Академический Документы
Профессиональный Документы
Культура Документы
in
the
UK
and
the
Chinese
great
firewall
Ali
Raza
LLB(Hons)
Law
Today
in
the
21st
century,
the
Internet
has
revolutionized
every
aspect
of
human
life.
From
social
networking
and
communication1to
health,
education
and
shopping.
In
a
somewhat
short
time,
the
Internet
has
developed
into
an
essential
and
indispensable
instrument
for
todays
society.2
In
this
age
of
globalization
there
are
around
two
billion
people
around
the
world
connected
to
the
Internet,3
the
flow
of
information,
ideas
and
communication
has
never
been
so
great
on
this
borderless
medium.
For
some
nations4
the
development
of
the
Internet
represents
a
threat
to
their
power
and
safety
while
for
others
it
represents
a
threat
to
the
development
of
the
young.
With
many
states
wanting
to
protect
their
legal,
cultural,
political
and
social
systems
from
the
potentially
harmful
and
illegal
information
harbouring
on
the
internet,
the
practice
of
censorship
has
become
ever
more
prevalent.5
Some
nation
states
have
had
to
forcefully
resist
the
spread
of
such
networks6
states
Rheingold,
while
others
have
adopted
more
subtle
techniques.
This
paper
will
illustrate
how
states
have
resorted
to
so-called
self-regulatory
or
censorship
as
tools
to
control
the
flow
of
information
in
the
ever-developing
World
Wide
Web.
The
first
section
will
examine
Pornography,
harmful
and
illegal
content.
Particular
reference
will
be
made
to
the
UK,
and
Australian
approach
to
the
issue.
The
second
section
will
examine
Chinas
attempt
to
build
a
firewall
to
censor
politically
sensitive
information.
Followed
by
a
reasoned
conclusion
as
to
how
far
the
development
of
Internet
has
affected
the
nation
states
ability
to
control
the
flow
of
information
and
how
effective
their
responses
have
been.
Section
I
Pornography
has
been
one
of
the
most
contentious
issues
since
the
inception
of
the
Internet,7
an
issue
that
has
attracted
the
growing
attention
of
the
UK
government.
Its
easily
accessible
nature
has
1
Facebook a social networking site has around 800 million users; Access at: http://www.facebook.com/press/info.php?statistics (last access, 29-02-12) 2 Donna L. Hoffman, Thomas P. Novak and Alladi Venkatesh, Has The Internet Become Indispensable? Empirical Findings and Model Development (2004) Communications of the ACM, July, 47(7), 37-42. 3 International Telecommunications Union (2010 report), access at: http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2010.pdf (last access 29-02-12) 4 Shanthi Kalathil and Taylor C. Boas, The Internet and state control in authoritarian regimes: China, Cuba, and the counter-revolution, First Monday, Volume 6, Number 8 - 6 August 2001. Available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/876/785 (Last accessed 29-03-12) 5 James Fallows, Censoring the Internet: It's Not Just for China Any More! Atlantic (Nov 2011), Available at: http://www.theatlantic.com/technology/archive/2011/11/censoring-the-internet-its-not-just-for-china-any- more/248612/ (Last accessed 29-03-12) 6 Geoffrey Ebbs and Howard Rheingold, Censorship on the Information Highway (1994) Information Management & Computer Security, Vol. 2 No. 4, , pp. 30-31, MCB University Press Limited, 0968-5227. 7 Jerry Ropelato, Internet Pornography Statistics. Available at: http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html (Last accessed 29-03-12)
caused a moral panic8 shared by the government, judiciary, media and the population in general.9 While there have been many attempts to control the availability of pornography by nation states, the cultural, moral and legal variations make it difficult to define it in a global society, states Akdeniz. 10 It is important initially to differentiate between harmful content such as pornography and illegal content such child pornography, the two are different in nature and should not be confused.11 The UK government has long seen the need to protect the young and the public from pornographic material or information, which is obscene or harmful.12 While its a bastion of freedom of expression,13 it has implemented a series of measures for the protection of the health and morals14 of its people. The Obscene Publications Act 1959 (OPA) states that an article shall be deemed obscene if its effect taken as a whole tends to deprave and corrupt persons.15 The act was primarily criticised for providing no clear rationale behind the approach to what constitutes obscene material.16 Its weak nature and inability to control information on the fast moving internet led to the introduction of Section 6317 of the Criminal Justice and Immigration Act 2008. It created a new offence for the publication or possession of extreme pornographic images. An extreme image is defined as grossly offensive, disgusting, or otherwise of an obscene character.18 As the existing legislation was being circumvented by the ever-developing nature of the Internet, this new offence was much needed to keep up with the technological change, and introduce clarity to the law. Nonetheless it has been criticised for obscuring the law even further.19 Firstly, the definition of extreme images resurrects the OPA definition and moves away from the notion of harm.20 Secondly,
8 9
Stanley Cohen, Forks devils and Moral Panics: Creation of Mods and Rockers (Blackwell 1987) Wallace J and Mangan M, Sex, Laws and Cyberspace: Freedom and Censorship on the Frontiers of the Online Revolution, Henry Holt & Company (1996). 10 Akdeniz Yaman, 'The Regulation of Pornography and Child Pornography on the Internet (1997)22 (1) The Journal of Information, Law and Technology (JILT), page 2, (introduction). 11 European Commission Communication, Illegal and Harmful Content on the Internet, (March 2004), Available at: http://ec.europa.eu/public_opinion/archives/ebs/ebs_203_en.pdf (Last accessed 29-03-12) 12 Supra note 10 13 European Convention On Human Rights 1953, Article 10; implemented in The Human Rights Act 1998 Article 10. 14 Ibid, Article 8 (2) 15 The Obscene Publications Act 1959, Section 1 (1) 16 Clare McGlynn and Erika Rackley, Criminalising extreme pornography: A lost opportunity (2009) Criminal Law Review, 4, 245-260 17 th It came into force January 26 2009 18 Criminal Justice and Immigration Act 2008, Section 63 (6) (b) & (7) 19 Supra note 16 20 Ibid
