shabani Nejad, Mohammad Ali Amuri Nejad, Jaber Al-Bushoke and his brother Mokhtar Al-Bushoke were arrested by Iran’s Ministry of Intelligence and National Security in the spring of 2011. They were charged with spawning mischief, threatening national security and inciting propaganda against the Islamic Republic. The activists had been protesting for their right to speak Arabic, rather than the national language of Persian – a right that is written into Iranian constitution. They were allegedly tortured into giving false confessions in detention.

App developers Tencent have apologised to users of social media app WeChat, after the programme appeared to be censoring controversial terms globally. Tencent, China’s most widely used internet portal, blamed a “technical glitch” after it had blocked terms such as Southern Weekend and Falun Gong, a banned group in China often referred to as a sect. Activists have voiced concern that authorities are hacking the app, in order to increase surveillance on some of its 200million users. WeChat has subscribers in the UK and America, and will soon be launched across Asia.

US Vice President Joe Biden met with the president of the Entertainment Software Association on Friday, to discuss the gaming industry’s influence over violence, following a school shooting in Connecticut that prompted calls for reforms on gun policy. Biden’s White House meeting aimed to establish whether America was undergoing a “coarsening of our culture”, discussing how to eliminate the culture of violence, a happening the gaming industry is frequently blamed for. The National Rifle Association (NRA) had accounted the rate of gun crime in America to media and video game violence, which the gaming industry refuted, expressing fears that they could become a scapegoat in the Connecticut debate.

The mechanics of China’s internet censorship

Even rainstorms can be sensitive in China. The recent storm in Beijing which killed at least 77 people caused the censors to come out in force, with newspapers told to can coverage and online accounts of the deluge snipped.

But with 500 million internet users, the obvious question is, how does China do it? What are the mechanics of China’s internet censorship?

It makes things simpler if we divide the censorship first into two camps: censoring the web outside China and censoring domestic sites.

American journalist James Fallows very readable account of how China censors the outside web explains: “Depending on how you look at it, the Chinese government’s attempt to rein in the internet is crude and slapdash or ingenious and well crafted.”

Briefly, this is what happens.

Censoring incoming web pages

The public security ministry is the main government body which oversees censorship of the outside Internet through its Golden Shield Project.

The key to their control is the fact that unlike many other countries, China is only connected to the outside internet through three links (or choke points as Fallows calls them) — one via Japan in the Beijing-Tianjin-Qingdao area, one also via Japan in Shanghai and one in Guangzhou via Hong Kong. At each one of these choke points there is something called a “tapper” which copies each website request and incoming web page and sends it to a surveillance computer for checking. This means that browsing non-local websites in China can sometimes be frustratingly slow.

There are four ways for a surveillance computer to block your request.

  • The DNS (Domain Name System) block: When you enter a web page, the DNS looks up the address of that page in computer language (the IP address). China has a list of IP addresses it blocks, if your web page is on that IP address, the DNS is instructed to give back a bad address and you will get a “site not found” error message.
  • Connection Reset: Another the way the government prevents you seeing one of its blacklisted sites is not to return a bad address but to constantly reset the request, which is slightly more insidious since this kind of error can occur naturally. If it happened outside China you could press reset and the chances are the next time you would be successful. But in China the reset is intentional and however many times you resend the request you will get a “The connection has reset.”
  • URL keyword block: To cast its net even wider, the tappers also check the web address. If it contains any banned words, say “Falun Gong” or “Dalai Lama” the request is sent into an infinite loop, you never reach the site and your connection times out.
  • Content filtering: In this technique the content of web pages is scanned for banned words, with the connection timing out if any blacklisted words are found. This could for example, allow you to browse the Guardian website, but not access some of the new stories.

Censorship technology is continuously becoming more sophisticated, and words and IP addresses go on and off the blacklists.

Index contacted Jed Crandall, an assistant professor of computer science at the University of New Mexico and whose research has focused on Chinese internet censorship, to ask him if there had been much change to the above in the four years since Fallows’s article. Here’s what he said:

“It seems like filtering the content of the web pages using internet routers was not working well for the censors, and they even seemed to be devoting less resources to it over time as we did our experiments,” he told Index by email interview. “They still block IP addresses, DNS addresses, and do keyword filtering on GET requests [URL keyword block].”

Censoring domestic websites

Far more of a challenge to the Chinese government is keeping its homegrown internet in check. And this it does mostly by making sure the private companies that run most of the Chinese web self-censor by issuing threats, “vaguely-worded” laws and, in the case of emergency breaking stories, day-to-day directives.

