Music In Exile Fund launched by Index on Censorship and UK film producers

Songhouy Blues

Fadimata “Disco” Walett Oumar, as featured in They Will Have To Kill Us First

Freedom of expression campaigners Index on Censorship and the producers of award-winning documentary They Will Have To Kill Us First are delighted to announce the launch of a new fund to support musicians facing censorship globally.

The Music in Exile Fund will be launched at the European premiere of They Will Have To Kill Us First: Malian Music In Exile – a feature-length documentary that follows musicians in Mali in the wake of a jihadist takeover and subsequent banning of music – at the London Film Festival on 13 October.

In its first year, the Music In Exile Fund will contribute towards Index on Censorship’s Freedom of Expression Awards Fellowship, which is a year-long structured assistance programme to support those facing censorship. The funds will be used to support at least one musician or group nominated in the arts category of the awards. This will include attendance at the awards’ fellowship week in April 2016 – an intensive week-long programme to support career development for the artists. This also brings training in advocacy, fundraising, networking and digital security – all crucial for sustaining a career in the arts when under the pressure of censorship. The fellow will also receive continued support during their fellowship year.

Songhoy Blues, who feature in They Will Have To Kill Us First, were nominated for the arts category of the Index Freedom of Expression Awards in 2015. Index’s current arts award fellow is Mouad Belghouat, a Moroccan rapper who releases music as El Haqed. His music publicises widespread poverty and rails against endemic government corruption in Morocco, where he is banned from performing publicly.

Johanna Schwartz, director of They Will Have To Kill Us First, said: “For the two years that followed the ban on music in Mali, I filmed with musicians on the ground, witnessing their struggles and learning what they needed in order to survive as artists. The idea for this fund has grown directly out of those experiences. When faced with censorship, musicians across the world need our support. We are thrilled to be partnering with our long-time collaborators Index on Censorship to launch this fund.”

Our ambition is to widen support as the fund grows to support more musicians in need.

You can donate to the Music In Exile Fund here.

For more details, please contact:

Index on Censorship: Helen Galliano – [email protected]

Mojo Musique: Sarah Mosses or Johanna Schwartz – [email protected]

Criminalising free speech: Index condemns summonsing of Bahar Mustafa

“We condemn the decision to summons Bahar Moustafa to court. Media reported on October 6 that Mustafa — who once wrote a tweet with the hashtag #KillAllWhiteMen — had received a court summons for malicious communications. Although we do not have the full details for this summons, it is clear that this particular remark by Mustafa posed no direct and imminent danger to anyone – and this is the only test that must be applied when considering limits to free expression. The charges demonstrate once again the problems with this piece of legislation, and others that criminalise free speech, and the way in which these laws are interpreted,” Jodie Ginsberg, CEO of Index on Censorship said.

Mustafa, an employee of the independent students’ union at Goldsmiths, University of London, has been ordered to appear at Bromley Magistrates’ Court on 5 November related to sending a threatening message between 10 November 2014 and 31 May this year, and one of sending a menacing or offensive message via a public network, between the same dates.

Future imperfect: Jason DaPonte

Summer 2014 cover

This article is part of the summer 2014 issue of the global quarterly Index on Censorship magazine. Click here to subscribe to the magazine.

In conjunction with the Cambridge Festival of Ideas 2015, we will be publishing a series of articles that complement many of the upcoming debates and discussions. We are offering these articles from Index on Censorship magazine for free (normally they are held within our paid-for archive) as part of our partnership with the festival. Below is an article by Jason DaPonte, on privacy on the internet taken from the summer 2014 issue. It’s a great starting point for those who plan to attend the Privacy in the digital age session at the festival this year.

Index on Censorship is a global quarterly magazine with reporters and contributing editors around the world. Founded in 1972, it promotes and defends the right to freedom of expression. 

“Government may portray itself as the protector of privacy, but it’s the worst enemy of privacy and that’s borne out by the NSA revelations,” web and privacy guru Jeff Jarvis tells Index.

Jarvis, author of Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live argues that this complacency is dangerous and that a debate on “publicness” is needed. Jarvis defines privacy “as an ethic of knowing someone else’s information (and whether sharing it further could harm someone)” and publicness as “an ethic of sharing your own information (and whether doing so could help someone)”.

In his book Public Parts and on his blog, he advocates publicness as an idea, claiming it has a number of personal and societal benefits including improving relationships and collaboration, and building trust.