the broad definition of what constitutes possession has also caused controversy. In R v Porter,21 the defendant had deleted the files on the hard drive but was unaware that they were retrievable. Thus, to convict some proof must established showing that the defendant did not believe the images were out of his custody and control.22 Akdeniz believes this introduces a subjective element into the concept of physical possession in the context of computer images.23 Furthermore such a standpoint lacks clarity and understanding.24 While section 63 of the CIJA may be a lost opportunity25 to bring much needed certainty over the publication or possession of extreme pornographic images, it also demonstrates a profound lack of understanding about pornography and its harms26 on the governments part for sticking by the OPA principles. The global nature of the Internet means it is difficult to predict the impact of this legislation, furthermore the lack of cases shows that legislation in not the whole answer, a view shared by the UK government.27 Thus, the government has set up further self-regulatory initiatives to combat the issue. The Internet Watch Foundation (IWF) has created hotlines for the reporting of illegal and obscene Internet content, the emphasis being on the former. The IWF, as an industry based self- regulatory body, financed by the Internet Service Providers (ISPs) and it is not an accountable public body.28 It acts upon reports sent by users, once it locates the undesirable content; it informs all British ISPs for the removal of the content located, and the relevant law enforcement agencies.29 The organisations annual reports have shown a gradual decrease in the amount of illegal content
21 22
[2006] EWCA Crim 560; [2006] 2 Cr. App. R. 25. Ibid, [2006] 2 Cr. App. R. 25, Dyson LJ at 8 and 16. 23 Yaman Akdeniz, Possession and Dispossession: a critical assessment of defences in possession of indecent photographs of children cases [2007] Crim. L.R. 274, 283. 24 Liberty, Liberty's Committee Stage Briefing on the Criminal Justice and Immigration Bill in the House of Commons (2007), page 18, Available at: http://www.liberty-human-rights.org.uk/pdfs/policy07/crimjust-immbill-committee.pdf (Last accessed 29-03- 12) 25 Supra note 16 26 Ibid, see conclusion 27 See, House Of Lords, Select Committee on Science and Technology, 5th Report: Information Society: Agenda for Action in the UK, 23 July 1996. (Para 4, 162). Available at: http://www.parliament.the-stationery-office.co.uk/pa/ld199596/ldselect/inforsoc/inforsoc.htm (Last accessed, 03-03-12) 28 See the IWF website for more information; http://www.iwf.org.uk/about-iwf (Last accessed 29-03-12) 29 See the IWF website for a structured report process; http://www.iwf.org.uk/hotline/report-process (Last accessed 29-03-12)
originating in the UK.30 Its 2010 report shows that out of 48,702 reports, only 0.4% of content originated in the UK.31 While the UK government and industry leaders continue to sing the IWFs success,32 others remain rather sceptical. Akdeniz states, while illegal material is removed from the UK ISPs servers, the same material will continue to be available on the Internet carried by the foreign ISPs in their own servers.33 Thus, concluding while the IWF is a good initiative at a local level, it may be ineffective at controlling content flowing in from other jurisdictions. However, the IWF maintains that it continues to work with the European Unions Safer Internet Programme34 and has international partners with whom it collaborates information for the removal of undesirable content.35 According to Nadine Strossen, it is not the job of private policing organisations to judge the suitability or illegality of Internet content,36 rather illegality remains a matter to be decided by courts of law states Akdeniz.37 Further advocating that the unaccountable structure of the organisation highlight its undemocratic nature.38 With the vast amount of harmful and adult content floating so accessibly on the Internet, parents and Internet users are concerned about protecting their children and vulnerable people from such content.39 At present there are around 25 well known filtering products,40 they allow parents to customise, block and monitor web content.41 The UK government has continually supported such
30
See the IWF website for annual reports; http://www.iwf.org.uk/accountability/annual-reports (Last accessed 29-03-12) 31 Internet Watch Foundation Annual Report 2010, page 8. Available at: http://www.iwf.org.uk/accountability/annual-reports/2010-annual-report (Last accessed 29-03- 12) 32 Ibid 33 Yaman Akdeniz, Internet Content Regulation, UK Government and the Control of Internet Content, (2001) Computer Law & Security Report Vol. 17 no. 5 303 34 For more information, see the Europa website; http://ec.europa.eu/information_society/activities/sip/index_en.htm (Last accessed 29-03-12) 35 See the IWF website for more information; http://www.iwf.org.uk/partnerships/international (Last accessed 29-03-12) 36 Professor Nadine Strossen, from an ACLU Press Release, ACLU Joins International Protest Against Global Internet Censorship Plans, 9 September 1999 37 Supra note 33 38 Ibid 39 Terri Apter, Access to Internet Pornography: Are Parents Concerns Justified? Available at: http://www.psychologytoday.com/blog/domestic-intelligence/201103/access-internet- pornography-are-parents-concerns-justified (Last accessed 29-03-12) 40 See, Benchmarking of Parental control tools for the online protection of children, SIP-Bench II, Assessment results and methodology 2nd Cycle. Available at: http://ec.europa.eu/information_society/activities/sip/docs/sip_bench2_call/sip_bench_2nd_cycle_report.pf (Last accessed 29-03-12) 41 Ibid, page 7
products
stating
they
can
be
extremely
useful
in
helping
parents
control
what
their
children
access.42
The
UKs
four
biggest
ISPs
now
provide
an
opt-in
parental
control
service.43
While
the
support
for
such
products
remains,
recent
highly
credible
reports
confirm
the
ineffectiveness
of
such
filtering
systems
in
blocking
general
harmful
content
but
slightly
better
with
adult
content.44
Furthermore
as
Akdeniz
states
such
products
do
not
reflect
the
cultural
differences
in
a
global
environment
such
as
the
Internet.45
What
is
considered
simply
sexually
explicit
but
not
obscene
in
England
may
well
be
obscene
in
many
other
countries
and
vice
versa.46
Furthermore
the
SIP
BENCH
II
report,
concludes
that
the
products
work
considerably
better
on
the
English
language
than
any
other.
