10.07.2015 Views

Internet Freedom A Foreign Policy Imperative in the Digital Age

Internet Freedom A Foreign Policy Imperative in the Digital Age

Internet Freedom A Foreign Policy Imperative in the Digital Age

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

129. Mark Lander, “U.S. Hopes Exports Will Help Open Societies,” The New YorkTimes (7 March 2010), http://www.nytimes.com/2010/03/08/world/08export.html.130. “BIS Updates Encryption Export Rule; Revised Rule Streaml<strong>in</strong>es ReviewProcess, Enhances National Security,” Department of Commerce Bureau ofIndustry and Security (25 June 2010), http://www.bis.doc.gov/news/2010/bis_press06252010.htm.131. As an example of one way <strong>in</strong> which U.S. export controls can chill onl<strong>in</strong>efreedom, Evgeny Morozov cites <strong>the</strong> case of Yaraslau Kryvoi, a Wash<strong>in</strong>gtonbasedBelarusian whose web-host<strong>in</strong>g firm suspended its blog becauseBelarus was subject to U.S. trade sanctions. Evgeny Morozov, “Do-It-Yourself Censorship,” Newsweek (7 March 2009), http://www.newsweek.com/2009/03/06/do-it-yourself-censorship.html.132. John Markoff, “At <strong>Internet</strong> Conference, Signs of Agreement AppearBetween U.S. and Russia,” The New York Times (15 April 2010), http://www.nytimes.com/2010/04/16/science/16cyber.html.133. Ryan S<strong>in</strong>gel, “Cyberwar Hype Intended to Destroy <strong>the</strong> Open <strong>Internet</strong>,” Wired(1 March 2010), http://www.wired.com/threatlevel/2010/03/cyber-war-hype/.134. David Talbot, “Dissent Made Safer,” Technology Review (May/June 2009),http://www.technologyreview.com/pr<strong>in</strong>ter_friendly_article.aspx?id=22427.Also see question by Harvard Law School’s John Palfrey to Ron Deibert,Director of <strong>the</strong> University of Toronto’s Citizen Lab: “What’s go<strong>in</strong>g to happenwhen someone does someth<strong>in</strong>g terrible us<strong>in</strong>g Psiphon, plans a terroristattack, for <strong>in</strong>stance? What’s Psiphon’s liability?” Ethan Zuckerman, “RonDeibert on <strong>the</strong> History and Future of Psiphon,” My Heart’s <strong>in</strong> Accra (31 January2007), http://www.ethanzuckerman.com/blog/2007/01/31/ron-deibert-on<strong>the</strong>-history-and-future-of-psiphon/.135. For example, Robert Vamosi writes that “TOR is endorsed by <strong>the</strong>Electronic Frontier Foundation (EFF) and is designed for <strong>in</strong>dividuals tocircumvent Web censorship <strong>in</strong> countries such as Ch<strong>in</strong>a, however, <strong>the</strong> networkcould be used by crim<strong>in</strong>als or even terrorists.” Robert Vamois, “Hack<strong>in</strong>gAnonymity,” CNET Reviews (20 October 2006), http://reviews.cnet.com/4520-3513_7-6654986-1.html?tag=untagged.136. The FBI and o<strong>the</strong>r U.S. government agencies have been relativelyvocal about <strong>the</strong>ir concerns regard<strong>in</strong>g anonymity provided by encryptiontechnologies for over a decade. In 1998, The Wash<strong>in</strong>gton Post reported that“FBI Director Louis Freeh is <strong>the</strong> most outspoken advocate of encryptionrestrictions … now, Freeh compla<strong>in</strong>s, new technology is help<strong>in</strong>g crim<strong>in</strong>alsmore than <strong>the</strong> police. One Freeh proposal is that all users of powerfulencryption software be asked to turn over <strong>the</strong>ir keys to a third party, sothat law-enforcement officials can ga<strong>in</strong> access to <strong>the</strong>m with a court order.”More recently, Dr. Marco Gercke, director of <strong>the</strong> Cybercrime ResearchInstitute, wrote “Encryption is a classic example of a neutral technology,s<strong>in</strong>ce as it is not only used to h<strong>in</strong>der <strong>in</strong>vestigations but also to preventunauthorized access to <strong>in</strong>formation … The latest operat<strong>in</strong>g systems offer<strong>the</strong> possibility to encrypt computer data with <strong>the</strong> click