Censoring professional content

Web companies self-censor in many different ways. Content which they produce themselves is “cleansed” first by the writer and then by editors if necessary. There are few specific censorship guidelines; it is more of an acquired habit of knowing where to draw the line based on fear of punishment. American scholar Perry Link wrote an eloquent essay back in 2003 — read it here — about how Chinese censorship is like an anaconda in the chandelier ready to pounce if someone oversteps that line:

The Chinese government’s censorial authority in recent times has resembled not so much a man-eating tiger or fire-snorting dragon as a giant anaconda coiled in an overhead chandelier. Normally the great snake doesn’t move. It doesn’t have to. It feels no need to be clear about its prohibitions. Its constant silent message is ‘You yourself decide,’ after which, more often than not, everyone in its shadow makes his or her large and small adjustments–all quite ‘naturally.’

Censoring user-produced content

This is where it gets really interesting.

“Social media is more dynamic and fluid than traditional online content, so the censors have to be creative in how they control social media,” says Crandall.

Banned topics and sensitive terms are deleted by hand by armies (literally) of paid internet “police”. This, from a paper published here in June by a team of researchers at Harvard University:

The size and sophistication of the Chinese government’s program to selectively censor the expressed views of the Chinese people is unprecedented in recorded world history. Unlike in the US, where social media is centralized through a few providers, in China it is fractured across hundreds of local sites, with each individual site employing up to 1,000 censors. Additionally, approximately 20,000–50,000 Internet police and an estimated 250,000–300,000 “50 cent party members” (wumao dang) are employed by the central government.

More evidence for the lack of a hardcopy list of banned topics is that different online companies seem to censor different things.

Crandall adds:

One thing we’ve noticed in our research is that what various companies censor seems to vary widely from company to company, and there doesn’t seem to be any obvious ‘master list’ of what companies are supposed to censor.  They seem to make up their own lists based on what they think their liabilities would be if the government had to intervene.

For example, censoring in Tibet and Qinghai (a largely Tibetan province) is much stricter than in eastern parts of the country.

Latest trends

Recent reports on Chinese internet censorship have offered some surprising results. First, the Harvard paper referred to above analysed Chinese-language blogs and found that censors were targeting material that could have incited protests or others types of mass action, leaving material critical of the government uncensored.

A recent University of Hong Kong study on Weibo (China’s wildly popular version of Twitter) posts found that the list of words was changing constantly.

“What we are finding is a constantly morphing list of keywords, a cat-and-mouse contest between people and censors,” King-wa Fu, one of the study’s researchers, told the Economist last month.

There might be more to it than a simple catch-up. According to Crandall, censorship can be used as a sophisticated tool to control the news. In a paper titled Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations, when a news story reflects badly on the government, posts on it are censored, but when that news story has been turned around to a good story, the word is unblocked.

“It appears that censorship was applied only long enough for the news about Wukan to change from sensitive news to a story of successful government intervention to reach a peaceful resolution to the problem,” the paper’s authors write.

(Wukan is the name of a village in southern China where huge clashes between the police and locals occurred over illegal land grabs late last year. The government eventually caved into the villagers’ demands and then turned the story in one of a provincial government victory.)

The Future

Chinese censorship has to move with the times, particularly now there are 500 million Chinese online, many of whom are ardent microbloggers.

Crandall believes that the government is looking into how to manipulate social media to influence the news.

I think what the future of internet censorship holds is more emphasis on control and less emphasis on blocking content. It’s very difficult to block some specific topic, but if you can slow down spread of news of the topic at some times and speed up spread of news about the topic at other times you can use that to your advantage to control how issues play out in the news cycles.

MORE ON THIS STORY:

Blogger Wen Yunchao wrote for Index on Censorship magazine in 2010 about the art of Chinese censorship. Read his article here.

Also writing for our magazine, Southern Weekend columnist Xiao Shu discusses the repressive and chaotic nature of China’s internet censorship here.

Read Chinese author and blogger Han Han’s essay about publishing and censorship in China here.

 

Beacons of freedom: The changing face of Anonymous

It’s late January 2012. Governments all over the world are considering signing up to a new US-led trade proposal intended to curtail copyright violation, the Anti-Copyright Trade Agreement (ACTA). There have been widespread protests, on and offline: the loose-knit collective of activists, hackers and internet denizens of all stripes known as ‘Anonymous’ believe ACTA represents an attempt by governments to limit and control the core freedoms of the internet, in particular the massive cultural exchange of ideas and information made possible by file-sharing online.

In Poland, the agreement has already been signed off; all that is needed for it to be adopted into law is a majority vote in parliament. The government website is offline, taken down by a distributed denial of service (DDoS) attack launched by Anonymous, which sends a message to politicians who are considering voting in favour. By the final week of January, over 10,000 people gather in Krakow in a last-ditch protest to influence the vote.