47
It
has
been
argued
that
such
filtering
products
facilitate
the
suppression
of
speech
far
more
effectively
than
national
laws
alone
ever
could.48
While
they
enter
homes
under
the
guise
of
parental
control
and
as
a
purported
alternative
to
government
censorship,49
they
present
a
more
indirect
and
subtle
technique
for
states
to
censor
content.
In
addition,
these
products
result
in
the
exclusion
of
socially
useful
websites
and
information;
they
may
filter
potentially
educational
materials
regarding
AIDS
and
drug
abuse
prevention.50
Thus
Mehta
may
be
right
in
saying
that
the
value
of
censorship
and
the
agents
traditionally
responsible
for
instituting
it
are
less
clear.51
Furthermore,
The
Economic
and
Social
Committee
of
the
European
Commission
concluded
that
filtering
and
rating
systems
are
impractical
and
ineffective
measures
for
the
long
term.52
In
Australia,
the
Broadcasting
Services
Amendment
(Online
Services)
Act
1999
was
introduced
as
an
alternative
to
filtering
products
to
control
harmful
content
on
the
Internet.53
While
it
can
order
take
42
Department of Trade and Industry, Net Benefit: The Electronic Commerce Agenda for the UK, DTI/Pub 3619, (October 1998). 43 Ben Quinn, Biggest four UK ISPs switching to 'opt-in' system for pornography, Available at: http://www.guardian.co.uk/society/2011/oct/11/pornography-internet-service-providers?intcmp=239 (Last accessed 29-03-12) 44 Supra note 40, page 22 45 Supra note 33 46 Supra note 10 47 Supra note 40, page 22 48 See the Global Internet Liberty Campaign Statement submitted to the Internet Content Summit, Munich, Germany, September 1999, Available at: http://w2.eff.org/Censorship/Censorware/19990907_gilc_intl_ratings_statement.html (Last accessed 29-03- 12) 49 Supra note 33 50 Ibid 51 Michael Mehta, Censoring Cyberspace, (2002) American Journal of Social Science 30 (2) pp319-338 52 Economic and Social Committee of the European Commission, Opinion on the Proposal for a Council Decision adopting a Multiannual Community Action Plan on promoting safe use of the Internet, (OJEC, 98/C 214/08, Brussels-Luxembourg, 10 July,1998, page 29-32). 53 Australian Broadcasting Authority, Investigation Into the Content of On-line Services, Report to the Minister for Communications & the Arts, (Sydney: ABA, 30 June 1996).
down notices to Australian sites hosting what is believed to be X or RC material,54 foreign ISPs may also be asked take all reasonable steps to prevent end users from accessing the content.55 Critics argued that the legislation would make Australia the village Idiot of the Internet world,56 as the government was trying to legislate locally over a global phenomenon.57 Furthermore plans are in place for ISPs to provide mandatory Internet filters free from pornography, and inappropriate material.58 Critics have argued that the filter is too broad and at the very least the government should reconsider to an opt-in model.59 The failure of the UK government to draw up a harder lined legislation to supersede the OPA and combat harmful content on the internet shows a real unwillingness of the government to impinge peoples freedom of expression. While it acknowledges that there is a need to protect the vulnerable, it has resorted to more self-regulatory initiatives such as the IWF in order to achieve a middle ground. Akdeniz proposes the establishment of a working group with members from the public and private sphere to tackle the real problem of illegal and harmful content at a UK level, rather than the undemocratic and ineffective IWF.60 How pragmatic such a proposal may be is questionable. The IWF represents a valiant attempt by the Internet industry, government and the public to address and stabilise such a fragile and sensitive area. It may not be a total solution but it is the beginning of a proportionate response. Some have argued that putting pressure on the ISPs to solve the content related issues is not the way forward,61 it will not only hamper the development of the internet,62
54 55