He says in the United States the government can’t open post without a court order, but a different principle has been applied to electronic communications. “If it’s good enough for the mail, then why isn’t it good enough for email?”

While Jarvis is calling for public discussion on the topic, he’s also concerned about the “techno panic” the issue has sparked. “The internet gives us the power to speak, find and act as a [single] public and I don’t want to see that power lost in this discussion. I don’t want to see us lose a generous society based on sharing. The revolutionaries [in recent global conflicts] have been able to find each other and act, and that’s the power of tech. I hate to see how deeply we pull into our shells,” he says.


Free thinking: Reading list for the Cambridge Festival of Ideas 2015

Free Thinking! A unique partnership in 2015, Cambridge Festival of Ideas are working with Index on Censorship to offer in-depth articles and follow-up pieces from leading artists, writers and activists on all of our headline events.

Drawing out the dark side: Martin Rowson

Thoughts policed: Max Wind-Cowie

Deliberately lewd: Erica Jong

My book and the school library: Norma Klein

Future imperfect: Jason DaPonte

The politics of terror: Conor Gearty

Moving towards inequality: Jemimah Steinfeld and Hannah Leung

Escape from Eritrea: Ismail Einashe

Defending the right to be offended: Samira Ahmed

How technology is helping African journalists investigate: Raymond Joseph

24 Oct: Can writers and artists ever be terrorists?

25 Oct: Question Everything – Cambridge Festival of Ideas

Full Free Thinking! reading list


Current issue: Spies, secrets and lies

In the latest issue of Index on Censorship magazine Spies, secrets and lies: How yesterday’s and today’s censors compare, we look at nations around the world, from South Korea to Argentina, and discuss if the worst excesses of censorship have passed or whether new techniques and technology make it even more difficult for the public to attain information. Subscribe to the magazine.


The Pew Research Centre predicts that by 2025, the “internet will become like electricity – less visible, yet more deeply embedded in people’s lives for good and ill.” Devices such as Google Glass (which overlays information from the web on to the real world via a pair of lenses in front of your eyes) and internet-connected body monitoring systems like, Nike+ and Fitbit, are all examples of how we are starting to become surrounded by a new generation of constantly connected objects. Using an activity monitor like Nike+ means you are transmitting your location and the path of a jog from your shoes to the web (via a smartphone). While this may not seem like particularly private data, a sliding scale emerges for some when these devices start transmitting biometric data, or using facial recognition to match data with people you meet in the street.

As apps and actions like this become more mainstream, understanding how privacy can be maintained in this environment requires us to remember that the internet is decentralised; it is not like a corporate IT network where one department (or person) can switch the entire thing off through a topdown control system.

The internet is a series of interconnected networks, constantly exchanging and copying data between servers on the network and then on to the next. While data may take usual paths, if one path becomes unavailable or fails, the IP (Internet Protocol) system re-routes the data. This de-centralisation is key to the success and ubiquity of the internet – any device can get on to the network and communicate with any other, as long as it follows very basic communication rules.

This means there is no central command on the internet; there is no Big Brother unless we create one. This de-centralisation may also be the key to protecting privacy as the network becomes further enmeshed in our everyday lives. The other key is common sense. When asked what typical users should do to protect themselves on the internet, Jarvis had this advice: “Don’t be an idiot, and don’t forget that the internet is a lousy place to keep secrets. Always remember that what you put online could get passed around.”

As the internet has come under increasing control by corporations, certain services, particularly on the web, have started to store, and therefore control, huge amounts of data about us. Google, Facebook, Amazon and others are the most obvious because of the sheer volume of data they track about their millions of users, but nearly every commercial website tracks some sort of behavioural data about its users. We’ve allowed corporations to gather this data either because we don’t know it’s happening (as is often the case with cookies that track and save information about our browsing behaviour) or in exchange for better services – free email accounts (Gmail), personalised recommendations (Amazon) or the ability to connect with friends (Facebook).

“A transaction of mutual value isn’t surveillance,” Jarvis argues, referencing Google’s Priority Inbox (which analyses your emails to determine which are “important” based on who you email and the relevance of the subject) as an example. He expands on this explaining that as we look at what is legal in this space we need to be careful to distinguish between how data is gathered and how it is used. “We have to be very, very careful about restricting the gathering of knowledge, careful of regulating what you’re allowed to know. I don’t want to be in a regime where we regulate knowledge.”

