SlideShare a Scribd company logo
1 of 13
Download to read offline
Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024.
Digital Repression and Techno-
Authoritarianism
Digital Repression/Techno-Authoritarianism
What does it mean to you?
• Censorship
• Disinformation / Propaganda
• Surveillance / Privacy
• Cyberattacks / Cybersecurity — state-sponsored
• Cyber Sovereignty
• Internet Shutdown / Fragmentation
• Trend:
• From defensive to o
ff
ensive
• From local to beyond borders
China’s Great Firewall (GFW)
Digital Repression 1.0
• “Keeping things out,” at
fi
rst
• Technology and laws, but also infrastructural and operational: Total control
• State-controlled telecom sector: from gateways to providers
• Massive human resources for real-time monitoring
• Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world
• More proactive surveillance and disinformation
• The future is AI?
• No longer de
fi
ned by boundaries of borders — GFW going global
But the GFW is not for everyone
Calling for GFW 2.0
• Example of Cambodia’s National Internet Gateway (work in progress since 2021)
• Telecom infrastructure control and huge cost to surveil
• Dependency on foreign/global platforms and telcos (except for China)
• The evolution of digital repression is still based on the four pillars of the GFW:
• Technology — The Digital Silk Road
• Law — more speci
fi
c and targeted local laws with global reach
• Infrastructure, and operation — exert control via legal enforcement
Digital Authoritarian Legal Developments
Some examples
• India
• IT Rules amendments 2021 — removal of misinformation, control over platforms
• Digital Personal Data Protection 2023 — to block services on vague grounds
• Telecom Act 2023 - interception of communications for national security
• Singapore
• Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment
against “fake news”
• Foreign Interference Countermeasures Act (FICA) 2023 — Heavy
fi
nes and jail terms against those deemed to be
“preparing or planning” to publish “forbidden” information online without declaring foreign involvement;
unprecedented powers of government scrutiny and restrictions on the
fi
nancial a
ff
airs of targeted individuals and
entities.
• The common characteristics: Broad and vague.
Example for even just a civil case
• //The sweeping order comes as a result of legal
action by a group purporting to represent Appin’s
digital training centers — who say their students’
reputations are damaged by Reuters’ allegedly
false reporting. Last month, Additional District
Judge Rakesh Kumar Singh ruled that the story
should be suppressed pending trial.//
• Other media (Wired, Lawfare, Brookings Institute
etc.) removed references or excerpts: //Several of
the U.S. platforms who later removed content
became aware of the disputed allegations not
because they were following Indian legal news, but
after hearing from Khare’s American
fi
rm, Clare
Locke.//
• “Everyone except” The Citizen Lab “complied”
• Beyond laws, think about the power of a
“cooperative” foreign judiciary
The power of a court
Democracies make bad laws too
Global assault on privacy by encryption is led by Western democracies
• UK’s Online Safety Bill has passed in 2023
• Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023)
• US laws in Congress:
• EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish
a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes
• STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su
ff
ering from Abuse and
Mistreatment Act of 2023)
• KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet.
• Autocrats can justify themselves: “Democracies (you guys) do it too.”
• Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on
encryption
What’s next? Transnational Digital Repression
Trend 1: In
fl
uencing global technology standards
• China’s e
ff
ort to sponsor and in
fl
uence global technology standard setting bodies:
ITU, IEEE, IETF, etc.
• Attempts to migrate standard-setting and Internet operational powers from multi-
stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such
as ITU and its subgroups, under the UN
• E
ff
orts are often led via proxies such as Huawei and academic research institutions
• Attempts to set up its own axis of nations and corporations such as the World
Internet Congress to support its vision for more government control for better
“security, safety and harmony” of the future Internet, in the name of national and
global security, anti-terrorism and combatting cybercrime.
Trend 2: Extraterritoriality
• Manufacturing a new legal basis:
Extending global jurisdiction for data
laws, national security laws, etc.
• You’re not “safe anywhere”: A global
chilling e
ff
ect, at the minimum, and
more, wherever you are.
Transnational Digital Repression
Transnational Digital Repression
Trend 3: Taking over the Rule-based World Order
• Not taking it down, but taking it over!
• Case: UN Cybercrime Convention
• Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right?
• How to de
fi
ne cybercrime? Anything done with a PC or phone, including expressing dissent?
• Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc.
• Power of secret investigation for governments to obtain and share data from global Internet platforms
• How can platforms not comply? The “follow local law” excuse.
• Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting
crimes!
• Western governments are quite muted in the convention discussion (except Canada)
• Largely represented by justice and law enforcement branches, not human rights and diplomatic branches
• Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
The Global Weaponization of Legal and
Technological Means to Limit Online
Freedom and Redefine Truth For
Citizens Anywhere
References
• The Everything, Everywhere Censorship of China (2023)
https://www.freiheit.org/publikation/everything-everywhere-censorship-china
• Internet Impact Brief: Cambodia National Internet Gateway
https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia-
national-internet-gateway/
• How a Judge in India Prevented Americans From Seeing a Blockbuster Report
https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters-
story-00136339
• Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding
Session
https://www.hrw.org/sites/default/
fi
les/media_2024/01/Joint.Advocacy.Statement-
Cybercrime.Convention-Jan.23.2024.pdf
Charles Mok
Global Digital Policy Incubator
Cyber Policy Center
Stanford University
cpmok@stanford.edu