Broadcasting Services Act (1992), S30 Ibid, s40(1)(c). 56 Nadine Strossen, President of American Council for Civil Liberties, quoted in Australia Urged to Repeal Law Sydney Morning Herald Business Section 24/8/99; Carolyn Penfold, Village Idiot, or Wisest Person in Town? Internet Content Regulation in Australia, (2006) 3:2 UOLTJ 333, page 335, Available at: http://www.uoltj.ca/articles/vol3.2/2006.3.2.uoltj.Penfold.333-352.pdf (Last accessed 29-03-12) 57 Peter Coroneos, Internet Content Control in Australia: Attempting the Impossible? UNSWLJ Forum, Internet Content Control 6(1) March 2000 p26. 58 Conroy announces mandatory Internet filters to protect children: http://www.abc.net.au/news/2007-12-31/conroy-announces-mandatory-internet-filters-to/999946 (Last accessed 29-03-12) 59 Australia puts Internet filtering system on hold for 12 months, see comments the of Simon Sheikh, chief executive of online activist group GetUp! And Karim Temsamani, managing director of Google Australia and New Zealand, Available at: http://www.guardian.co.uk/technology/2010/jul/09/australia-internet-filtering-system?INTCMP=SRCH (Last accessed 29-03-12) 60 Akdeniz, Y., Global Internet Liberty Campaign Submission on illegal and harmful content, to the Irish Minister for Justice, July 1997 Access at: http://www.cyber-rights.org/reports (Last accessed 29-03-12) 61 Yaman Akdeniz, Bohm, N, & Walker, C, Internet Privacy: Cyber-Crimes vs Cyber-Rights, (1999) Computers & Law, (10) 1,April/May, 34-39; Yaman Akdeniz, New Privacy Concerns: ISPs, Crime prevention, and Consumers Rights, [2000] International Review of Law, Computers and Technology, 14 (1), 55-61. 62 Joel Reidenberg, Governing Networks and Cyberspace Rule-Making, (1996) Emory Law Journal (45) 911
but
the
electronic
commerce
in
the
UK.63
While
Rheingold
argues
that,
it
is
futile
to
pretend
that
it
can
remain
an
intellectual
playground
for
ever.64
Ebbs
questions
whether
it
is
technically
possible
or
morally
right.65
While
the
Australians
have
adopted
more
stringent
approach,
it
remains
to
be
seen
how
effective
and
stable
it
will
prove
to
be
in
the
long
term.
The
ever-developing
virtual
world
requires
a
multi
layered66
approach,
extra
resources
must
be
made
available
to
educate
parents,
teacher
and
librarians
of
the
potentially
harmful
content
on
the
Internet,
so
they
can
instil
a
solid
moral
grounding
in
children.67
Section
II
While
the
UK
has
adopted
a
subtler
approach,
the
Chinese
have
been
rather
forceful
in
their
quest
to
control
information
on
the
Internet.
The
exponential
growth
of
the
Internet
in
China68
poses
an
insurmountable
threat
to
the
authoritarian
regime;69
it
can
serve
as
a
powerful
interactive
tool
for
people
to
share
information,
viewpoints,
hold
discussions
and
even
organize.70
Convinced
that
it
is
fighting
a
covert
war
against
hostile
external
forces,71
the
communist
state
has
vowed
to
maintain
strong
a
social
and
political
order
over
its
people
on
the
Internet.72
While
restricting
the
access
citizens
have
to
information
published
outside
the
country,73
it
has
also
embarked
on
a
series
of
initiatives
at
a
local
level,
all
in
the
aim
to
create
a
political
environment
favourable
to
the
communist
regime.74
63 64
Supra note 10 Supra note 6 65 Ibid 66 Supra note 10 and 33 67 Supra note 6 (Ebbs) 68 th China Internet Network Information Center (CNNIC) 27 Statistical Report on Internet Development, confirms internet users in late 2010 were over 450 million, page 5; available at: http://www1.cnnic.cn/uploadfiles/pdf/2011/2/28/153752.pdf (Last accessed 29-03-12) 69 Shanthi Kalathil and Taylor C. Boas, The Internet and state control in authoritarian regimes: China, Cuba, and the counter-revolution, First Monday, Volume 6, Number 8 - 6 August 2001. Available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/876/785 (Last accessed 29-03-12) 70 David Bandurski, Chinas Guerrilla War for the Web, (2008) Far Eastern Economic Review (July), Available at http://www.feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web (Last accessed 29-03-12) 71 Ibid 72 David Bandurski, State Council viceminister (Cai Mingzhao) reiterates control as top priority of Internet development in China, China Media Project (4 December), Available at: http://cmp.hku.hk/2007/12/04/763/ (Last accessed 29-03-12) 73 Greg Walton, Chinas Golden Shield: Corporations and the Development of Surveillance Technology in the Peoples Republic of China (2001), Available at: http://www.dd-rd.ca/site/_PDF/publications/globalization/CGS_ENG.PDF (Last accessed 29-03-12) 74 Supra note 70
The
Golden
shield
Project
colloquially
referred
to
as
the
Great
Firewall
of
China
(GFW)
is
a
large- scale
surveillance
and
censorship
project
undertaken
by
the
Chinese
government
in
1998.75
A
part
of
this
project
entails
the
censoring
of
politically
sensitive
information,
for
example
events
related
to
the
Taiwanese
independence,
the
outlawed
group
Falun
Gong,76
websites
promoting
a
western
agenda
such
the
BBC
or
CNN,
etc.77
It
has
adopted
a
number
of
technically
efficient
techniques,
such
as
IP
filtering,
redirecting
and
blocking
domain
names,
URL
filtering,
packet
filtering,
etc78
to
combat
the
ever
developing
internet.
Blogs
and
discussion
boards
are
also
a
popular
medium
for
people
to
share
political
information,
while
the
blogosphere
is
a
much
more
freewheeling
space
than
the
mainstream
media79
for
distributing
such
information.