Sinister or not, the internet giants and those that aspire to similar commercial success find themselves under continued and increasing pressure from shareholders, marketers and clients to deliver more and more data about you, their customers. This is the big data that is currently being hailed as something of a Holy Grail of business intelligence. Whether we think of it as surveillance or not, we know – at least on some level – that these services have a lot of our information at their disposal (eg the contents of all of our emails, Facebook posts, etc) and we have opted in by accepting terms of service when we sign up to use the service.

“The NSA’s greatest win would be to convince people that privacy doesn’t exist,” says Danny O’Brien, international director of the US-based digital rights campaigners Electronic Frontier Foundation. “Privacy nihilism is the state of believing that: ‘If I’m doing nothing wrong, I have nothing to hide, so it doesn’t matter who’s watching me’.”

This has had an unintended effect of creating what O’Brien describes as “unintentional honeypots” of data that tempt those who want to snoop, be it malicious hackers, other corporations or states. In the past, corporations protected this data from hackers who might try to get credit card numbers (or similar) to carry out theft. However, these “honeypot” operators have realised that while they were always subject to the laws and courts of various countries, they are now also protecting their data from state security agencies. This largely came to light following the alleged hacking of Google’s Gmail by China. Edward Snowden’s revelations about the United States’ NSA and the UK’s GCHQ further proved the extent to which states were carrying out not just targeted snooping, but also mass surveillance on their own and foreign citizens.

To address this issue, many of the corporations have turned on data encryption; technology that protects the data as it is in transit across the nodes (or “hops”) across the internet so that it can only be read by the intended recipient (you can tell if this is on when you see the address bar in your internet browser say “https” instead of “http”). While this costs them more, it also costs security agencies more money and time to try to get past it. So by having it in place, the corporations are creating a form of “passive activism”.

Jarvis thinks this is one of the tools for protecting users’ privacy, and says the task of integrating encryption effectively largely lies with the corporations that are gathering and storing personal information.

“Google thought that once they got [users’ data] into their world it was safe. That’s why the NSA revelations are shocking. It’s getting better now that companies are encrypting as they go,” he said. “It’s become the job of the corporations to protect their customers.”

Encryption can’t solve every problem though. Codes are made to be cracked and encrypted content is only one level of data that governments and others can snoop on.

O’Brien says the way to address this is through tools and systems that take advantage of the decentralised nature of the internet, so we remain in control of our data and don’t rely on third party to store or transfer it for us. The volunteer open-source community has started to create these tools.

Protecting yourself online starts with a common-sense approach. “The internet is a lousy place to keep a secret,” Jarvis says. “Once someone knows your information (online or not), the responsibility of what to do with it lies on them,” says Jarvis. He suggests consumers be more savvy about what they’re signing up to share when they accept terms and conditions, which should be presented in simple language. He also advocates setting privacy on specific messages at the point of sharing (for example, the way you can define exactly who you share with in very specific ways on Google+), rather than blanket terms for privacy.

Understanding how you can protect yourself first requires you to understand what you are trying to protect. There are largely three types of data that can be snooped on: the content of a message or document itself (eg a discussion with a counsellor about specific thoughts of suicide), the metadata about the specific communication (eg simply seeing someone visited a suicide prevention website) and, finally, metadata about the communication itself that has nothing to do with the content (eg the location or device you visited from, what you were looking at before and after, who else you’ve recently contacted).

You can’t simply turn privacy on and off – even Incognito mode on Google’s Chrome browser tells you that you aren’t really fully “private” when you use it. While technologies that use encryption and decentralisation can help protect the first two types of content that can be snooped on (specific content and metadata about the communication), there is little that can be done about the third type of content (the location and behavioural information). This is because networks need to know where you are to connect you with other users and content (even if it’s encrypted). This is particularly true for mobile networks; they simply can’t deliver a call, SMS or email without knowing where your device is.

A number of tools are on the horizon that should help citizens and consumers protect themselves, but many of them don’t feel ready for mainstream use yet and, as Jarvis argues, integrating this technology could be primarily the responsibility of internet corporations.

In protecting yourself, it is important to remember that surveillance existed long before the internet and forms an important part of most nation’s security plans. Governments are, after all, tasked with protecting their citizens and have long carried out spying under certain legal frameworks that protect innocent and average citizens.