More Related Content

Similar to Digital Repression and Techno-Authoritarianism

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfaghsports
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 

Similar to Digital Repression and Techno-Authoritarianism (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Digital Repression and Techno-Authoritarianism

  • 1. Charles Mok, Global Digital Policy Incubator, Cyber Policy Center, Stanford University. Jan/Feb 2024. Digital Repression and Techno- Authoritarianism
  • 2. Digital Repression/Techno-Authoritarianism What does it mean to you? • Censorship • Disinformation / Propaganda • Surveillance / Privacy • Cyberattacks / Cybersecurity — state-sponsored • Cyber Sovereignty • Internet Shutdown / Fragmentation • Trend: • From defensive to o ff ensive • From local to beyond borders
  • 3. China’s Great Firewall (GFW) Digital Repression 1.0 • “Keeping things out,” at fi rst • Technology and laws, but also infrastructural and operational: Total control • State-controlled telecom sector: from gateways to providers • Massive human resources for real-time monitoring • Tackling Web 1.0 to Web 2.0 (user-generated content) to the mobile/social media world • More proactive surveillance and disinformation • The future is AI? • No longer de fi ned by boundaries of borders — GFW going global
  • 4. But the GFW is not for everyone Calling for GFW 2.0 • Example of Cambodia’s National Internet Gateway (work in progress since 2021) • Telecom infrastructure control and huge cost to surveil • Dependency on foreign/global platforms and telcos (except for China) • The evolution of digital repression is still based on the four pillars of the GFW: • Technology — The Digital Silk Road • Law — more speci fi c and targeted local laws with global reach • Infrastructure, and operation — exert control via legal enforcement
  • 5. Digital Authoritarian Legal Developments Some examples • India • IT Rules amendments 2021 — removal of misinformation, control over platforms • Digital Personal Data Protection 2023 — to block services on vague grounds • Telecom Act 2023 - interception of communications for national security • Singapore • Protection from Online Falsehoods and Manipulation Act (POFMA) 2019 — content removal and punishment against “fake news” • Foreign Interference Countermeasures Act (FICA) 2023 — Heavy fi nes and jail terms against those deemed to be “preparing or planning” to publish “forbidden” information online without declaring foreign involvement; unprecedented powers of government scrutiny and restrictions on the fi nancial a ff airs of targeted individuals and entities. • The common characteristics: Broad and vague.
  • 6. Example for even just a civil case • //The sweeping order comes as a result of legal action by a group purporting to represent Appin’s digital training centers — who say their students’ reputations are damaged by Reuters’ allegedly false reporting. Last month, Additional District Judge Rakesh Kumar Singh ruled that the story should be suppressed pending trial.// • Other media (Wired, Lawfare, Brookings Institute etc.) removed references or excerpts: //Several of the U.S. platforms who later removed content became aware of the disputed allegations not because they were following Indian legal news, but after hearing from Khare’s American fi rm, Clare Locke.// • “Everyone except” The Citizen Lab “complied” • Beyond laws, think about the power of a “cooperative” foreign judiciary The power of a court