The
government
understands
that
it
has
the
potential
to
create
internal
dissemination,
thus
it
has
sought
to
control
and
use
this
medium
to
their
advantage.
The
creation
of
an
Internet
Police
in
the
form
of
private
citizens
from
all
over
the
country
who
enlist
as
volunteers
or
paid
commentators
to
guide
online
conversations
in
a
progovernment
direction
or
to
act
as
watchdogs,
reporting
antigovernment
conversations
to
the
authorities.80
While
some
conclude
it
is
an
effective
tool
to
spread
propaganda
to
win
the
Chinese
peoples
hearts
and
minds.81
Li
Yonggang
believes
that
the
deployment
of
such
commentators
to
combat
the
ubiquitous
nature
of
the
Internet
reflects
the
weakening
of
the
communist
partys
ideological
control.82
While
most
regard
the
gateways
of
this
firewall
as
the
most
technically
advanced
in
the
world,83
fallows
remains
unconvinced,
stating
its
either
crude
and
slapdash
or
ingenious
and
well
crafted.84
75 76
Supra note 73, page 15 Supra note 70 77 Supra note 73, page 9 78 For a detailed explanation of the workings of these methods and technologies, See, James Fallows, The Connection Has Been Reset, Atlantic (March), Available at: http://www.theatlantic.com/doc/200803/chinese-firewall. (Last accessed 29-03-12) 79 Rebecca Mackinnon, Chinas censorship 2.0, Ho companies censor bloggers, First Monday, Volume 14, Number 2 - 2 February 2009, available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2378/2089%23author%23aut hor; (Last accessed 29-03-12) For techniques adopted by bloggers to get around censors in Blogs, See , Ashley Esarey and Qiang Xiao, 2008. Below the Radar: Political Expression in the Chinese Blogosphere, Asian Survey, volume 48, number 5 (September/October), pp. 752772, 80 Supra note 70 81 Qiang Xiao, 2007. China censors Internet users with site bans, cartoon cop spies, San Francisco Chronicle (23 September), available at: http://www.sfgate.com/cgibin/article.cgi?f=/c/a/2007/09/23/INCLS80LO.DTL (Last accessed 29-03-12) 82 Supra note 70, Li Yonggang, assistant director of the Universities Service Centre for China Studies at the Chinese University of Hong Kong. 83 Race to the Bottom Corporate Complicity in Chinese Internet Censorship, Human Rights Watch, Volume 18, No. 8(C), August 2006, page 3, Available at: http://www.hrw.org/reports/2006/08/09/race-bottom
The creation of a proxy server allows a user to connect with a computer outside China, popular among students and hackers, it is free to install and operate. A virtual private network creates an encrypted channel the firewall cannot read, used by most foreign businesses; it is also available to individuals.85 While some have been quick to conclude that GFW is a misguided and futile attempt,86 the slow Internet speeds created by a proxy server and the VPN may not be financially practical to the ordinary Chinese person.87 In the end the GFW makes the quest for information just enough of a nuisance that people generally wont bother.88 Thus while it may not supress all unwanted harmful information, the GFW has sufficiently strangled the availability of the majority of unwanted content on the Internet. While the Chinese have the technical capability to supress such loopholes,89 they are faced with a very uneasy paradox. As Walton states, political control is dependent on economic growth and economic growth requires the modernization of information technologies, which in turn, have the potential to undermine political control.90 Criticised by many human rights organisations and western leaders91 for disrespecting key UN treaties,92 and limiting the peoples freedom of speech unjustifiably.93 It is ironic how such attacks have a real ring of hypocrisy to them; the Wikileaks94 saga
OpenNet
Initiative,
2005.
Internet
Filtering
in
China
in
20042005:
A
Country
Study,
Available
at:
http://opennet.net/studies/china
(Last
accessed
29-03-12);
See
also
supra
note
73
84
Supra
note
78
85
Ibid
86
Oliver
August,
The
Great
Firewall:
China's
Misguided
and
Futile
Attempt
to
Control
What
Happens
Online,
Wired
(23
October),
Available
at:
http://www.wired.com/politics/security/magazine/15-11/ff_chinafirewall
(Last
accessed
29-03-12)
See
also,
supra
note
73,
page
5
(executive
summary)
87
Supra
note
78
88
Ibid
89
Supra
note
78
90
Supra
note
73
91
Barack
Obama
criticises
internet
censorship
at
meeting
in
China:
http://www.guardian.co.uk/world/2009/nov/16/barack-obama-criticises-internet-censorship-china
(Last
accessed
29-03-12)
Hillary
Clinton
criticises
Beijing
over
internet
censorship:
http://www.guardian.co.uk/world/2010/jan/21/hillary-clinton-china-internet-censorship
(Last
accessed
29-03- 12)
92
Universal
Declaration
of
Human
Rights,
See
Article
18,19,28
International
Covenant
on
Civil
and
Political
Rights
1966,
see
Article
19
93 Human
Rights
watch
report
(supra
note
83)
page
17
24;
Imprisoned
for
Peaceful
Expression
Chinese
Journalist
Shi
Tao
imprisoned
for
10
years:
http://www.amnestyusa.org/our-work/cases/china-shi-tao
(last
access
15-03-12);
Supra
note
76,
see
various
different
cases
on
page
10.
94
Jonathan
Fildes,
What
is
Wikileaks?