O’Brien likens the way electronic surveillance could be controlled to the way we control the military. “We have a military and it fights for us…, which is what surveillance agencies should do. The really important thing we need to do with these organisations is to rein them back so they act like a modern civilised part of our national defence rather than generals gone crazy who could undermine their own society as much as enemies of the state.”

The good news is that the public – and the internet itself – appear to be at a junction. We can choose between a future where we can take advantage of our abilities to self-correct, decentralise power and empower individuals, or one where states and corporations can shackle us with technology. The first option will take hard work; the second would be the result of complacency.

Awareness of how to protect the information put online is important, but in most cases average citizens should not feel that they need to “lock down” with every technical tool available to protect themselves. First and foremost, users that want protection should consider whether the information they’re protecting should be online in the first place and, if they decide to put it online, should ensure they understand how the platform they’re sharing it with protects them.

For those who do want to use technical tools, the EFF recommends using ones that don’t rely on a single commercial third party, favouring those that take advantage of open, de-centralised systems (since the third parties can end up under surveillance themselves). Some of these are listed (see box), most are still in the “created by geeks for use by geeks” status and could be more user-friendly.

Privacy protectors

TOR

This tool uses layers of encryption and routing through a volunteer network to get around censorship and surveillance. Its high status among privacy advocates was enhanced when it was revealed that an NSA presentation had stated that “TOR stinks”. TOR can be difficult to install and there are allegations that simply being a TOR user can arouse government suspicion as it is known to be used by criminals. http://www.torproject.org

OTR

“Off the Record” instant messaging is enabled by this plugin that applies end-to-end encryption to other messaging software. It creates a seamless experience once set up, but requires both users of the conversation to be running the plug-in in order to provide protection. Unfortunately, it doesn’t yet work with the major chat clients, unless they are aggregated into yet another third party piece of software, such as Pidgin or Adium. https://otr.cypherpunks.ca/

Disconnect

This browser plugin tries to put privacy control into your hands by making it clear when internet tracking companies or third parties are trying to watch your behaviour. Its user-friendly inter- face makes it easier to control and understand. Right now, it only works on Chrome and Firefox. http://www.disconnect.me

Silent Circle

This is a solution for encrypting mobile communications – but only works between devices in the “silent circle” – so good for certain types of uses but not yet a mainstream solution, as encryption wouldn’t extend to all calls and messages that users make. Out-of-circle calls are currently only available in North America. https://silentcircle.com

©Jason DaPonte and Index on Censorship

Join us on 25 October at the Cambridge Festival of Ideas 2015 for Question Everything an unconventional, unwieldy and disruptive day of talks, art and ideas featuring a broad range of speakers drawn from popular culture, the arts and academia. Moderated by Index on Censorship CEO Jodie Ginsberg. 

This article is part of the summer 2014 issue of the global quarterly Index on Censorship magazine, with a special report on propaganda and war. Click here to subscribe to the magazine.

Editorial: Spies in the new machines

index-cover-fall-2015In the old days governments kept tabs on “intellectuals”, “subversives”, “enemies of the state” and others they didn’t like much by placing policemen in the shadows, across from their homes. These days writers and artists can find government spies inside their computers, reading their emails, and trying to track their movements via use of smart phones and credit cards.

Post-Soviet Union, after the fall of the Berlin wall, after the Bosnian war of the 1990s, and after South Africa’s apartheid, the world’s mood was positive. Censorship was out, and freedom was in.

But in the world of the new censors, governments continue to try to keep their critics in check, applying pressure in all its varied forms. Threatening, cajoling and propaganda are on one side of the corridor, while spying and censorship are on the other side at the Ministry of Silence. Old tactics, new techniques.

While advances in technology – the arrival and growth of email, the wider spread of the web, and access to computers – have aided individuals trying to avoid censorship, they have also offered more power to the authorities.

There are some clear examples to suggest that governments are making sure technology is on their side. The Chinese government has just introduced a new national security law to aid closer control of internet use. Virtual private networks have been used by citizens for years as tunnels through the Chinese government’s Great Firewall for years. So it is no wonder that China wanted to close them down, to keep information under control. In the last few months more people in China are finding their VPN is not working.

Meanwhile in South Korea, new legislation means telecommunication companies are forced to put software inside teenagers’ mobile phones to monitor and restrict their access to the internet.

Both these examples suggest that technological advances are giving all the winning censorship cards to the overlords.