of a mouse, mak<strong>in</strong>git difficult for law enforcement agencies to break <strong>the</strong> encryption andaccess <strong>the</strong> data.”Dan Froomk<strong>in</strong>, “Decipher<strong>in</strong>g Encryption,” The Wash<strong>in</strong>gtonPost (8 May 1998) and Dr. Marco Gercke, “From Encryption to Failure ofTraditional Investigation Instruments,” <strong>Freedom</strong> From Fear Magaz<strong>in</strong>e,http://www.freedomfromfearmagaz<strong>in</strong>e.org/<strong>in</strong>dex.php?option=com_content&view=article&id=311:from-encryption-to-failure-of-traditional<strong>in</strong>vestigation-<strong>in</strong>struments&catid=50:issue-7&Itemid=187.137. “Clipper Trip,” Crypto Museum, http://www.cryptomuseum.com/crypto/usa/clipper.htm.138. Evgeny Morozov, The Net Delusion (New York: PublicAffairs Books, 2011):176.139. Jaikumar Vijayan, “U.S. Web Site Said to Offer Streng<strong>the</strong>nedEncryption Tool for Al Qaeda Backers,” Computerworld(23 January 2008), http://www.computerworld.com/s/article/9058619/U.S._Web_site_said_to_offer_streng<strong>the</strong>ned_encryption_tool_for_al_Qaeda_backers?taxonomyId=16&<strong>in</strong>tsrc=hm_topic.140. Ellen Nakashima, “Pentagon Considers Preemptive Strikes as Part ofCyber-Defense Strategy,” The Wash<strong>in</strong>gton Post (28 August 2010), http://www.wash<strong>in</strong>gtonpost.com/wp-dyn/content/article/2010/08/28/AR2010082803849.html.141. “We have to have offensive capabilities, to, <strong>in</strong> real time, shut downsomebody try<strong>in</strong>g to attack us,” said GEN Keith Alexander. “You needautonomous decision logic that’s based on <strong>the</strong> rule of law, <strong>the</strong> legalframework, to let network defenders know what <strong>the</strong>y are allowed to do <strong>in</strong><strong>the</strong> network’s defense.” C. Todd Lopez, “LandWarNet opens with 4 keys to<strong>Internet</strong> security,” Army News Service (3 August 2010), http://www.army.mil/-news/2010/08/04/43256-landwarnet-opens-with-4-keys-to-<strong>in</strong>ternetsecurity/.142. See <strong>the</strong> Protect<strong>in</strong>g Cyberspace as a National Asset Act of 2010, <strong>in</strong>troducedby Senators Joe Lieberman, I-Conn., Susan Coll<strong>in</strong>s, R-Ma<strong>in</strong>e and Ted Carper,D-Del.; <strong>the</strong> senators <strong>in</strong> February 2011 <strong>in</strong>troduced a reworked bill, <strong>the</strong>Cybersecurity and <strong>Internet</strong> <strong>Freedom</strong> Act.143. Declan McCullagh, “<strong>Internet</strong> ‘Kill Switch’ Bill Gets a Makeover,” CNET News(18 February 2011), http://news.cnet.com/8301-31921_3-20033717-281.html.144. Shawna Shepherd, “White House conference tackles bully<strong>in</strong>g,” CNN (10March 2011), http://www.cnn.com/2011/POLITICS/03/10/obama.bully<strong>in</strong>g/<strong>in</strong>dex.html.145. Department of State, Jo<strong>in</strong>t Request for Statements of Interest: <strong>Internet</strong><strong>Freedom</strong> Programs (3 January 2011).146. Ibid.147. As Rebecca MacK<strong>in</strong>non has suggested, had Ch<strong>in</strong>ese dissident Shi Taounderstood that Yahoo could share his email with Ch<strong>in</strong>ese police forces, hemay have found more secure methods of transmitt<strong>in</strong>g articles to dissidentwebsites. Rebecca MacK<strong>in</strong>non, “Ch<strong>in</strong>a, <strong>the</strong> <strong>Internet</strong>, and Google,” Testimonybefore <strong>the</strong> Congressional-Executive Commission on Ch<strong>in</strong>a (1 March 2010): 7.148. U.S. laws currently restrict exports to Syria. For more on <strong>the</strong> restrictionsand <strong>the</strong>ir effects on Syrian <strong>Internet</strong> users, see Jillian York, “U.S. Gives Iran MoreNet <strong>Freedom</strong> – But What About Syria?” Guardian.co.uk (16 June 2010), http://www.guardian.co.uk/commentisfree/libertycentral/2010/jun/16/<strong>in</strong>ternetiran-syria-export-controls.| 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!