Available
at:
http://www.bbc.co.uk/news/technology-10757263
(Last
accessed
29-03-12)
led to the US blocking access to the site in its public establishments,95 and highlighting the uneasy dilemma the Chinese face. The Wikileaks example illuminates the powerful development the Internet has made in the flow of information. It highlights the easy nature in how sensitive and potentially dangerous information can be shared worldwide and how nation states may find themselves powerless to stop it.96 It seems then that China finds itself increasingly cornered, with Google withdrawing its censoring services over an alleged email hacking,97 and relocating to Hong Kong.98 There appears to be a real belief that this could trigger a major threat to Chinas censorship of online content.99 With non- governmental organizations buoyed by Googles reform,100 it remains to be seen how much longer the likes of Microsoft, Yahoo and Skype will continue providing censored services. Whether the Chinese government will comprise in a future dispute is debatable, but with the netizens on the rise, it is essential china retain the services of such corporations to assist the GFW in censoring harmful and contentious information and sustained economic development. While in the current climate, the GFW and paid commentators form a broad, potent, and effective strategy in controlling the information available to citizens on the Internet. The Arab Spring is a stark reminder to the Chinese government of the potential might of the Internet, a might that overpowered even the valiant efforts of the Egyptian government.101 Therefore to prevent such a revolution, Kalathil and Boas believe that China will have to continually adapt their measures of control if they want to counter effectively the challenges of future variations in information and communication technologies.102 Furthermore the greatest challenge to the countrys power does
95
Ewen MacAskil,l US blocks access to WikiLeaks for federal workers: http://www.guardian.co.uk/world/2010/dec/03/wikileaks-cables-blocks-access-federal (Last accessed 29-03- 12) 96 Jon Swaine, WikiLeaks release: Why law is powerless to stop WikiLeaks from publishing: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8152285/WikiLeaks-release-Why-law-is- powerless-to-stop-WikiLeaks-from-publishing.html (Last accessed 29-03-12) 97 Tania Branigan, Google to end censorship in China over cyber attacks: http://www.guardian.co.uk/technology/2010/jan/12/google-china-ends-censorship (Last accessed 29-03-12) 98 Tania Branigan, Google angers China by shifting service to Hong Kong: http://www.guardian.co.uk/technology/2010/mar/23/google-china-censorship-hong-kong?intcmp=239 (Last accessed 29-03-12) 99 bid 100 United States: Amnesty International USA Commends Google's Stand Against Internet Censorship: http://www.amnestyusa.org/news/press-releases/united-states-amnesty-international-usa-commends- google-s-stand-against-internet-censorship (Last accessed 29-03-12) 101 Alexandra Dunn, Unplugging a Nation: State Media Strategy During Egypts January 25 Uprising, THE FLETCHER FORUM OF WORLD AFFAIRS, VOL.35:2 SUMMER 2011 102 Supra note 4
not
come
from
foreign
Web
spies
or
other
external
forces
but
from
a
growing
unrest
in
the
domestic
population.103
Conclusion
The
global
nature
of
the
Internet
empowers
ordinary
people
to
share
information
effortlessly,
for
the
UK
government
it
poses
an
uneasy
dilemma.
On
the
one
hand
there
is
a
desire
to
protect
the
young
and
vulnerable
from
the
vast
amount
of
harmful
material,
yet
at
the
same
time
it
is
very
wary
of
supressing
peoples
freedom
of
expression.
While
section
63
of
the
CJIA
2008
was
drafted
to
combat
the
developing
nature
of
the
Internet,
it
was
a
lost
opportunity
to
bring
much
needed
control.
Its
obscure
and
vague
definitions
highlight
the
legislature
reluctance
to
adopt
a
stringent
line
of
law.
Yet
initiatives
such
as
the
IWF,
filtering
products,
and
the
major
ISPs
offering
a
parental
control
feature
highlight
a
desire
to
not
let
the
medium
go
totally
uncontrolled.
While
total
reliance
should
not
be
placed
on
initiatives
such
as
the
IWF,
as
Internet
content
will
always
be
available
from
sources
outside
the
UK,
it
represents
a
part
of
the
solution
rather
than
a
problem
to
controlling
harmful
content
on
the
Internet.
The
self-regulatory
approach
adopted
by
the
UK
means
that
it
was
inevitable
that
the
development
of
the
Internet
would
impinge
the
governments
control
over
the
flow
of
information.
For
the
Chinese
the
ever-developing
Internet
has
led
to
the
implementation
of
draconian
measures.
The
GFW
uses
a
number
of
technically
efficient
techniques
to
filter
out
potentially
harmful
and
politically
sensitive
information
originating
on
the
Internet.
Paid
commentators
are
employed
to
guide
discussions
and
act
as
watchdogs
over
blogs,
discussion
boards
and
social
networks,
to
combat
internal
dissemination.
The
GFW
is
hailed
as
the
most
technically
advanced
filtering
system
in
the
world,
yet
it
cannot
control
all
unwanted
harmful
and
contentious
information.
While
it
may
remain
workable
in
the
short
to
medium
term,
there
is
growing
pressure
from
the
mass
public,
non- governmental
organisations,
corporations
and
nation
states
that
threatens
to
undermine
it.
Faced
with
an
economic
and
political
paradox,
the
continued
development
of
the
Internet
is
likely
to
affect
the
governments
control
over
the
free
flow
of
information.
Nonetheless
at
present
the
development
of
the
Internet
has
only
led
to
stronger
and
more
determined
measures
employed
over
the
information
available
to
citizens.
Moreover
it
remains
to
be
seen
what
course
of
action
the
Chinese
will
take
in
the
coming
years.