Autumn 2015: Spies, secrets and lies

Journalists in the former Yugoslavia on the legacy of the post-war period
Interview: Judy Blume and her battle against the bans
Editorial: Spies, secrets and lies and how yesterday’s and today’s censors compare
Full contents of the autumn issue
Subscribe to the magazine


But it is not as clear cut as that. People continually find new ways of tunnelling through firewalls, and getting messages out and in. As new apps are designed, other opportunities arise. For example, Telegram is an app, that allows the user to put a timer on each message, after which it detonates and disappears. New auto-encrypted email services, such as Mailpile, look set to take off. Now geeks among you may argue that they’ll be a record somewhere, but each advance is a way of making it more difficult to be intercepted. With more than six billion people now using mobile phones around the world, it should be easier than ever before to get the word out in some form, in some way.

When Writers and Scholars International, the parent group to Index, was formed in 1972, its founding committee wrote that it was paradoxical that “attempts to nullify the artist’s vision and to thwart the communication of ideas, appear to increase proportionally with the improvement in the media of communication”.

And so it continues.

When we cast our eyes back to the Soviet Union, when suppression of freedom was part of government normality, we see how it drove its vicious idealism through using subversion acts, sedition acts, and allegations of anti-patriotism, backed up with imprisonment, hard labour, internal deportation and enforced poverty. One of those thousands who suffered was the satirical writer Mikhail Zoshchenko, who was a Russian WWI hero who was later denounced in the Zhdanov decree of 1946. This condemned all artists whose work didn’t slavishly follow government lines. We publish a poetic tribute to Zoshchenko written by Lev Ozerov in this issue. The poem echoes some of the issues faced by writers in Russia today.

And so to Azerbaijan in 2015, a member of the Council of Europe (a body described by one of its founders as “the conscience of Europe”), where writers, artists, thinkers and campaigners are being imprisoned for having the temerity to advocate more freedom, or to articulate ideas that are different from those of their government. And where does Russia sit now? Journalists Helen Womack and Andrei Aliaksandrau write in this issue of new propaganda techniques and their fears that society no longer wants “true” journalism.

Plus ça change

When you compare one period with another, you find it is not as simple as it was bad then, or it is worse now. Methods are different, but the intention is the same. Both old censors and new censors operate in the hope that they can bring more silence. In Soviet times there was a bureau that gave newspapers a stamp of approval. Now in Russia journalists report that self-censorship is one of the greatest threats to the free flow of ideas and information. Others say the public’s appetite for investigative journalism that challenges the authorities has disappeared. Meanwhile Vladimir Putin’s government has introduced bills banning “propaganda” of homosexuality and promoting “extremism” or “harm to children”, which can be applied far and wide to censor articles or art that the government doesn’t like. So far, so familiar.

Censorship and threats to freedom of expression still come in many forms as they did in 1972. Murder and physical violence, as with the killings of bloggers in Bangladesh, tries to frighten other writers, scholars, artists and thinkers into silence, or exile. Imprisonment (for example, the six year and three month sentence of democracy campaigner Rasul Jafarov in Azerbaijan) attempts to enforces silence too. Instilling fear by breaking into individuals’ computers and tracking their movement (as one African writer reports to Index) leaves a frightening signal that the government knows what you do and who you speak with.

Also in this issue, veteran journalist Andrew Graham-Yool looks back at Argentina’s dictatorship of four decades ago, he argues that vicious attacks on journalists’ reputations are becoming more widespread and he identifies numerous threats on the horizon, from corporate control of journalistic stories to the power of the president, Cristina Fernández de Kirchner, to identify journalists as enemies of the state.

Old censors and new censors have more in common than might divide them. Their intentions are the same, they just choose different weapons. Comparisons should make it clear, it remains ever vital to be vigilant for attacks on free expression, because they come from all angles.

Despite this, there is hope. In this issue of the magazine Jamie Bartlett writes of his optimism that when governments push their powers too far, the public pushes back hard, and gains ground once more. Another of our writers Jason DaPonte identifies innovators whose aim is to improve freedom of expression, bringing open-access software and encryption tools to the global public.

Don’t miss our excellent new creative writing, published for the first time in English, including Russian poetry, an extract of a Brazilian play, and a short story from Turkey.

As always the magazine brings you brilliant new writers and writing from around the world. Read on.

© Rachael Jolley

This article is part of the autumn issue of Index on Censorship magazine looking at comparisons between old censors and new censors. Copies can be purchased from Amazon, in some bookshops and online, more information here.