Members of the Palikot Movement Party protest against the ratification of the Anti-Counterfeiting Trade Agreement

And then something unexpected happens: on 26 January 2012, while casting their votes in parliament, some members of the Polish government conceal their faces with paper Guy Fawkes masks. The mask, by now the signature icon for Anonymous, has become common protest regalia among rabble-rousers across the globe, from Egypt’s Tahrir Square to London’s Occupy protests. But this is the first case of public servants adopting the symbol. The image is circulated far and wide on social media platforms. Although Polish politicians used it to launch a specific protest against ACTA, the gesture and its photographic memorialisation worked in a much broader capacity to legitimate Anonymous. ‘These parliamentarians were wearing Anonymous Guy Fawkes masks,’ one Anonymous activist blogged, ‘while the parliament’s website was down due to DDoS by Anonymous. We can’t emphasise that point enough – this is a game-changer.’

Less than a month later a very different image of Anonymous was circulated. On 21 February 2012, the Wall Street Journal reported that General Keith Alexander, the director of the United States National Security Agency (NSA), had briefed officials at the White House in secret meetings, claiming Anonymous ‘could have the ability within the next year or two to bring about a limited power outage through a cyberattack’. So only weeks after the ‘game changer’, the group was described as an imminent and credible threat.

The ‘ability’ to bring about a power outage was undefined. Could it mean that hackers had already acquired passwords that would give them access to power facilities? Or was the warning based on information supplied by an informant who had been working with Anonymous? Either way, General Alexander’s claims were frightening and bold, as well as vague. An attack on the power grid systems would cause havoc and potentially even threaten lives.

It is unlikely that we will ever find out whether the NSA assessment was based on credible intelligence or whether it was simply meant to smear and discredit Anonymous. Further news reports quoted activists and security experts and dismissed NSA claims as ‘fear-mongering’. The group, for all its varied tactics, both legal and illegal, has to date never been known to publicly call for such an attack – and there is no evidence to suggest that it would so much as consider it. A tactic like this would be very out of character for the collective, which, though often subversive, generally conforms to ethical norms and defends civil liberties.

While Anonymous has never occupied a controversy-free place on the world stage, by February 2012 it began to be portrayed as an open source brand of radical protest politics and not necessarily as hooligans hell-bent on unleashing extremist, chaotic acts like taking down power grids. More significantly, while the name has been used to pull together a range of unrelated causes, from environmental rights to snuffing out paedophilia rings, Anonymous activists are most effective and forceful when fighting censorship.

With campaigns like Operation Payback, which targeted corporations like MasterCard when it stopped providing services to WikiLeaks, OpTunisia, which responded to Tunisian government tactics against protesters and journalists, and OpJapan and OpMegaupload, launched in response to proposed copyright legislation, it is when Anonymous activists defend the internet’s core freedoms and expose the shadowy workings of state and corporate surveillance that it has the most impact. The NSA news story about the exigent threat from Anonymous failed to gain traction in the public consciousness. Perhaps it would have if it had come earlier, for instance between May and July 2011, at the height of attacks led by Lulzsec.

Anonymous launched Operation Megaupload

In contrast to most Anonymous actions, Lulzsec, a break-away hacker group, acted whimsically, its hacks not always tethered to a political issue. Lulzsec sometimes hacked to make a political statement and, in other instances, for lulz, internet slang for laughs. During this period, media attention, which was colossal, was most heavily focused on Anonymous as hackers rather than as a general protest group. Activities under the Anonymous banner, such as those of Lulzsec, show that even though Anonymous has gained a measure of respect because it champions free speech and privacy causes, it is also notorious for its irreverent and controversial approach to dissent.

To be sure, most of its activities are legal, but a small subset of tactics – such as DDoS attacks and hacking – are illegal, a criminal offence under all circumstances. These tactics also score the most headlines. Some, like ‘doxing’ (the leaking of personal, sensitive information, such as social security numbers and home addresses), reside in a legal grey zone because mined information is found on publicly accessible websites. During the course of a single operation different participants might deploy all three modes – legal, illegal and legally grey tactics.

Take Operation Bart, in August 2011. Anonymous focused on getting the word out when San Francisco Bay Area Rapid Transit (BART) officials disabled mobile phone reception on station platforms to thwart planned anti-police brutality protests. Soon after, Anonymous helped organise street demonstrations. But a couple of individuals also hacked into BART’s computers and released customer data in order to garner media attention – at least that’s how one participant explained the incident to Amy Goodman on television and radio programme Democracy Now. Someone also found a racy, semi-nude photo of BART’s official spokesperson Linton Johnson on his personal website, which was then republished on the ‘bartlulz’ website with considerable fanfare, along with the brazen rationalisation: ‘if you are going to be a dick to the public, then I’m sure you don’t mind showing your dick to the public.’