103
Supra note 70
Bibliography
Legislation
Universal
Declaration
of
Human
Rights
European
Convention
On
Human
Rights
1953
International
Covenant
on
Civil
and
Political
Rights
1966
The
Obscene
Publications
Act
1959
Human
Rights
Act
1998
Broadcasting
Services
Amendment
(Online
Services)
Act
1999
Criminal
Justice
and
Immigration
Act
2008
Cases
R
v
Porter
[2006]
EWCA
Crim
560;
[2006]
2
Cr.
App.
R.
25
Books
Akdeniz
Y,
Internet
child
pornography
and
the
law:
national
and
international
responses,
Ashgate;
4
Ed
edition
(2008)
Cohen
S,
Forks
devils
and
Moral
Panics:
Creation
of
Mods
and
Rockers
(Blackwell
1987)
Goldsmith,
J
and
Wu,
T.
Who
Controls
the
Internet:
Illusions
of
a
Borderless
World
Oxford:
OUP,
2006
Kizza
J
M,
Civilizing
the
Internet
Global
Concerns
and
Efforts
Toward
Regulation
(McFarlane
and
Company
Inc
Publishers
1998)
Wallace
J
and
Mangan
M,
Sex,
Laws
and
Cyberspace:
Freedom
and
Censorship
on
the
Frontiers
of
the
Online
Revolution,
Henry
Holt
&
Company
(1996).
th
Donna L. Hoffman, Thomas P. Novak and Alladi Venkatesh, Has The Internet Become Indispensable? Empirical Findings and Model Development (2004) Communications of the ACM, July, 47(7), 37-42. Dunn A, Unplugging a Nation: State Media Strategy During Egypts January 25 Uprising, THE FLETCHER FORUM OF WORLD AFFAIRS, VOL.35:2 SUMMER 2011. Ebbs G and Rheingold H, Censorship on the Information Highway (1994) Information Management & Computer Security, Vol. 2 No. 4, , pp. 30-31, MCB University Press Limited, 0968-5227. Economic and Social Committee of the European Commission, Opinion on the Proposal for a Council Decision adopting a Multiannual Community Action Plan on promoting safe use of the Internet, (OJEC, 98/C 214/08, Brussels-Luxembourg, 10 July,1998, page 29-32). Esarey A and Xiao Q,. Below the Radar: Political Expression in the Chinese Blogosphere, Asian Survey, volume 48, number 5 (September/October), pp. 752772. (2008) McGlynn C and Rackley E, Criminalising extreme pornography: A lost opportunity (2009) Criminal Law Review, 4, 245-260 Mehta M, Censoring Cyberspace, (2002) American Journal of Social Science 30 (2) pp319-338 Penfold C, Village Idiot, or Wisest Person in Town? Internet Content Regulation in Australia, (2006) 3:2 UOLTJ 333 Race to the Bottom Corporate Complicity in Chinese Internet Censorship, Human Rights Watch, Volume 18, No. 8(C), August 2006. Reidenberg J, Governing Networks and Cyberspace Rule-Making, (1996) Emory Law Journal (45) 911
Internet
sources
International
Telecommunications
Union
(2010
report),
access
at:
http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2010.pdf
Shanthi
Kalathil
and
Taylor
C.
Boas,
The
Internet
and
state
control
in
authoritarian
regimes:
China,
Cuba,
and
the
counter- revolution,
First
Monday,
Volume
6,
Number
8
-
6
August
2001.
Available
at:
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/876/785
James
Fallows,
Censoring
the
Internet:
It's
Not
Just
for
China
Any
More!
Atlantic
(Nov
2011),
Available
at:
http://www.theatlantic.com/technology/archive/2011/11/censoring-the-internet-its-not-just-for-china-any-more/248612/
Jerry
Ropelato,
Internet
Pornography
Statistics.
Available
at:
http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
European
Commission
Communication,
Illegal
and
Harmful
Content
on
the
Internet,
(March
2004),
Available
at:
http://ec.europa.eu/public_opinion/archives/ebs/ebs_203_en.pdf
Liberty,
Liberty's
Committee
Stage
Briefing
on
the
Criminal
Justice
and
Immigration
Bill
in
the
House
of
Commons
(2007),
Available
at:
http://www.liberty-human-rights.org.uk/pdfs/policy07/crimjust-immbill-committee.pdf
House
Of
Lords,
Select
Committee
on
Science
and
Technology,
5th
Report:
Information
Society:
Agenda
for
Action
in
the
UK,
23
July
1996,
Available
at:
http://www.parliament.the-stationery-office.co.uk/pa/ld199596/ldselect/inforsoc/inforsoc.htm
Internet
Watch
Foundation
Annual
Report
2010,
Available
at:
http://www.iwf.org.uk/accountability/annual-reports/2010- annual-report
Terri
Apter,
Access
to
Internet
Pornography:
Are
Parents
Concerns
Justified?