  • 7. Democracies make bad laws too Global assault on privacy by encryption is led by Western democracies • UK’s Online Safety Bill has passed in 2023 • Australia proposing “industry standard for Relevant Electronic Services and Designated Internet Services” (2023) • US laws in Congress: • EARN IT Act (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022): To establish a National Commission on Online Child Sexual Exploitation Prevention, and for other purposes • STOP CSAM Act (Strengthening Transparency and Obligations to Protect Children Su ff ering from Abuse and Mistreatment Act of 2023) • KOSA (Kids Online Safety Act of 2022): To protect the safety of children on the internet. • Autocrats can justify themselves: “Democracies (you guys) do it too.” • Exception: The EU and the European Parliament, which moved to act against mass surveillance and any ban on encryption
  • 8. What’s next? Transnational Digital Repression Trend 1: In fl uencing global technology standards • China’s e ff ort to sponsor and in fl uence global technology standard setting bodies: ITU, IEEE, IETF, etc. • Attempts to migrate standard-setting and Internet operational powers from multi- stakeholder bodies such as IEEE, IETF, ICANN etc. to government-led bodies such as ITU and its subgroups, under the UN • E ff orts are often led via proxies such as Huawei and academic research institutions • Attempts to set up its own axis of nations and corporations such as the World Internet Congress to support its vision for more government control for better “security, safety and harmony” of the future Internet, in the name of national and global security, anti-terrorism and combatting cybercrime.
  • 9. Trend 2: Extraterritoriality • Manufacturing a new legal basis: Extending global jurisdiction for data laws, national security laws, etc. • You’re not “safe anywhere”: A global chilling e ff ect, at the minimum, and more, wherever you are. Transnational Digital Repression
  • 10. Transnational Digital Repression Trend 3: Taking over the Rule-based World Order • Not taking it down, but taking it over! • Case: UN Cybercrime Convention • Governments cooperating to combat cybercrime (a truly huge problem!), that should be a good thing, right? • How to de fi ne cybercrime? Anything done with a PC or phone, including expressing dissent? • Broad community concerns: Gender, LGBTQ+, religion, labor, political dissent, etc. • Power of secret investigation for governments to obtain and share data from global Internet platforms • How can platforms not comply? The “follow local law” excuse. • Serious erosion of the basis of MLAT and extradition agreements between countries — actually, bad for combatting crimes! • Western governments are quite muted in the convention discussion (except Canada) • Largely represented by justice and law enforcement branches, not human rights and diplomatic branches • Lack public awareness — perfect example of a process that excluded the civil society and private sector i.e. the “UN”
  • 11. The Global Weaponization of Legal and Technological Means to Limit Online Freedom and Redefine Truth For Citizens Anywhere
  • 12. References • The Everything, Everywhere Censorship of China (2023) https://www.freiheit.org/publikation/everything-everywhere-censorship-china • Internet Impact Brief: Cambodia National Internet Gateway https://www.internetsociety.org/resources/2022/internet-impact-brief-cambodia- national-internet-gateway/ • How a Judge in India Prevented Americans From Seeing a Blockbuster Report https://www.politico.com/news/magazine/2024/01/19/india-judge-reuters- story-00136339 • Joint Statement on the Proposed Cybercrime Treaty Ahead of the Concluding Session https://www.hrw.org/sites/default/ fi les/media_2024/01/Joint.Advocacy.Statement- Cybercrime.Convention-Jan.23.2024.pdf
  • 13. Charles Mok Global Digital Policy Incubator Cyber Policy Center Stanford University cpmok@stanford.edu