During the course of an operation, vulnerability and weakness is often identified and exploited. These sorts of actions provoke controversy (even within Anonymous) and also find their way into headlines, boosting the group’s public profile. At times, members of the loose collective are purposely deceitful and propagate false information about their activities. This can be a tactic for self-protection in some cases, and in other cases an antic to coax headlines out of the media, which can be somewhat enamoured with hacking.

Antisec, one of the more well-known hacker groups affiliated with Anonymous, might claim an exploit without having actually been involved in the activity. Hackers will often rely on botnets – networks of compromised computers – to momentarily knock a website offline, but won’t advertise this fact in press releases. Between 10 and 11 September 2012, for instance, Antisec claimed to have procured 12 million unique device identification numbers from Apple iOS devices by hacking into an FBI agent’s laptop computer. As it turns out, while the identification numbers were verified, the source turned out to be an iPhone and iPad app developer, Blue Toad. Because tactics range from the frivolous to the controversial to the illegal and because it has been known to generate hype around its own activities, it can be easily targeted itself. Obfuscation and deceit contributes to Anonymous’s mystique and its power, but also makes it vulnerable to misinformation campaigns spread by others.

Antisec – One of the more well-known hacker groups affiliated with Anonymous

The biggest lesson that can be learned from Anonymous is that the internet will judge – often quite swiftly – the actions of individuals, corporations and governments. And by the internet I mean the countless hackers and geeks from São Paulo to Sydney who understand how the web works, a smaller class who know how to subvert routers and protocols, and a larger number who will rally when the internet and values associated with it are in danger.

This is not to say that every geek and hacker supports Anonymous. In fact, many rather dislike it or its controversial tactics, such as DDoS; some hackers are resolute and unyielding in their view that DDoS is a species of censorship in itself. There are also many different ways to defend the internet, such as writing open source software or joining the Pirate Party. Anonymous is a distinct, emerging part of this diverse and burgeoning political landscape. Its real threat may lie not so much in its ability to organise cyberattacks but in the way it has become a beacon, a unified front against censorship and surveillance.

It might be best thought of as the irascible and provocative protest wing of the internet’s nascent free speech and privacy movement. Though it works to publicise specific issues at the most inconvenient time for the individual, group or company being exposed, it also brings into sharp focus an important trend, dramatising the value of privacy and anonymity in an era where both are rapidly eroding.

Anonymous, of course, champions anonymity, and this is echoed in both the iconography associated with it and its ethical codes. Seeking individual recognition and especially fame is taboo, for example; you are expected to do work for the team, not for one’s own personal benefit or status. The movement, therefore, provides a rare countermeasure in deeds, words and symbols against a world that encourages people to reveal their lives, where the internet remembers everything about us, where our histories are permanently stored in search indexes and government databases – and at a time when governments’ ability to surveil its citizens has grown exponentially thanks to low-cost, ubiquitous digital technologies and new public-private partnerships.

 

However explosive Anonymous is today, its continued presence on the world stage is certainly not guaranteed to last. It is plagued by infighting, fragmentation, as well as brand fatigue. Paranoia exploded in spring 2012 after the news broke that Hector Xavier Monsegur, known more commonly by his hacker handle ‘Sabu’, had been exposed as an FBI informant. Most troubling for its long-term survival is government crackdown: since summer 2011, over 100 alleged participants have been arrested around the globe, from Romania, Turkey, Italy, the UK, the US, Chile and Germany. But even if the loose-knit collective fades away, irreverent political protest on the internet is unlikely to end.

Since 2008, when individuals started to organise diverse collective actions under the banner of Anonymous, a living model was created, demonstrating to the world what a radical politics of dissent on the internet looks like. Even if Anonymous was to vanish, its history, exploits and propaganda material are here to stay; there will likely be others — in different forms and with distinct twists — who will take its place.

What is a little less clear is what will eventually become of freedom of expression online, given the increasing capabilities for surveillance, censorship and control all over the world. Is Anonymous merely the party at the funeral of online freedom? Or does it represent the irreverent clowns, rabble rousers, and tricksters who are keeping the reaper at bay and enabling others, from protesters on the street to elected representatives in parliament, to join the raucous political carnival and challenge threats to personal privacy and freedom?

Gabriella Coleman is Wolfe Chair in Scientific and Technological Literacy at the Department of Art History and Communication Studies at McGill University. She tweets from @BiellaColeman

This article appears in Digital Frontiers. Click here for subscription options and more