Available
at:
http://www.psychologytoday.com/blog/domestic-intelligence/201103/access-internet-pornography-are- parents-concerns-justified
Benchmarking of Parental control tools for the online protection of children, SIP-Bench II, Assessment results and methodology 2nd Cycle. Available at: http://ec.europa.eu/information_society/activities/sip/docs/sip_bench2_call/sip_bench_2nd_cycle_report.pf Global Internet Liberty Campaign Statement submitted to the Internet Content Summit, Munich, Germany, September 1999, Available at: http://w2.eff.org/Censorship/Censorware/19990907_gilc_intl_ratings_statement.html Akdeniz, Y., Global Internet Liberty Campaign Submission on illegal and harmful content, to the Irish Minister for Justice, July 1997 Access at: http://www.cyber-rights.org/reports th China Internet Network Information Center (CNNIC) 27 Statistical Report on Internet Development, confirms internet users in late 2010 were over 450 million, available at: http://www1.cnnic.cn/uploadfiles/pdf/2011/2/28/153752.pdf Shanthi Kalathil and Taylor C. Boas, The Internet and state control in authoritarian regimes: China, Cuba, and the counter- revolution, First Monday, Volume 6, Number 8 - 6 August 2001. Available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/876/785 David Bandurski, Chinas Guerrilla War for the Web, (2008) Far Eastern Economic Review (July), Available at http://www.feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web Greg Walton, Chinas Golden Shield: Corporations and the Development of Surveillance Technology in the Peoples Republic of China (2001), Available at: http://www.dd-rd.ca/site/_PDF/publications/globalization/CGS_ENG.PDF James Fallows, The Connection Has Been Reset, Atlantic (March), Available at: http://www.theatlantic.com/doc/200803/chinese-firewall Rebecca Mackinnon, Chinas censorship 2.0, Ho companies censor bloggers, First Monday, Volume 14, Number 2 - 2 February 2009, available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2378/2089%23author%23author Qiang Xiao, 2007. China censors Internet users with site bans, cartoon cop spies, San Francisco Chronicle (23 September), available at: http://www.sfgate.com/cgibin/article.cgi?f=/c/a/2007/09/23/INCLS80LO.DTL OpenNet Initiative, 2005. Internet Filtering in China in 20042005: A Country Study, Available at: http://opennet.net/studies/china Oliver August, The Great Firewall: China's Misguided and Futile Attempt to Control What Happens Online, Wired (23 October), Available at: http://www.wired.com/politics/security/magazine/15-11/ff_chinafirewall Jonathan Fildes, What is Wikileaks? Available at: http://www.bbc.co.uk/news/technology-10757263 Jon Swaine, WikiLeaks release: Why law is powerless to stop WikiLeaks from publishing: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8152285/WikiLeaks-release-Why-law-is-powerless-to- stop-WikiLeaks-from-publishing.html
Website
links
Facebook
a
social
networking
site
has
around
800
million
users;
Access
at:
http://www.facebook.com/press/info.php?statistics
See
the
IWF
website
for
a
structured
report
process;
http://www.iwf.org.uk/hotline/report-process
See
the
IWF
website
for
annual
reports;
http://www.iwf.org.uk/accountability/annual-reports
For
more
information
on
EU
Safer
Internet
Programme,
see
the
Europa
website;
http://ec.europa.eu/information_society/activities/sip/index_en.htm
See the IWF website for more information on its international partners; http://www.iwf.org.uk/partnerships/international Ben Quinn, Biggest four UK ISPs switching to 'opt-in' system for pornography, Available at: http://www.guardian.co.uk/society/2011/oct/11/pornography-internet-service-providers?intcmp=239 Conroy announces mandatory Internet filters to protect children: http://www.abc.net.au/news/2007-12-31/conroy-announces-mandatory-internet-filters-to/999946 Australia puts Internet filtering system on hold for 12 months, see comments the of Simon Sheikh, chief executive of online activist group GetUp! And Karim Temsamani, managing director of Google Australia and New Zealand, Available at: http://www.guardian.co.uk/technology/2010/jul/09/australia-internet-filtering-system?INTCMP=SRCH Barack Obama criticises internet censorship at meeting in China: http://www.guardian.co.uk/world/2009/nov/16/barack-obama-criticises-internet-censorship-china Hillary Clinton criticises Beijing over internet censorship: http://www.guardian.co.uk/world/2010/jan/21/hillary-clinton-china-internet-censorship Imprisoned for Peaceful Expression Chinese Journalist Shi Tao imprisoned for 10 years: http://www.amnestyusa.org/our-work/cases/china-shi-tao Ewen MacAskil,l US blocks access to WikiLeaks for federal workers: http://www.guardian.co.uk/world/2010/dec/03/wikileaks-cables-blocks-access-federal Tania Branigan, Google to end censorship in China over cyber attacks: http://www.guardian.co.uk/technology/2010/jan/12/google-china-ends-censorship Tania Branigan, Google angers China by shifting service to Hong Kong: http://www.guardian.co.uk/technology/2010/mar/23/google-china-censorship-hong-kong?intcmp=239 United States: Amnesty International USA Commends Google's Stand Against Internet Censorship: http://www.amnestyusa.org/news/press-releases/united-states-amnesty-international-usa-commends-google-s- stand-against-internet-censorship David Bandurski, State Council viceminister (Cai Mingzhao) reiterates control as top priority of Internet development in China, China Media Project (4 December), Available at: http://cmp.hku.hk/2007/12/04/763/
Other
Professor
Nadine
Strossen,
from
an
ACLU
Press
Release,
ACLU
Joins
International
Protest
Against
Global
Internet
Censorship
Plans,
9
September
1999
Australian
Broadcasting
Authority,
Investigation
Into
the
Content
of
On-line
Services,
Report
to
the
Minister
for
Communications
&
the
Arts,
(Sydney:
ABA,
30
June
1996).
Nadine
Strossen,
President
of
American
Council
for
Civil
Liberties,
quoted
in
Australia
Urged
to
Repeal
Law
Sydney
Morning
Herald
Business
Section
24/8/99